21st Century Tech: Exploring Info System Vulnerabilities - Essay Sample

Paper Type:  Essay
Pages:  2
Wordcount:  536 Words
Date:  2023-06-08
Categories: 

Introduction

Technology has become one of the most important tools in the 21st century as it has helped how various activities are being conducted. One of the main features of the important technology is the development of information systems (Fossi, 2011). Information systems have made it easier for various tasks to be accomplished. However, the information systems are faced with various vulnerabilities that may make it difficult to accomplish certain tasks.

Trust banner

Is your time best spent reading someone else’s essay? Get a 100% original essay FROM A CERTIFIED WRITER!

Types of Vulnerabilities in Information System

Various types of vulnerabilities have emerged which are associated with the information system, and they have to be evaluated carefully to devise a way of dealing with them (Moghbel & Modiri, 2011). Therefore, as an IT professional, the main type of pf vulnerability that needs to be evaluated is the social, physical, economic as well as attitudinal vulnerability.

How the Vulnerabilities are Changing IT Contemporary Environment

The presence of these vulnerabilities are significantly changing the IT environment (Dobrovoljc, Trcek & Likar, 2017). These vulnerabilities are interfering with the security of an information system leading to the loss of information that may be crucial (Agrawal & Khan, 2009). Therefore, the IT contemporary environment has changed due to vulnerabilities in the sense that a lot of focus is being placed on the security of the information system (Conteh & Schmick, 2016). For every information system that is being created, priority has to be given to the security (Almorsy, Grundy & Muller, 2016). For example, most information systems are focused on having a backup on the cloud rather than onboard so that in case of any issue, it will be easy to retrieve it.

New and Emerging Vulnerabilities

Concerning the use of machine learning and artificial intelligence, there have been new and emerging vulnerabilities that were not concerning history. One of the emerging issues is manipulation whereby a person with a malicious mind may fool the machine to give a wrong output (Kiourti et al., 2019).

References

Agrawal, A., & Khan, R. A. (2009). A Framework to Detect and Analyze SoftwareVulnerabilities: Development Phase Perspective. International Journal of Recent Trendsin Engineering, 2(2), 82.https://pdfs.semanticscholar.org/f21c/e3bb878c5ed5ee010bb756ab60bbf9e70081.pdf

Almorsy, M., Grundy, J., & Muller, I. (2016). An analysis of the cloud computing securityproblem. ArXiv preprint arXiv: 1609.01107. https://arxiv.org/abs/1609.01107

Conteh, N. Y., & Schmick, P. J. (2016). Cybersecurity: risks, vulnerabilities, andcountermeasures to prevent social engineering attacks. International Journal of AdvancedComputer Research, 6(23), 31.https://www.researchgate.net/profile/Nabie_Conteh/publication/294421084_Cybersecurityrisks_\vulnerabilities_and_countermeasures_to_prevent_social_engineering_attacks/links/56e2733408aebc9edb19eebc.pdf

Dobrovoljc, A., Trcek, D., & Likar, B. (2017). Predicting exploitations of information systemsvulnerabilities through attackers' characteristics. IEEE Access, 5, 26063-26075.https://ieeexplore.ieee.org/abstract/document/8094238/

Fossi, M., Egan, G., Haley, K., Johnson, E., Mack, T., Adams, T., & Wood, P. (2011). Symantec internet security threat report trends for 2010. Volume XVI.http://book.itep.ru/depository/security/symantec/Symantec%20%20April%202011%20threat%20report.pdf

Kiourti, P., Wardega, K., Jha, S., & Li, W. (2019). TrojDRL: Trojan Attacks on DeepReinforcement Learning Agents. ArXiv preprint arXiv: 1903.06638.https://arxiv.org/abs/1903.06638

Moghbel, Z., & Modiri, N. (2011). A Framework for Identifying Software Vulnerabilities withinSDLC Phases. International Journal of Computer Science and Information Security, 9(6),203.http://www.academia.edu/download/37607688/Journal_of_Computer_Science_IJCSIS__Vol._9_No._6_June_2011.pdf#page=214

Cite this page

21st Century Tech: Exploring Info System Vulnerabilities - Essay Sample. (2023, Jun 08). Retrieved from https://proessays.net/essays/21st-century-tech-exploring-info-system-vulnerabilities-essay-sample

logo_disclaimer
Free essays can be submitted by anyone,

so we do not vouch for their quality

Want a quality guarantee?
Order from one of our vetted writers instead

If you are the original author of this essay and no longer wish to have it published on the ProEssays website, please click below to request its removal:

didn't find image

Liked this essay sample but need an original one?

Hire a professional with VAST experience and 25% off!

24/7 online support

NO plagiarism