Introduction
Technology has become one of the most important tools in the 21st century as it has helped how various activities are being conducted. One of the main features of the important technology is the development of information systems (Fossi, 2011). Information systems have made it easier for various tasks to be accomplished. However, the information systems are faced with various vulnerabilities that may make it difficult to accomplish certain tasks.
Types of Vulnerabilities in Information System
Various types of vulnerabilities have emerged which are associated with the information system, and they have to be evaluated carefully to devise a way of dealing with them (Moghbel & Modiri, 2011). Therefore, as an IT professional, the main type of pf vulnerability that needs to be evaluated is the social, physical, economic as well as attitudinal vulnerability.
How the Vulnerabilities are Changing IT Contemporary Environment
The presence of these vulnerabilities are significantly changing the IT environment (Dobrovoljc, Trcek & Likar, 2017). These vulnerabilities are interfering with the security of an information system leading to the loss of information that may be crucial (Agrawal & Khan, 2009). Therefore, the IT contemporary environment has changed due to vulnerabilities in the sense that a lot of focus is being placed on the security of the information system (Conteh & Schmick, 2016). For every information system that is being created, priority has to be given to the security (Almorsy, Grundy & Muller, 2016). For example, most information systems are focused on having a backup on the cloud rather than onboard so that in case of any issue, it will be easy to retrieve it.
New and Emerging Vulnerabilities
Concerning the use of machine learning and artificial intelligence, there have been new and emerging vulnerabilities that were not concerning history. One of the emerging issues is manipulation whereby a person with a malicious mind may fool the machine to give a wrong output (Kiourti et al., 2019).
References
Agrawal, A., & Khan, R. A. (2009). A Framework to Detect and Analyze SoftwareVulnerabilities: Development Phase Perspective. International Journal of Recent Trendsin Engineering, 2(2), 82.https://pdfs.semanticscholar.org/f21c/e3bb878c5ed5ee010bb756ab60bbf9e70081.pdf
Almorsy, M., Grundy, J., & Muller, I. (2016). An analysis of the cloud computing securityproblem. ArXiv preprint arXiv: 1609.01107. https://arxiv.org/abs/1609.01107
Conteh, N. Y., & Schmick, P. J. (2016). Cybersecurity: risks, vulnerabilities, andcountermeasures to prevent social engineering attacks. International Journal of AdvancedComputer Research, 6(23), 31.https://www.researchgate.net/profile/Nabie_Conteh/publication/294421084_Cybersecurityrisks_\vulnerabilities_and_countermeasures_to_prevent_social_engineering_attacks/links/56e2733408aebc9edb19eebc.pdf
Dobrovoljc, A., Trcek, D., & Likar, B. (2017). Predicting exploitations of information systemsvulnerabilities through attackers' characteristics. IEEE Access, 5, 26063-26075.https://ieeexplore.ieee.org/abstract/document/8094238/
Fossi, M., Egan, G., Haley, K., Johnson, E., Mack, T., Adams, T., & Wood, P. (2011). Symantec internet security threat report trends for 2010. Volume XVI.http://book.itep.ru/depository/security/symantec/Symantec%20%20April%202011%20threat%20report.pdf
Kiourti, P., Wardega, K., Jha, S., & Li, W. (2019). TrojDRL: Trojan Attacks on DeepReinforcement Learning Agents. ArXiv preprint arXiv: 1903.06638.https://arxiv.org/abs/1903.06638
Moghbel, Z., & Modiri, N. (2011). A Framework for Identifying Software Vulnerabilities withinSDLC Phases. International Journal of Computer Science and Information Security, 9(6),203.http://www.academia.edu/download/37607688/Journal_of_Computer_Science_IJCSIS__Vol._9_No._6_June_2011.pdf#page=214
Cite this page
21st Century Tech: Exploring Info System Vulnerabilities - Essay Sample. (2023, Jun 08). Retrieved from https://proessays.net/essays/21st-century-tech-exploring-info-system-vulnerabilities-essay-sample
If you are the original author of this essay and no longer wish to have it published on the ProEssays website, please click below to request its removal:
- Pipeline Scanning Robots
- Essay Sample on Employment Trends and Opportunities in the Nuclear Industry
- Canada's Mobile Phone Market Paper Example
- Fracking and the Impacts Essay Example
- Essay Sample on Technology Design and Artificial Intelligence
- Paper Example on Mobile Tech: Revolutionizing Communication in Science
- Essay Example on AI & IoT: Enhancing the Internet Experience