Exploring Information Systems: Technology, Tasks and Actors - Essay Sample

Paper Type:  Essay
Pages:  7
Wordcount:  1698 Words
Date:  2023-03-13

Introduction

Information systems comprise various information technologies such as software, computers, communication systems, mobile devices, communication systems, databases, as well as the internet (Boell & Cecez-Kecmanovic, 4). The combination of two or more of these technologies enhance the performing of specific tasks and interaction with various actors in different organizations and other social fields. The interests in the field of information systems involve all aspects of developing, deploying, implementing, and impact of information systems in society and organizations (Boell & Cecez-Kecmanovic, 4). This paper aims to advance the understanding of a key information systems concept - computer and network security - by analyzing its origin and history, examples of its application, advantages, and disadvantages as well as expert's view.

Trust banner

Is your time best spent reading someone else’s essay? Get a 100% original essay FROM A CERTIFIED WRITER!

Nevertheless, information systems primary concern is not the computational and technical aspects of information systems. What matters is how technology is initiated and appropriated to enable recognition of information systems to fulfill different actors - like organizations, groups as well as individuals - requirements regarding certain goals and practices (Boell & Cecez-Kecmanovic, 4). The term information systems should be explicitly defined and examined since it is widely recognized in its application.

Origin and History of Computer and Network Security

Computer security comprises of the key methods and concepts necessary in the protection of sensitive information in computer systems (Gollmann, 1). This ranges from policies regulating access to protected resources. Computer and network security focus on the enforcement of these policies by the use of various mechanisms specially designed for this function. Network security exists to prevent hackers who seek to access or gain sensitive or personal information from the internet. Networking of computers started in the late 1980s, and this led to an increased concern for security, although it was minimal when compared to the modern security issues (Gollmann, 1). An explicit understanding of computer and network security will enable us to grasp its importance in modern days.

Before the 1980s, computer networking was less common; only a few individuals had internet access (Gollmann, 1). Therefore, the issue of computer security was not the main concern - after the accessibility of sensitive information increased, importing network security became more significant. In the late 1980s, the use of networks was rapidly increasing (Gollmann, 1). Militaries, colleges as well as governments were connecting more. This meant that the expansion of security was needed. Computer worms were the main threats and predecessor to viruses. The first worm was known as "Morris Worm," developed by Cornell students to reveal lacking areas in a system of network intrusion (Gollmann, 1).

Since the worm rendered computers inoperable, there was the development of countermeasures designed to prevent threats of invasion and destruction of existing networks (Gollmann, 1). Notable developments in network security since the popularity of computer networking include Computer Emergency Response Team (CERT), developed by agencies governing Arpanet - the predecessor of the word internet. Firewalls and Anti - Virus Protection also evolved to boost security measures and curb potential threats (Gollmann, 1). Since the 1990s, the internet has exploded, and viruses created in the modern day can generate a huge calamity to organizations, individuals, and society.

Current Use of Computer and Network Security

Absence of proper computer security leave companies vulnerable to numerous calamities (Parmar, 5). Threats may be initiated by the technology or by individuals behind the technology. Computer network security systems offer an organization and its clients confidence in their highly prized enterprises that is data, networks as well as computer systems (Parmar, 5). Currently, the application of network security includes; minimizing the level of risks in attacks, breaches, and infections. This helps to keep files fee from any infections in collaborative working environments.

Network security keeps sensitive data, including personal information, as well as confidential organization materials away from unauthorized individuals who may commit fraud. Computer and network security are used to boost the reliability of the existing networks through the prevention of downtimes and lagging (Parmar, 5). This is achieved through continuous monitoring of doubtful transactions capable of sabotaging your system.

Examples of Computer and Network Security in Individuals, Organizations, and Governments

The increased threats to computer network due to the rise in the number of hackers and the invention of new methods of attacks makes the perpetrators smarter. This has to the need of utilizing network security tools by individuals, organizations as well as the government to reduce or avoid the threats. Example of these security and network security tools includes; Application Security can enable individuals to protect their apps since they are not perfectly created (Pawar & Anuradha, 2). Applications consist of vulnerabilities that can be closed since the security tool consists of hardware, software, and processes for protection.

Antivirus and Antimalware Software - it is a software for protection against malware such as spyware, Trojans, viruses, worms, as well as ransomware (Pawar & Anuradha, 2). Organizations use anti-virus software to prevent attacks into their networks, which can make them remain calm for several days.

Data loss prevention is used by organizations to prevent their staff from sending sensitive information outside networks (Pawar & Anuradha, 2). Email security - email security applications can block incoming attacks and control outbound messages to inhibit losing sensitive data. Firewalls can be used by organizations to place a barrier between untrusted outside networks and trusted internal networks, specifically the internet (Pawar & Anuradha, 2). Firewalls can either be hardware or software and efficiently manages traffic on devices and secure connections when one is online.

Common Attitudes Toward Computer and Network Security. My Attitudes Toward Computer and Network Security

Attitudes towards computer network and security are critical since it determines whether there will be enforcement of IT security or not. Failure by the users to connect their attitudes with security threats may be harmful (Tar, 6). They may continue to exhibit careless security attitudes through discriminatory disclosing of their passwords, failing to encrypt critical messages, and not acknowledging the possibility of cybersecurity.

The reduction of computer and network security threats requires focusing on the attitudes of the users. Bruce Schneir asserted that "the biggest security vulnerability is still the link between keyboard and chair" (Tar, 6). Attitudes towards network security is a good predictor of how this issue can be approached. Common attitudes from many individuals regarding network security reveal that people are uninterested in taking the responsibilities towards this issue. Although there are difficulties in understanding the security issues, not many people are ready to take the responsibility of ensuring their safety fully. The reliance, however, shifts to the experts in this area, which is dangerous since they may turn to be the attackers too. However, most of the people will ensure they install security features in their devices but will unlikely to take more precautions. My attitude towards the computer and network security is vibrant. I should take the responsibility to ensure my computer and other devices are safe through the installation of security applications and anti-virus software.

Advantages of Computer and Network Security

Protects data, thus keeping a check on unauthorized access (Buch et al., 3). Since a network consists of a lot of confidential data breaking on these networks may result in the hampering of personal information. Offers centralized updates - anti-virus software should be updated on time since old versions will not provide enough security. Computer and network security prevent cyber-attacks (Buch et al., 3). Since most of the threats come from the internet, expert hackers can commit fraud using information from these networks.

Disadvantages of Computer and Network Security

Setting up systems for computer and network security is a bit expensive (Buch et al., 3). Both purchasing and installation of anti-virus software can be expensive, especially for small networks. Requires skilled staff capable of handling rising security threats that arise (Buch et al.et al., 3). Acquiring such skills may be costly and unaffordable to an organization. Some security systems are time-consuming (Buch et al., 3). Some installed software requires authentication by the use of two passwords that ensure double security every time a document is used, and this consumes a lot of time.

Prevailing View Experts Hold About the Likely Future of Computer and Network Security

The future of the network and computer security are forecasted. New trends are emerging, and this will continue in the future. A set of application is going to drive the network security in the future (Buch et al., 3). The likely future is like the computer, and network security will be like immune systems, which fight against attacks and enhances itself to fight tough threats. In the future, a combination of IPv6 internet protocol systems as well as tools like intrusion detection and firewalls and mechanism for authentication will prove to be much effective.

Experts believe that Artificial Intelligence (AI) will be the most effective mechanism for computer and network security (Buch et al., 3). Hackers are believed to become more sophisticated and will use new tools and methods to access confidential information illegally. The future of network security is likely to be based on 5G networks, which will enable billions of devices to be networked with higher speed and efficiency than before (Buch et al., 3). This will lead to more security concerns as hackers will now have greater access to a larger network of devices, information as well as higher connection speed.

Conclusion

Therefore, computer and network security are not new concepts in the field of technology. They date back in the 1980s, where a lot of developments have evolved to enhance security. Computer and network are applied in various fields by individuals, governments, and organizations. People hold different attitudes toward this concept, which greatly determines whether there will be solutions to security issues. The future of computer and network security includes increased and sophisticated attacks and also new ways of handling these attacks.

Sources

D. Gollmann, 1, (2010). Computer security. Wiley Interdisciplinary Reviews: Computational Statistics, 2(5), 544-554. doi:10.1002/wics.106

M. V. Pawar & J.Anuradha (2015). Network Security and Types of Attacks in Network. Procedia Computer Science, 48, 503-506. doi: 10.1016/j.procs.2015.04.126

R. Buch, Ganda, D., Kalola, P., & Borad, N. (2017). World of Cyber Security and Cybercrime.

S. K. Boell & D. Cecez-Kecmanovic. (2015). What is an Information System? 2015 48th Hawaii International Conference on System Sciences. doi:10.1109/hicss.2015.587

S. K. Parmar, 5. (2010). Computer, Internet, and Network Systems Security.

Tar, 6, N. L. (2017). When Cyber Systems Crash: Attitudes Towards Cyber Utilization and Security.

Cite this page

Exploring Information Systems: Technology, Tasks and Actors - Essay Sample. (2023, Mar 13). Retrieved from https://proessays.net/essays/exploring-information-systems-technology-tasks-and-actors-essay-sample

logo_disclaimer
Free essays can be submitted by anyone,

so we do not vouch for their quality

Want a quality guarantee?
Order from one of our vetted writers instead

If you are the original author of this essay and no longer wish to have it published on the ProEssays website, please click below to request its removal:

didn't find image

Liked this essay sample but need an original one?

Hire a professional with VAST experience and 25% off!

24/7 online support

NO plagiarism