Affected To Public Sector And Private Sector

Print   

02 Nov 2017

Disclaimer:
This essay has been written and submitted by students and is not an example of our work. Please click this link to view samples of our professional work witten by our professional essay writers. Any opinions, findings, conclusions or recommendations expressed in this material are those of the authors and do not necessarily reflect the views of EssayCompany.

Information technology is mainly use for manage and process information for various techniques used general. Information technology is mainly to use computer science and communications technology to design, develop, installation and carry out of information system and some application software. We also call it as information and communication technology (ICT).

Information Technology is becoming more prevalent in this social. It is impacts us all. We need to protect and accountable for this technology that we use every day. We also need to consider this technology will bring a lot of impact to our society.

1.2 Information and Communication Technology

ICT also called as Information and Communication Technology. It is refers to the technology that are using telecommunications to access to the information. Information and Communication technology is mainly on the communications technology and it is almost same like information technology. There are some technologies or mediums that can use to communicate with each other which are internet, wireless network, hand phone and other technology or communications mediums.

Nowadays, information and communication technology security issues and concerns are becoming more prevalent and increasingly complex as the pace of technology implementation continues to accelerate. This phenomenon has affected the public sector and the private sector in our country.

1.1 E-Government

E-Government also called as Electronic Government. The e-Gov field emerged in the late 1990’s as a context within which to share experiences among practitioners. Over few years e-Gov gave rise to several conferences with more and more scientific content. Some specialized journals now appear. Because the field grew too considerable size, both its contents and position with respect to other research fields and disciplines needs to be explained and discussed.

2.1 Information and Communication Technology

Information and Communication Technology encompasses systems and services that gather, store, recover, maintain, manage, transmit process, interpret, present and protect information. Information and Communication Technology is embodied in large-scale and complex systems such as telecommunications networks and the World Wide Web, in devices such as mobile telephones and Personal Computer, and in services such as banking, digital television and e-Government. It provides necessary tools and infrastructures for many branches of science and design including environmental science, bioscience and automotive design.

ICT systems and services are composed of both electronic and software components, which are supplied by sizeable industries with different characteristics, though, related value chain.

2.2 Security Issues

One of the main issues with Information and Communication Technology is security. At present, security issues are very complex issues. Information and communication technology are both more and more complex and vulnerable with a growing presence of bugs at a developing stage as well as in their production. Launching damaging attacks against the systems requires less complex skills. The classification of attacks that is being used is simple and easily understandable by those who received the questionnaire: persons in charge of the information and communication technology divisions and information and communication technology security.

The following are the categories of attacks referred to:

Virus contamination (both at workstation and server levels)

Theft of information equipment containing data (laptops, hard disk, floppy disks, tapes and etc)

Denial of service

Trojan horses

Piracy and information frauds (abuse of information and communication technology resources, illegal copying of software or data and etc)

Non authorized access and changes of information

Non authorized use of computers

Non authorized access and changes to system and applications

This section summarizes the main issues that organizations will need to consider in terms of Information and Communication Technology security, and covers the relevant legislation – principally the Copyright, Designs and Patents Act 1988, the Computer Misuse Act 1990, the Data Protection Act 1998, and the Regulation of Investigatory Powers Act 2000 (RIPA). The section also provides an overview of BS 7799/ISO/IEC 27002, which is a code of practice for information security management.

2.3 Affected to Public Sector and Private Sector

According to recent studies, security is the biggest challenge facing in the public sector and private sector. Ever-changing security threats from both inside and outside the can severely impair the whole project operations, affecting profitability and our live. In addition, small and medium-sized businesses must comply with new regulations and laws created to protect consumer privacy and secure electronic information. For the personal computer user, keep our personal information and important data safe. Here, I listed 5 security issues that can affected the public, private or in business.

Security Issue No. 1: Worms and Viruses

Computer worms and viruses remain the most common security threat, almost all of small and medium-sized businesses affected by at least one virus in the last year. Worms and viruses can have a devastating effect on business continuity and profitability. Smarter, more destructive strains are spreading faster than ever, infecting entire offices in seconds. Cleaning the infected computers takes much longer, and the process often results in lost orders, corrupted databases, and angry customers. As businesses struggle to update their computers with the latest operating system patches and antivirus software, new viruses can penetrate their defenses at any time. Meanwhile, employees spread viruses and spyware by unwittingly accessing malicious Websites, downloading untrustworthy material, or opening e-mail attachments. These attacks are unintentionally invited into the organization, but can still cause significant financial losses. Security systems must detect and repel worms, viruses, and spyware at all points in the network.

Security Issue No. 2: Information Theft

Information theft is lucrative. Hackers break into business networks to steal credit card or social security numbers for profit. Small and medium sized businesses are seen as an easier target than large corporations. Protecting the perimeter of the network is a good start, but it is not enough, since many information thefts are assisted by a trusted insider, such as an employee or contractor.

Information theft can be costly to small and medium-sized businesses, since they rely on satisfied customers and a good reputation to help grow their business. Businesses that do not adequately protect their information could face negative publicity, government fines, or even lawsuits. For example, new consumer laws enacted in California require any business that suspects customer information has been viewed by unauthorized people must notify all their customers. Any security strategy must prevent theft of sensitive electronic information from both inside and outside the business.

Security Issue No. 3: Business Availability

Computer worms and viruses are not the only threat to business availability. Denial-of-service (DoS) attacks can shut down Websites and ecommerce operations by sending large volumes of traffic to a critical network element and causing it to fail or to be unable to process legitimate traffic. Once again, the results are disastrous: data and orders are lost and customer requests are not answered. If these attacks become public, a company’s credibility is damaged. While most of the publicity surrounding DoS outages has focused on major banks and global 500 companies, small and medium-sized businesses are not immune. They are viewed as less prepared for attacks than large corporations.

Many less dramatic but more likely attacks also threaten business availability. For example, a resource theft attack breaches business computers and networks, using them for illegal file sharing of music, movies, or software. Often, businesses are unaware that a security breach is underway. Meanwhile, their computers and networks are slow to respond to customers, and their unwitting participation in illegal file sharing leaves them vulnerable to lawsuits.

Security Issue No. 4: The Unknown

With every advance in computing and communications comes new ways to exploit that technology for gain or mischief. New hardware or software releases present such opportunities. When peer-to-peer networking and instant messaging were still relatively new applications, for example, their users were attacked by malicious code written specifically for them. Now, mobile phones are frequent targets of viruses. Without the ability to predict what is coming next, the best defense is one that can easily adapt to future threats, and that is affordable.

Security Issue No. 5: Security Legislation

Aside from these security threats, new laws and regulations require that small and medium-sized businesses protect the privacy and integrity of the information entrusted to them. In the European Union, for example, the EU Data Protection Act governs the protection of personal data in the hands of organizations. Nearly every industry has an example of legislation that regulates businesses and requires additional security measures. In the United States, the Health Insurance Portability and Accountability Act (HIPAA) requires healthcare organizations, including every doctor’s office, to put safeguards in place to ensure the privacy of health information and prevent unauthorized access.

The onus is on businesses to comply with laws and regulations that apply to their business in their markets. Customers want assurance that their information will be kept private. All businesses must take steps to secure their business infrastructure, but with their limited budgets, small and medium-sized businesses, in particular, require simple, right-sized, affordable solutions.

2.5 Conclusion

Information and Communication Technologies will provide benefits to our society for years to come. The proliferation of these technologies or their decline will be affected amongst all by security issues on these areas: lack of security awareness and training, operating system design and security, open source issues, design complexity and multiple layer approach. Therefore, designing better operating systems, improving on security awareness, training and multiple layer complexity are some of the challenges for the future.



rev

Our Service Portfolio

jb

Want To Place An Order Quickly?

Then shoot us a message on Whatsapp, WeChat or Gmail. We are available 24/7 to assist you.

whatsapp

Do not panic, you are at the right place

jb

Visit Our essay writting help page to get all the details and guidence on availing our assiatance service.

Get 20% Discount, Now
£19 £14/ Per Page
14 days delivery time

Our writting assistance service is undoubtedly one of the most affordable writting assistance services and we have highly qualified professionls to help you with your work. So what are you waiting for, click below to order now.

Get An Instant Quote

ORDER TODAY!

Our experts are ready to assist you, call us to get a free quote or order now to get succeed in your academics writing.

Get a Free Quote Order Now