Information technology security analysis
Students name:
Professor:
Date:
1.The purpose of security analysis
Security analysis is an essential component that needs to be adopted in information technology and the entire information systems. Information needs to be handled with great care to avoid an incident such as lack of adherence to the principles governing information, IT integrity, confidentiality, and availability. The three are the principles that need to be followed in information systems and where loopholes or compromise to them can lead to hefty penalties and considerable losses to an organization or a service provider. The purpose of security analysis is to be able to check on the results of assessments of the IT infrastructures. Security analysis touches on various aspects of IT, like the outcomes of the policies introduced, the results if some processes, and the impact of and to the people. The main purpose of security analysis is to identify the vulnerabilities (Aldini & Gorrieli,2011). If a system is vulnerable, it is likely to be compromised or be attacked by hackers and other intruders. To beef up security, Vulnerabilities must be dealt with hence making a system safer and complex to intrude. With security analysis, one is capable of conducting a SWOT analysis. With SWOT analysis, a security expert can identify the system’s strengths and weaknesses. More has to be done In the weaknesses to avoid possible exploitation. Also, the security analysis enables one to identify and act on the threats likely to be experienced and may affect a company or an organization adversely.
- Explanation of the domain in fig 2.2
Based on the diagram, almost all aspect of information need to the analyses in terms of security because they can easily become a target if they are vulnerable, the process of deployment need to be analyzed to ensure they are secure and will not be a risk to v the system. The existing limitations need to be also analyzed because they can be vulnerable and expose the system (Dash, 2009). Runtime models and data classes need to be analyzed, too, because data is what is most targeted and needs to be kept safe. The analysis helps understand the loopholes and the weaknesses that can be taken advantage of by the attackers. There are also issues with the threatscape and required risk postures that need to be analyzed in security analysis. Finally, the threats need to be controlled .the need to controls brings in an aspect of possible control to be analyzed in security analysis to ascertain its adaptability, efficiency, and limitations likely to be experienced.
References
Aldini, A., & Gorrieri, R. (2011). Foundations of security analysis and design VI: FOSAD tutorial lectures. Springer.
Dash, A. P. (2009). Security analysis and portfolio management (Paperback) (2nd ed.). I. K. International Pvt.