This essay has been submitted by a student. This is not an example of the work written by professional essay writers.
Uncategorized

Information technology security analysis

This essay is written by:

Louis PHD Verified writer

Finished papers: 5822

4.75

Proficient in:

Psychology, English, Economics, Sociology, Management, and Nursing

You can get writing help to write an essay on these topics
100% plagiarism-free

Hire This Writer

 

 

 

 

 

 

Information technology security analysis

Students name:

Professor:

Date:

 

 

 

 

 

 

 

 

1.The purpose of security analysis

Security analysis is an essential component that needs to be adopted in information technology and the entire information systems. Information needs to be handled with great care to avoid an incident such as lack of adherence to the principles governing information, IT integrity, confidentiality, and availability. The three are the principles that need to be followed in information systems and where loopholes or compromise to them can lead to hefty penalties and considerable losses to an organization or a service provider. The purpose of security analysis is to be able to check on the results of assessments of the IT infrastructures. Security analysis touches on various aspects of IT, like the outcomes of the policies introduced, the results if some processes, and the impact of and to the people. The main purpose of security analysis is to identify the vulnerabilities (Aldini & Gorrieli,2011). If a system is vulnerable,  it is likely to be compromised or be attacked by hackers and other intruders. To beef up security, Vulnerabilities must be dealt with hence making a system safer and complex to intrude. With security analysis, one is capable of conducting a SWOT analysis. With SWOT analysis, a security expert can identify the system’s strengths and weaknesses. More has to be done In the weaknesses to avoid possible exploitation. Also, the security analysis enables one to identify and act on the threats likely to be experienced and may affect a company or an organization adversely.

  1. Explanation of the domain in fig 2.2

Based on the diagram, almost all aspect of information need to the analyses in terms of security because they can easily become a target if they are vulnerable, the process of deployment need to be analyzed to ensure they are secure and will not be a risk to v the system. The existing limitations need to be also analyzed because they can be vulnerable and expose the system (Dash, 2009). Runtime models and data classes need to be analyzed, too, because data is what is most targeted and needs to be kept safe. The analysis helps understand the loopholes and the weaknesses that can be taken advantage of by the attackers. There are also issues with the threatscape and required risk postures that need to be analyzed in security analysis. Finally, the threats need to be controlled .the need to controls brings in an aspect of possible control to be analyzed in security analysis to ascertain its adaptability, efficiency, and limitations likely to be experienced.

 

 

 

 

 

 

 

 

 

 

 

 

 

References

Aldini, A., & Gorrieri, R. (2011). Foundations of security analysis and design VI: FOSAD tutorial lectures. Springer.

Dash, A. P. (2009). Security analysis and portfolio management (Paperback) (2nd ed.). I. K. International Pvt.

 

  Remember! This is just a sample.

Save time and get your custom paper from our expert writers

 Get started in just 3 minutes
 Sit back relax and leave the writing to us
 Sources and citations are provided
 100% Plagiarism free
error: Content is protected !!
×
Hi, my name is Jenn 👋

In case you can’t find a sample example, our professional writers are ready to help you with writing your own paper. All you need to do is fill out a short form and submit an order

Check Out the Form
Need Help?
Dont be shy to ask