Introduction
Information security is a very important component of security operational technique. There has been many aspects of the security field that have been affected with the introduction of computers. Before the introduction of computers, there were different techniques that were followed in order to achieve security (Cole, 2011). With the use of computers, there has been the development of many different security techniques that have helped to endure that security has been achieved in the field of computers. This paper will address the security operational techniques in the era of information technology and how things have changed from the era where there was no use of computers.
Before the introduction of computers, security involved protecting documents in different formats which formed a difficult task to be achieved. These tasks were hard to be achieved and the use of computers solved most of these issues in place. The protection of documents used to be a difficult task. With the introduction of computers, there has been the need to have protection of the software. The protection of software is much easier and achievable than the protection of documents in a filing cabinet. The security process is to be able to protect the investments of the business owners, employee data, assets and properties. The achievement of security is one of the desires of businesses because they get the safety and the confidentiality that is required and needed for smooth operations of a business. Before the introduction of computers, information such as policies and procedures were put on paper which made it difficult to be arranged and have them in a timely manner. The workload also was hurt with the use of these documents. With the use of these techniques, security operational techniques was hard to be achieved because there was the need to have the security of this information. Anyone would change this information at will. With the use of computers, security operational techniques has been brought to a new level that is efficient and simple to be managed and enhanced. Some of the types of computers that are seen in the field include supercomputers, mainframes, and minicomputers. Each type of computer has different operating systems and has their different purpose in the management of information systems. Computers are becoming more needed in the security operational techniques. Before the introduction of computers, there was the need to write down policies, security manuals, or contact lists. This is no longer the case because of the use of database information systems which have made security to be achieved with efficiency and reliability. The databases can be updated at will and will have the latest information regarding the security that is being desired.
Security personnel and managers are shifting to the use of technology to solve the security issues that are found in the business world today. Computers are becoming more powerful than the way they were before. With the use of computers, more up-to date programs, and privacy programs have been made accessible so that the private organizations are turning to the use of computers in order to have security achieved in their organizations. With the use of computers, there has been the need to have more security features that have enabled the computer operators and managers to achieve the latest techniques with the use of these aspects of computers.
Some of the benefits of computer is the use of word programs which have made it possible to have security text documents which are useful for management of information systems in the computer.
Another benefit of the use of new technologies is the aspect of database management systems. With the use of database management systems, businesses are able to update, delete, or add to the security documents so that they are able to manage and achieve the security faster than the way they were achieved in the past. Security procedures will need to have information so that they are able to plan, retrieve, print, and analyze the data for the good of the business. With the use of these new technologies, these benefits are easier and better achieved. The use of database management systems is important and enables the business to achieve the security and business processing in faster ways than it has been achieved in the past. There is the use of encryption where the documents will be protected from unauthorized access (Herrod, 2013). It is important to have these procedures put in place and have a security aspect that will enable the documents to be achieved.
There are negative impacts that come with the use of new technologies in the security operational techniques. One of the negative impacts of security in this aspect is that there can be disasters which will affect the security operations of the data and information. Disasters can happen which either can be natural or man-made. The disaster can be made in the form of sabotage from the employees because of some aspect that they do not like in the business. With the changes that are seen in the technology, the way these technologies are managed and security achieved are also seen to be changing. Some of the negative aspects that come with the use of new technologies is the threats and risks that come with these technologies.
Another negative effect of computer technology is the difficulty that there is in the creation of counter attacks. It is becoming difficult to keep abreast with the attacks and vulnerabilities that come with the computers and new technologies. It is important to have new ways in which these new technologies will be achieved and attained so that eth computer security aspects will be manageable in the end. There are more weaknesses that come with the use of computers and new technologies. One aspect is that there are more people who aim to bring more havoc to computer systems than any other security. The hackers will want to have access to information that is stored in the company so that they are able to get the data for fraudulent activities. There are many attacks like denial of service attacks which have made the services from computer systems to be unavailable in the end. Denial of service attacks have been used to make attacks on computer resources. Also the attacks are hard to trace in the use of new technologies.
Recommendations
One of the ways in which to have counter attacks include the use of intrusion detection systems. The use of DOS prevention mechanism will enable the security organization to be able to understand the requirements that they need in order to prevent the attacks from taking place (Vacca, 2013). The need for these counter attacks will have to be expertise that will enable the security staff to be able to have the security issues and have the mechanism that will be useful in the entire process and management procedures. Another recommendation is to have the latest hardware and software so that it will be able to manage the safety procedures and have the mechanisms that will be able to achieve the security procedures that are available. There is also a need to have user training and orientation so that the staff and employees will be able to understand the requirements that will enable the security teams to be able to manage the security of the company (Whitman, & Mattord, 2011). Employees will be required to have ways in which to be able to be responsible for the security of the attacks. It will also be important to have incident response teams and disaster preparedness that will enable operations of the company to be put in place. The response team will make use of techniques and tools like sinkhole, back-hole, and scatter in the enhancement of the security of the data and procedures in the entire process. The purpose of the sinkhole is to make the attack to have a different route. The use of the back scatter is to monitor the attacks over the internet and asses the likely places that the attack can get to the system. These are the procedures that will enable the management and security personnel to be able to have places that they can monitor in order to have security of the data. The use of the back-hole filtering is to drop some traffic and will be able to make sure that the attacks can be countered before they bring the attacks to the system. There is a need to have risk analysis and management in order to have the security aspects of the business achieved in the end run. There is also a need to have security of the entire network because it is the source of the attacks.
Communication is a significant component in any organization. Communication is important in order to have information transfer. In undertaking the security requirements and having security in the workplace, one of the security requirements is to have a way in which the security will be achieved in the entire process. With the security requirements in the procedures of the company, some of the needs that will be required is to have changes to the business procedures from time to time (Zhang et al., 2012). This will include communicating to the employees the need to have measures that will ensure that there is security of the data in the entire management. In order to have employees understand the different security requirements, it will be important to have effective communication plan to enable the employees to effect the changes and the security measures that will be required of them. Without effective communication, there will be no security program implementations in the security aspect of the organization. All the measures that have to be taken into considerations will not be achieved with these aspects and measures.
References
Cole, E. (2011). Network security bible (Vol. 768). John Wiley & Sons.
Herrod, A. (2013). U.S. Patent No. 8,353,001. Washington, DC: U.S. Patent and Trademark Office.
Vacca, J. R. (Ed.). (2013). Managing information security. Elsevier.
Whitman, M., & Mattord, H. (2011). Principles of information security. Cengage Learning.
Zhang, Y., Deng, X., Wei, D., & Deng, Y. (2012). Assessment of E-Commerce security using AHP and evidential reasoning. Expert Systems with Applications, 39(3), 3611-3623.