You are on page 1of 3

The reason to be important of Information Technology Security is technologies are used everywhere

nowadays, even personally or public-ally even the largest organization use network to transmits their
data from one destination to another, in each type of company, personally, public-ally, even the
mobile in our hands having network nodes, and internet is in used a wide variety of ranges. We use
technology for everything nowadays, like we’re really intellectualized with technology, such as we
take can example of computer machine, or a system of computers either computerized systems are
used for everything evne when you’re shopping and financially banking, investing on something and
communicating which have distances, making communication throughout the chat and mailing
system and software programs like a social media, even one thing that you’ve posted can reach to
anyone within seconds or minutes if we see specific corporations which having sensitive information
or credentials are any type of corporations, governments, military, hospitals, other business, like
financials business, process and collects data on daily bases, and store a wide range of information
data on their software system and use it. They also use this information to be transmitting to other
computer networks,as the volume of computer networks and technologies are growing up rapidly, we
also need to consider related to the software security. The software must be secure in order to
protect your sensitive information, so the hackers couldn’t break into it. So these type of businesses
are using technology and storing their data, they need to keep an active attention regarding
protecting those sensitive business data and information as well as national security need to be
safeguards. As the during top senate of March 2013, the top national official intelligence warned
about the risk of Information technology threats or attacks and spying digitally became the top most
threat in this era and need to consider it as serious as possible.

As we stores a wide range of information or data in several devices and forms such as our movile
devices, documents, laptops, verbals such we handle several types of valuable and most sensitive
information like, Clients data, Information of financial, Business data. The value of our information is
the main asset that enables and give powers to our businesses, so any kind of losses in formation or
data can affect the corporations in terms of reputation, time and money. So that’s why information
technology security at its big place and keep importance for every type of organization even using
technology like computer, hand-held devices personally.

Data Centre From Fire Protection: Data Centre is one main place where all the customers or
businesses related data are stored, we need to think about any kind of protection or threat from any
harmful intentional and unintentional act, but the thing is what strategy will be use while protecting
the data centre from fire, it’s basically comes related to physical security, the mechanism I’ll follow to
protect data centre from fire that is, optimum security for stored data and data exchange functions,
you can rely on 24 hours a day and seven days a week keeping this promise for customers requires
innovative high performance data centers to employ the highest quality standards for components
and technology and that applies no less to fire protection so that physical component couldn’t give
harm to data centre, as we take an example, in the former strong rooms of the house and central
bank offers a security level outstanding in Europe the allowable 30.8 boom. Days gone by the German
state of Hesse installed its gold and currency reserves here, today it is a high security data center the
building hours protection that the highest possible now your partner for fire protection. Continuously
taking of sampling the high sensitivity and system detects the minutest smoke particles. Even in the
early paradoxes phase the first stage the pre-alarm turns off the ventilation system. The room under
threat will no longer poses a risk for other areas this gives time for determining the cause of the fire
and for taking countermeasures. If the smoke thickens points type smoke detectors trigger the fire
alarm, the fire detection control panel activates the automatic extinguishing system for the area and
fire extinguishing gas nitrogen displaces the oxygen and quickly and efficiently chokes the fire as
nitrogen is non-conducting no short circuits or chemical reactions occur and the hard-wares devices
will remain remains unaffected. at the start of the extinguishing process the pressure in the room
roses briefly, no expensive pressure relief measures are necessary in the building. Our fire extinction
will be performing work as with a soft flooding variant. Here that gas flow regulators on the
pressurized nitrogen cylinders release the extinguishing gas at controlled pressure. The even flow will
permits the use of smaller dimensions pipe networks and reduces the pressure relief surfaces thus
saving costs and increasing safety hazardous vibrations. Rapid outflow of nitrogen from the nozzle
causes sound pressure of over 130 decibels. Our silent sound suppressor will be reduces the sound
pressure level by up to 39 decibels this will makes us the data centre best to be protected from any
kind of fire,and even this solution will protect hard disks and other noise sensitive components.

Examples of Threats & Attacks: There are few examples which applies to the different categories of
computer and network security assets.

DDOS Attack: Denial of service attack (DDOS) attack take control of resources of system or to destroy
them by sending unlimited packets to the network, when the service request are generated by DDOS
attack, it make application stop to perform its action which is current in work. Sometimes denial of
service attack used to get control on resources of system like over-controlling on it through like
gaining accesses to the system, the launching mechanism of DDOS attack is compiled by largest
amount of machines which generate unlimited number of requests then the system get infected by
the requests, meanwhile attacks get all control over system. This attack come into the both assets,
either its computer or network system.

Ping of death attack: A ping of death attack used to block the IP of victim’s targeted system. In this
attack, hackers makes fragmentation of IP packets, once the victim’s targets system get packets
reassembling, so the victim can face those kind of crashes in system or buffer overflow attack. This
attack could be prevent using firewall of OS will be checking each fragmentation for maximum size of
packet related to IP.

Spear Phishing Attack: As we already know that the phishing attack a mechanism of hacking which
used trusted factor to take the trust of victim and target it, like through this mechanism email system
could be use, like we can send email to victim and it will be looking like the mail arrived from
authentic resource but it wouldn’t be authentic, it would be re-planned process by the hackers, so
when you put the information as the instruction would be given in mail you’ll follow, you’ll be facing
threat that time.as spear phishing is also same same as phishing, but in this method hackers generate
a message through sms spoofing he’ll send you message on your cell phone, and the instructions in
the message would be given as you’ve received it from authorized person or corporation, so you’ll be
givig information as they asked, so you could be a victim of this attack. Basically these type of phishing
attack difficult to identify.

Malware attack: Malware Attack kind of a virus attack, like the software is installed automatically on
your system without your consent even you’re having consent to that specific application, it could be
install within that application it would be attach and you won’t even know that payload was attached
to that specific application. For example, if you have computer system or mobile device, you need an
application that you really need to use, first thing what you’d do, you’ll find it on Internet using
google, but when you’ll download that application from unauthorized website, it could be attack by
hacker as the attacker want to generate payload on your system, basically a payload is like a virus,
once it’s generated on your system it give all of the information or data to the attacker, and attacker
can perform any type of event hacker can generate. These type of attacks are very harmful.

There are some type of Malware Viruses Attacks:

File infect-or: File infect-or these type of viruses combined within executable codes are attached, such
we use the extension of EXE files for installing any kind of software. Definitely these kind of viruses get
installed once the code is executed on your system.

System or boot-record infect-or: These kind of viruses are basically attached directed to your memory
or hard disks.whenever you will start the system it be finding any sector boot and then suddenly will
be executing code inside the memory where it can get all the accesses through memory addresses.

Ransomware: A ransomware is a kind of attack which that blocks all the accesses on the targets
victim’s data, and give threats to pay at each execution, if within the time you didn’t pay the money as
its wanted,it will remove all of your data which is residing even on your memory or computer system.
The Physical Security and Network Security are related to what kind of security we must perform
while both of these.
The Physical Security: Physical security is combined of hardware, personnel, physicals data devices,
programs and networks wires need to be protected from physical events and circumstances that, if
these kind of data or hardware aren’t protected from physical disaster, that could give big damage
and cause a serious loss of your corporations, organization or business related data. The types comes
in these protection are those disasters which is occured naturally, from terrorism like attack by the
terrorist on the place, burglary, any kind of candalism such as data shouldn’t be stolen by thieves and
From fire protection as we’ve already discussed above.

The Network Security: Basically security of network designed to protect your any kind of network
which residing within organization especially, these activities are protecting, integrity, usability,
reliability and safety of you data/information and network. A very effective and great netowrk
security targets wide range variety of attacks to be stop them from spreading and to get enter on to
your network.

Breaking of Computer At Home: The Person who’s using computer at home connected to the
internet, and using isn't safe, because its visits several kind of websites at the same time,even the
person who’s visiting doesn’t know what’s malicious inside which websites.so he could be victim
through several websites, even can get into the problem, but there are instruction to get prevent
from those attacks, like use of strong firewall, and anti-viruses. Premium one, not a pirated
software.on the other hand, when I’ll be using computer at home, the intruders who also knows as
attackers, hacker or cracker will not be thinking about anything and wouldn’t care about identity that
who you’re. They just want to take full control over computer system which is in use by the person
will become victim of this the reason behind to gain control that he could make chain by launching
attacks to the other several computers system.

When, they becomes successful to take full control over your system either it has strong defending
system, still gives them ability to hide their real location. Like they use proxy chain. Within seconds
their IP changes and jumps from one node to another, so its difficult to identify the attackers. Even if
you’re having computer with minimum features or application like just to mail or playing online latest
games, chatting with friends and family, your system could be a target to the hacker.

Once they targeted and successfully gains access and control to your computer system they able to
watch all kind of actions or events you’re performing, even you’ll never know what kind of hidden
malicious application running inside of your computer and they can change your data as they wants,
give a serious damage to your hard drive through reformatting and attacking via DDOS attack.

You might also like