Application security is the topic I intend to cover. It is the use of software, hardware and procedural methods to protect applications from external threats. Security is becoming an increasingly essential concern during development since applications frequently become accessible over networks and are therefore vulnerable to a variety of attacks. Security measures must be built into applications and a secure application security routine to minimize the possibility that unauthorized code can manipulate the system to access, steal, modify, or delete the sensitive data. If a security breach occurs in an organization, it causes great harm to the company and can even incur a lot of cost including reputational damage. Resolving the issue of security breach requires proper installation of security measures which might cost the business or company additional cost such as buying software or updating the existing ones. Organizational data should be protected from accidental or intentional disclosure to unauthorized person or unauthorized modification. This research will be aimed at explaining the different types of information system attacks on our systems, what makes individuals or organizations vulnerable, and the prevention measures that can be taken to help minimize the attacks and their impacts on their functioning and reputational image when such incidences occur.
Review of Literature
Easttom, Chuck (2016) Computer Security Fundamentals. Upper Saddle River, NJ: Pearson Prentice Hall.
This book provides an overview of various computer security topics. It talks about cybercrime and security includingterminologies,legal issues, security resources, and different types of threats. Other chapters in the book address issues such as internet fraud, malware, cyber-crime, cyber terrorism, industrial espionage, information security, and information warfare, as well as security software and hardware. This book is a relevant source to my topic of application security because it is a peer-reviewed article that contains valuable information about educational opportunities, sample security documents, and security resources. From the article, I learned so many things on how to improve the security of information systems.
Erbschloe, Michael(2015) Trojans, Worms, and Spyware: A Computer Security Professional’s Guide to Malicious Code. Boston: Elsevier ButterworthHeinemann.
This is a professional guide into the details of malicious code like prevention and protection, response to incidents, and as well as the potential future malicious attacks. At the same time, it covers historical information including famous cyber incidents. This is a reliable source because it contains a valuable list of security resources. Covering recent trends in information security, the author includes digital certificates, privacy on the semantic web, authentication, confidentiality, authorization frameworks,digital rights management, and cryptography.This book is relevant to my topic because it defines various concepts in information security. It would, therefore, help me develop an in-depth insight into the idea of the information security system and covers areas such as operating systemtools, firewalls, encryption tools, and talks about aspects of intrusion detection like ways of avoiding attacks and alerts when data breach attacks occur.
Discussion
Information security is a concept that has attracted serious attention in the recent past due to the increased advancement in technology. The sources mentioned above are critical for this research because information security, notably data breach, is a broad topic that requires much research from different sources to help bring my research into conclusion. Numerous cases of cyber-attacks have been reported in the recent past. This calls for updating security measures because as organizations improve their information systems, the attackers are also adjusting their tactics. Each of the sources above is, and they will help get in-depth information on the topic of information security and cyber-attacks. The sources above, however, do not talk about how to handle a security breach when it occurs and results in massive damage to itsoperations and reputation.
Conclusion
Based on the information gained from my sources, it is no doubt that different information security attacks occur in various organizations today. The sources I have used describes the different attacks that most organizations face, how they can be handled and the impacts they can bring to an organization. Therefore, it is essential for organizations to take relevant security measuresto prevent such cyber-attacksbecause their effects can be tremendously daunting.
References
Easttom, Chuck (2016) Computer Security Fundamentals. Upper Saddle River, NJ: Pearson Prentice Hall.
Erbschloe, Michael (2015) Trojans, Worms, and Spyware: A Computer Security Professional’s Guide to Malicious Code. Boston: Elsevier Butterworth Heinemann.
Do you need high quality Custom Essay Writing Services?