Information Security

Sometimes referred to as computer security, information technology security (IT security) is information security applied to technology (most often some form of computer system). It is worthwhile to note that a computer does not necessarily mean a home desktop. A computer is any device with a processor and some memory. Such devices can range from non-networked standalone devices as simple as calculators, to networked mobile computing devices such as smartphones and tablet computers. IT security specialists are almost always found in any major enterprise/establishment due to the nature and value of the data within larger businesses. They are responsible for keeping all of the technology within the company secure from malicious cyber attacks that often attempt to breach into critical private information or gain control of the internal systems.

Threat

Information security threats come in many different forms. Some of the most common threats today are software attacks, theft of intellectual property, identity theft, theft of equipment or information, sabotage, and information extortion. Most people have experienced software attacks of some sort. Viruses, worms, phishing attacks, and Trojan horses are a few common examples of software attacks. The theft of intellectual property has also been an extensive issue for many businesses in the IT field. Identity theft is the attempt to act as someone else usually to obtain that person’s personal information or to take advantage of their access to vital information. Theft of equipment or information is becoming more prevalent today due to the fact that most devices today are mobile. Cell phones are prone to theft and have also become far more desirable as the amount of data capacity increases. Sabotage usually consists of the destruction of an organization′s website in an attempt to cause loss of confidence on the part of its customers. Information extortion consists of theft of a company′s property or information as an attempt to receive a payment in exchange for returning the information or property back to its owner, as with ransomware. There are many ways to help protect yourself from some of these attacks but one of the most functional precautions is user carefulness.

Governments, military, corporations, financial institutions, hospitals and private businesses amass a great deal of confidential information about their employees, customers, products, research and financial status. Most of this information is now collected, processed and stored on electronic computers and transmitted across networks to other computers.

Barry Tuckwood

Barry Tuckwood

Management Consultant and Chartered Engineer: Strategy, Change, and Project Success.

Barry Tuckwood Associates, University of Strathclyde, United Kingdom

Bharathi Vasanthakrishna

Bharathi Vasanthakrishna

Women Entrepreneur @ Kornerstone Analytics PVT LTD

Madras Christian College Chennai Area, India

Charles Critchley

Charles Critchley

Director at Acuity Group Ltd

Colchester Institute London, United Kingdom

Darren Mundy

Darren Mundy

Associate Dean (Education) in FACE at University of Hull

Scarborough, North Yorkshire, United Kingdom

David Hunt

David Hunt

Director at DCH Technology Services

Enterprise Blueprints, Aston University London, United Kingdom

Fred Long

Fred Long

Senior Lecturer Department of Computer Science

Aberystwyth University

Paul Nielsen

Paul Nielsen

Director at Software Engineering Institute

Software Engineering Institute University of California

Suzanne (Suzanne Fribbins) Bonnamy

Suzanne (Suzanne Fribbins) Bonnamy

Global Products Manager (Leadership Accelerators) at Korn Ferry Hay Group

Edith Cowan University London, United Kingdom

Timothy Wansbrough

Timothy Wansbrough

Head of Cyber Security Sales Northern Europe

Warwick University London, United Kingdom