Shortnote
Information Technology (IT) Vulnerability is a noteworthy concern nowadays in all circles of government as well as private sectors. Information Systems Security is one of the biggest challenges faced by almost all the organizations in today’s world. Despite the fact that the majority of the organizations have understood the importance & value of information and the part it plays in the accomplishment of the business, yet just a couple take satisfactory measures in guaranteeing the security of their data or information, preventing unapproved access, securing information from interruption and unapproved revelations and so on. The effect any business is going to endure, in the event that any of the IT systems is bargained or goes down, is incredible; consequently guaranteeing soundness and security of these data framework is of vital significance to these organizations.
IT threats are multilayered which include a variety of components such as computer systems, networks, operating systems, wireless technologies, the Intranet, the Internet, software applications, etc. In a broader perspective, threats of IT may be classified into several classes or groups. Yeh and Chang (2007) grouped IT threats into seven categories: hardware, software, data, network, physical, personnel & administration. The degree of the threats to these distinctive layers has impelled uplifted thoughtfulness concerning the matter of IT security in recent years (Whitman, 2003). Only just having a complete IT security strategic plan is not sufficient; it must be completely executed. In this manner, establishing the missing link between the knowledge of a strategic plan & its implementation is imperative for the accomplishment of IT security administration as security must be a top most component of any strategic information systems plan.
References:
Yeh, Q., & Chang, A.J. (2007). Threats and countermeasures for information system security: A cross-industry study. Information & Management, 44, 480-491
Whitman, M. E. (2003). Enemy at the gate: Threat to information security. Communications of the ACM, 46(8), 91-95
https://bcognizance.iiita.ac.in/archive/nov-15/?p=145IT-VulnerabilityUtkarsh Raj
Ph.D. Scholar
IIIT-Allahabad