Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people, just like you, are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
Solved

IT Security

Posted on 2014-02-21
5
304 Views
Last Modified: 2014-09-02
IT security is central to the successful of an information systems in any businesses. Organisations that have many hardware choices, including the type of computers, processing power, memory, network equipments, storage and backup. Understanding the capabilities of hardware and the options available can save companies million of dollars. Discuss why it is also important for users or non-IT professionals to have knowledge of IT security.
0
Comment
Question by:YaYangTeah
5 Comments
 
LVL 50

Expert Comment

by:Don Johnston
ID: 39879165
This sounds like a homework question.
0
 
LVL 35

Expert Comment

by:Kimputer
ID: 39880026
That's because humans are the weakest link in the security chain. To reduce risks on different fields:

- Educating the user on how to use/keep passwords. Complexity/length. Repetition on other platforms (don't use same password on other systems) etc etc.
- Educating the user on surfing behaviour (clicking on popups that look like an antivirus screen) etc
- Educating the user on emailing behaviour (think before clicking on links or attachments, even from strangers, and emails in foreign languages).

When education is proper, the reliance on expensive software (while still needed, it means the hard to catch 0-days and drive by exploits are less of a concern, as the speed of the updates of any security package lags a bit when a new widespread exploit is in the wild, while it's still being analysed by the companies)
0
 
LVL 27

Expert Comment

by:tliotta
ID: 39880044
Can you describe the business problem and business environment around this question? Or if it's an academic question, please identify it as such. The two types of questions require different responses from any participating experts.

Tom
0
 

Author Comment

by:YaYangTeah
ID: 39880072
That is the academy question, I posted it here because I would like to learn more from here ,I know here have many experts, so I can hear from different experts ideas
0
 
LVL 25

Accepted Solution

by:
madunix earned 500 total points
ID: 40251752
Understanding various current threats and can help you to avoid to becoming a victim of Phishing, Pharming, Fraud Emails, Viruses/Trojans, ATM Type Fraud..etc.

Those are some good points for education:
- Use a unique password or PIN and change it regularly. You should never disclose your password or PIN to anyone
- Be very suspicious of any e-mail or phone call received from a business or person that asks for your password, passport number, account or credit card information unless you have initiated the transaction.  
- Maintain different passwords for multiple services
- Always use anti-virus software. Keep anti-virus software up-to-date.
- Ensure that your browser and operating system are up to date and security patches application
..etc.

http://www.bankersedge.com/pdf/pdfs/customer_information_security.pdf
0

Featured Post

PRTG Network Monitor: Intuitive Network Monitoring

Network Monitoring is essential to ensure that computer systems and network devices are running. Use PRTG to monitor LANs, servers, websites, applications and devices, bandwidth, virtual environments, remote systems, IoT, and many more. PRTG is easy to set up & use.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

How to set-up an On Demand, IPSec, Site to SIte, VPN from a Draytek Vigor Router to a Cyberoam UTM Appliance. A concise guide to the settings required on both devices
Examines three attack vectors, specifically, the different types of malware used in malicious attacks, web application attacks, and finally, network based attacks.  Concludes by examining the means of securing and protecting critical systems and inf…
This video shows how to use Hyena, from SystemTools Software, to bulk import 100 user accounts from an external text file. View in 1080p for best video quality.
With Secure Portal Encryption, the recipient is sent a link to their email address directing them to the email laundry delivery page. From there, the recipient will be required to enter a user name and password to enter the page. Once the recipient …

838 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question