Skip to main content

T1 - Issues & Risks

Security considerations and the dangers inherent in extensive reliance on computing for every aspect of life


The reliance on computing for every aspect of life requires systems to be more secure than ever before. Computers are not invulnerable to attacks. All it takes for an attacker to gain access to someone else’s computer is for the attacker to find a hole in the security, like outdated software or backdoors that are usually built into software during the development process.

With computers becoming faster and more powerful, new security algorithms would have to be created to stay ahead of the processing speed and power of new computers.

The attractiveness of systems to criminals & terrorists

Computer systems are attractive to criminals and terrorists around the world due to the massive amounts of data that can be stored and can potentially be accessed without the proper security put in place. This data can be used by criminals to gain access to people's bank accounts and can then possibly be sold onto other criminals.

There are many ways a criminal can gather personal data through a computer system. They can gather personal data through fraudulent practices. Phishing is one of the methods criminals will use to gather personal data and this is done by pretending to be someone else such as, a bank or sometimes a government department, agency or public body. These are very well replicated emails that will give false information to scare the receiver of the email to give out their personal information. The information that these emails ask for will never be asked for by an actual bank or government department, agency or public body.

Blackmail is another method for criminals to gather personal data. With this method, a criminal can hack into the systems of an organisation and hold the information they have already gathered as a hostage. The criminal can threaten to delete or release the information if they are not given what they ask for within a certain amount of time.

Maintaining compatibility with existing internal systems

Updating the internal systems can cause issues with software that have been specifically written for them. The software could not be compatible with the new hardware and will require an update itself or a completely new version.This can cause disruption to the organisation and could potentially cause some serious issues if not planned out accordingly.

Maintaining compatibility with existing external systems

An organisation will update their internal systems with new software to get ahead of other organisations, but doing this means that anybody using a program that requires a connection to those systems will also have to update. If there are users that choose not to update, this means that they could be vulnerable to attacks or may not be able to use that program at all.

Changes in working practices

Bring Your Own Device (BYOD) is an open network that is being setup in many organisations around the world. It allows employees to access the internet and their work on their own mobile devices, without the organisation having to give out a password to each individual employee and risking the security of important data. This allows employees to remotely work and this can improve the amount of work that is being produced.

Increasing complexity of IT systems controlling mission-critical applications

IT systems are becoming increasingly more complex, especially with the itegration of them and now having control of systems such as, banking and finance, electricity generation and transportation. Some of these sysems are in control of mission-critical applications. These are very important systems that if they were to fail, they can affect an organisation so much that the failure could put them out of business, affect a large portion of the population or even cause loss of life.

As an example, mission-critical systems control medical systems, air traffic control and some military systems. These systems have been tested thoroughly to make sure that there are little to no faults within the system and no outside sources are able to affect them. These IT systems are more complex than the average IT system due to the amount of protection that is required for them to keep the applications running with no faults.

Information overload and the difficulty and expense of processing large quantities of data, danger of and consequences of data duplication

.

Difficulty of ensuring complex systems are reliable, fully tested and 'Fail safe'

With mission-critical systems being so complex, it is extremely difficult to ensure that they are always able to withstand an unexpected situation. Tests are extremely detailed to try and combat as many situations as possible. Considering missions-critical systems have to try and deal with real-world situations, it is impossible to test for every single situation.

One method for developers to make sure that a system does not do as much as damage when it fails, is to implement a 'fail safe' feature. This feature is designed to stop the failure from doing any more damage to other systems that are connected.

Comments

Popular posts from this blog

T1 - Emerging Technologies

Internet Of Things The internet of things (IoT) is a new technology that is on the rise and it allows anything that uses a computer to connect and communicate with other things that uses a computer. For example, a mobile phone could connect to certain systems in a home, like the new smart central heating. This can allow someone to turn the heating on before they get home, so they do not have to turn up to a cold home and wait for it to warm up. IoT could be used within an organisation to speed up workflow by connecting devices and having them communicate with each other. Unfortunately, this technology has its disadvantages, just like any other technology. Due to all the things that use a computer can now connect to the internet and communicate with each other, this makes it easier for attackers to hack into and possibly take control of more rather than being isolated to one of those systems. This can be devastating for an organisation because it would make the job of figh...

T1 - Big Data, Data Warehousing & Data Mining

Big Data Characteristics & Features Big data can be analysed and used by organisations to make better decisions and better business strategies. [1] Volume Velocity Variety Storage Processing Key Features Of A Data Warehouse A data warehouse is an environment used to store multiple data from databases for analytical purposes. [2] Subject Orientation De-Normalisation Non-Volatile Historical Data Ad Hoc Queries Planned Queries Data Load Control References SAS - Big Data Talend - What is a Data Warehouse and Why Does It Matter To Your Business?

T2 - Ethical Issues

The Digital Divide With a lot of modern services now adopting the use of the internet, people who have no access to it are at a great disadvantage compared to those who have access. When someone who has never used the internet has to use a device that relies on it, this can cause a lot of confusion and it will be near impossible for that user to use the device. This can mainly be a problem for people living in developing nations where digital technology is near non-existent. This divide can also be seen in developed nations between the rich and the poor and between those who live in the cities and those who live in rural areas. While people in developing nations would have little to no internet access, poor and rural living people in developed nations would have very slow internet access, for some, no access at all. Difficulties Experienced By The Elderly & The Disabled For older and disabled people, it can be a challenge for them to keep up with the rapidly changing...