Open Access
Vulnerability in Information Technology and Computing- A Study in Technological Information Assurance
Author(s) -
Prantosh Paul,
A. Bhuimali,
P. S. Aithal,
R. Rajesh
Publication year - 2019
Publication title -
international journal of management, technology, and social science
Language(s) - English
Resource type - Journals
ISSN - 2581-6012
DOI - 10.47992/ijmts.2581.6012.0074
Subject(s) - information assurance , computer security , computer science , information security , firewall (physics) , software security assurance , secrecy , information security management , information security standards , information system , security service , information technology , security information and event management , cloud computing security , network security policy , business , engineering , cloud computing , accretion (finance) , schwarzschild radius , finance , charged black hole , operating system , electrical engineering
Information Assurance is the prime name for the security and privacy related affairs. It isresponsible for the secure design, development and building of healthy sophisticated information systems. The technologies have become crucial for the development of content and information systems. Information Assurance is a new name in respect of Computing and IT Security; however, it has important significance as the area deals with both traditional and technological security related affairs. The IT Security primarily responsible for the computational secure systems whereas Information Assurance focuses not only on the design and development of secure systems but also policies, framework and regulations leading to secure information systems preparation. Among the technological space few common names are include vulnerabilities, virus, denial of services etc. Moreover, the vulnerabilities include the affairs of hardware, software, network, personal and physical site, organizational security systems etc. This paper talks about the basics of Information Assurance and allied affairs. Moreover, it talks about the vulnerabilities and affairs leading to computer access control, application security, authentication, authorization, aspects of data centric security, encryption, firewall etc. The paper also highlights the basic overview of the technologies and solution as well.