Page 37 - CITS - Computer Software Application -TT
P. 37
COMPUTER SOFTWARE APPLICATION - CITS
• Security measures can include encryption, access controls, firewalls, intrusion detection systems, antivirus
software, and more.
Cybersecurity: Cybersecurity encompasses a wide range of practices and technologies aimed at safeguarding
computer systems, networks, and data from unauthorized access, attacks, and breaches. This includes firewalls,
intrusion detection systems (IDS), intrusion prevention systems (IPS), antivirus software, and encryption.
Access Control: Access control mechanisms ensure that only authorized users can access specific resources or
areas of a network. This involves user authentication (e.g., passwords, multi-factor authentication), authorization,
and user privilege management.
Data Protection: Data security involves measures to protect sensitive data from theft, corruption, or unauthorized
disclosure. Techniques include data encryption, data masking, and regular data backups.
Security Policies and Compliance: Establishing and enforcing security policies is crucial for maintaining a
secure IT environment. Compliance with industry regulations (e.g., GDPR, HIPAA) and standards (e.g., ISO
27001) is also vital for organizations.
Incident Response: Organizations need plans and procedures for responding to security incidents. This includes
identifying, mitigating, and recovering from security breaches or vulnerabilities.
Monitoring
• Monitoring involves observing and tracking the behaviour, performance, and activities of systems, networks,
processes, or environments.
• It is essential for identifying anomalies, diagnosing issues, and ensuring that everything is functioning as
expected.
• Monitoring tools and techniques can include logging, real-time alerts, dashboards, performance metrics, and
more.
• In IT environments, monitoring helps maintain uptime, optimize resource utilization, and provide insights for
making informed decisions.
Network Monitoring: Network monitoring tools continuously track the performance and availability of network
devices, servers, and services. They provide real-time data and alerts to help IT teams detect and resolve issues
promptly.
Security Monitoring: Security monitoring involves the continuous monitoring of network traffic and system logs
to identify potential security threats and anomalies. Security Information and Event Management (SIEM) systems
are often used for this purpose.
Application Monitoring: Monitoring the performance and availability of applications is crucial for ensuring a
positive user experience. Application monitoring tools track metrics like response times, error rates, and resource
utilization.
Performance Monitoring: Performance monitoring tools help IT teams optimize the performance of their
infrastructure by collecting and analyzing data on system resource usage, latency, and throughput.
Compliance Monitoring: Organizations monitor their systems to ensure they comply with internal policies,
industry regulations, and legal requirements.
Control
• Control refers to the ability to influence, manage, and regulate systems or processes in order to achieve
desired outcomes.
• In the context of security and monitoring, control mechanisms are used to implement changes, enforce
policies, and respond to incidents.
• Controls can be automated or manual and can range from simple actions like user access management to
complex processes like disaster recovery planning.
• Effective controls help maintain system integrity, enforce compliance, and mitigate risk.
24
CITS : IT&ITES - Computer Software Application - Lesson 01-17