Page 37 - CITS - Computer Software Application -TT
P. 37

COMPUTER SOFTWARE APPLICATION - CITS




           •  Security measures can include encryption, access controls, firewalls, intrusion detection systems, antivirus
              software, and more.
           Cybersecurity: Cybersecurity encompasses a wide range of practices and technologies aimed at safeguarding
           computer systems, networks, and data from unauthorized access, attacks, and breaches. This includes firewalls,
           intrusion detection systems (IDS), intrusion prevention systems (IPS), antivirus software, and encryption.
           Access Control: Access control mechanisms ensure that only authorized users can access specific resources or
           areas of a network. This involves user authentication (e.g., passwords, multi-factor authentication), authorization,
           and user privilege management.
           Data Protection: Data security involves measures to protect sensitive data from theft, corruption, or unauthorized
           disclosure. Techniques include data encryption, data masking, and regular data backups.
           Security Policies  and  Compliance:  Establishing  and  enforcing  security  policies  is  crucial  for  maintaining  a
           secure  IT  environment.  Compliance  with  industry  regulations  (e.g.,  GDPR,  HIPAA)  and  standards  (e.g.,  ISO
           27001) is also vital for organizations.

           Incident Response: Organizations need plans and procedures for responding to security incidents. This includes
           identifying, mitigating, and recovering from security breaches or vulnerabilities.
           Monitoring
           •  Monitoring involves observing and tracking the behaviour, performance, and activities of systems, networks,
              processes, or environments.
           •  It is  essential  for  identifying  anomalies,  diagnosing  issues,  and  ensuring  that  everything  is  functioning  as
              expected.
           •  Monitoring tools and techniques can include logging, real-time alerts, dashboards, performance metrics, and
              more.
           •  In IT environments, monitoring helps maintain uptime, optimize resource utilization, and provide insights for
              making informed decisions.
           Network Monitoring: Network monitoring tools continuously track the performance and availability of network
           devices, servers, and services. They provide real-time data and alerts to help IT teams detect and resolve issues
           promptly.
           Security Monitoring: Security monitoring involves the continuous monitoring of network traffic and system logs
           to identify potential security threats and anomalies. Security Information and Event Management (SIEM) systems
           are often used for this purpose.

           Application Monitoring: Monitoring the performance and availability of applications is crucial for ensuring a
           positive user experience. Application monitoring tools track metrics like response times, error rates, and resource
           utilization.
           Performance  Monitoring:  Performance  monitoring  tools  help  IT  teams  optimize  the  performance  of  their
           infrastructure by collecting and analyzing data on system resource usage, latency, and throughput.

           Compliance Monitoring:  Organizations  monitor  their  systems  to  ensure  they  comply  with  internal  policies,
           industry regulations, and legal requirements.
           Control

           •  Control refers to the ability to influence, manage, and regulate systems or processes in order to achieve
              desired outcomes.
           •    In  the  context  of  security  and  monitoring,  control  mechanisms  are  used  to  implement  changes,  enforce
              policies, and respond to incidents.
           •  Controls can be automated or manual and can range from simple actions like user access management to
              complex processes like disaster recovery planning.

           •  Effective controls help maintain system integrity, enforce compliance, and mitigate risk.






                                                           24

                              CITS : IT&ITES - Computer Software Application - Lesson 01-17
   32   33   34   35   36   37   38   39   40   41   42