0% found this document useful (0 votes)
43 views

Research Paper Title: Security Issues and Challenges in Ict

This research paper aims to analyze security issues and challenges in information and communication technologies (ICT). It discusses how ICT systems are vulnerable to threats that exploit design flaws and malfunctions. In response, governments adopted security standards and frameworks like ISO 27000 and ITIL to unify operations and control risks. The paper seeks to examine common ICT threats, security objectives, management aspects, and frameworks to help maintain security and adapt to emerging trends.

Uploaded by

058 Pooja M
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
43 views

Research Paper Title: Security Issues and Challenges in Ict

This research paper aims to analyze security issues and challenges in information and communication technologies (ICT). It discusses how ICT systems are vulnerable to threats that exploit design flaws and malfunctions. In response, governments adopted security standards and frameworks like ISO 27000 and ITIL to unify operations and control risks. The paper seeks to examine common ICT threats, security objectives, management aspects, and frameworks to help maintain security and adapt to emerging trends.

Uploaded by

058 Pooja M
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 2

RESEARCH PAPER

TITLE: SECURITY ISSUES AND CHALLENGES IN ICT

ABSTRACT:
Security threats are one of the most common problems organizations face in this era. All
systems that rely on information and communication technologies (ICT) are vulnerable to
design flaws, malfunctions, and vulnerabilities that malicious software and agents exploit.
When security flaws were first discovered, the priority was to implement appropriate ICT
controls to safeguard linked company assets. However, following several data breaches,
governments throughout the globe were driven to adopt a sort of uniformity. Security
standards and rules such as the International Organization for Standardization (ISO) 27000
series, the Information Technology Infrastructure Library (ITIL), and the Common Criteria
evolved to unify operational operations and control the business environment.
This paper aims to analyze different threats faced by ICT and the methods, general security
objectives, aspects of security management, and framework that help maintain security and
adapt smoothly to emerging trends.

KEYWORDS: Definitions
ICT:
Information and Communications Technology or ICT refers to technology that will store,
retrieve, manipulate, transmit or receive information electronically or in a digital form. It
includes hardware, communications devices, or applications. ICT security is the ability to
protect the Confidentiality, Integrity, and Availability of an organization's digital information
assets.
CYBERSECURITY:
Cybersecurity is the practice of protecting systems, networks, and programs from digital
attacks. These cyberattacks are usually aimed at accessing, changing, or destroying sensitive
information, extorting money from users, or interrupting normal business processes.

RISK MANAGEMENT:
Risk Management is the identification, assessment, and prioritization of risks followed by
coordinated and economical application of resources to minimize, monitor, and control
unfortunate events' probability and impact.

THE ICT STRATEGIC FRAMEWORK:


The ICT Strategic Framework identifies the critical elements for practical information and
technology management to ensure that corporate information and ICT systems are secure,
protected, tested, controlled, developed, and maintained according to corporate objectives and
respond to emerging trends.
RANSOMWARE:
Ransomware is malware that employs encryption to hold a victim's information at
ransom. A user or organization's critical data is encrypted to not access files, databases, or
applications. A ransom is then demanded to provide access.
SUPPLY CHAIN ATTACKS:
The supply chain for the IT market is complex, involving hardware and software and the
humans and their organizations that manage the design, production, shipping, installation,
and maintenance of products and services. The long and complex global supply chain
presents a wide range of opportunities to insert malicious tools, and it is exponentially more
difficult in interconnected, nested Internet of Things (IoT) systems.

RESEARCH OBJECTIVES:
 To analyze the security risk factors, consisting of threats and vulnerabilities
 General security objectives for ICT networks
 Why are frameworks important?
 Explaining ICT Architecture and Frameworks

Outline:
 Introduction
 What are the threats faced by telecoms?
 How to minimize these threats?
 ICT Frameworks
 The future of ICT security standardization
 Use cases

You might also like