BUY-ORIGINAL ESSAYS ONLINE

The importance of informatics for the security of technical systems Research Paper

The importance of informatics for the security of technical systems Research Paper

Advancements in computing technology have made technical system robust and efficient. Technical systems today are interconnected in order to work in synergy via the network. They are managed, controlled and monitored from station with help of the network. Industries are working in an environment, to which what I call “Internet of Technical Systems”. These advancements of technology, which led us to automation and internet of systems, also introduced rather crucial challenge of Security. In the halcyon times, the concerns for the Security of the Systems were limited to technical failure, human error, making physical attributes intact and isolation from the hazardous environment. With the advancement in communication technology and automation, the role of Informatics in development, monitoring and security have enhanced significantly. Use of SCADA and networking of Technical Systems have increased risks to a great extent.

WRITE THIS ESSAY FOR ME

Tell us about your assignment and we will find the best writer for your paper.

Get Help Now!

Technical Systems in the current context face direct and indirect security challenges such as virus attacks, access control, operational errors, complexity, interconnectivity and increased exposure. The remedy for all the mentioned issues is Informatics. Viruses, Worms, Trojan Horses etc are threats to each system being used anywhere on this Globe. All these threats have one thing in common; they are made of line of codes. Use of Informatics is the only way; we can secure our systems from various threats. The technical systems are ubiquitous and are vital to any industry. Attack on the system can cost millions to an industry or a company.

The most recent example of an attack on the Technical System is the Sony Pictures Entertainment Hack. This attack rocked the company and the world. It proved to be an eye opener for security of technical systems to many Business Giants. The Sony Hack was a release of confidential data belonging to Sony Pictures Entertainment on November 24, 2014. People responsible for this attack claimed to have taken over 100 Terabytes of data from Sony. The hackers also implanted a Wiper on Sony’s infrastructure, malware software designed to erase data from servers.  Another attack which drew attention of the world, was a worm attack known as “Stuxnet” which reportedly attacked the industrial control system in Iran in 2010. Technical systems around the world possess intensifying threats of such attacks.

Informatics can play vital role in minimizing the chances of such attacks and mitigate the effects of such attacks on systems by developing security mechanisms encompassing concepts of network security, security of automation code, access control and human-computer interaction control. Research and development in informatics are being done for more robust and secure Firewalls, vulnerability scanners, automated antimalware software and advanced access control methods.  The algorithms used in development of the new cutting edge security mechanisms still comply with basic Computer Security Standards, namely Confidentiality, Integrity and Availability. Database is vital and core to any system. Thus, more secure and impenetrable Database tools are being developed which will enhance the security of the Database system along with improving efficiency and performance of Database Tools.

Virtual Private Network (VPN) has gained popularity among the business and industrial community in recent years for secure communication with their offices in different countries. A VPN extends a private network across a public network and enables devices to share data across the public network as if they are connected to the private network. VPNs can be improved by introducing advanced cryptographic methods and making provision for Intrusion Detection Devices to make Network of Systems secure.

Traditional Firewalls provide security against the external entities accessing entities within organization’s network and resources. Informatics can play an important role in developing layered firewall to maximize the security of Organization’s network without adversely affecting performance of the network. Firewalls can also be developed such that they improve network’s performance and provide better monitoring, automated traffic analysis and additional support against the attacks executed from within organization’s network.

Evolution of informatics has brought us the concept of “Ubiquitous Computing”. With more devices being embedded with Computer Systems and network, the complexity of the system and network has increased. Informatics is the only way; we can make integration of more systems secure and efficient. Informatics shall play vital role in developing systems having quality of “Security by Design”, i.e. system which has been designed from ground up to be secure. Research in the field of network security can help us develop more secure and complex cryptographic techniques because while in the transmission, buttressing data is important for confidentiality, integrity and secure working of a mobile computing device.

Cloud computing is being seen as “miracle” of the Modern Informatics and it’s getting gaining popularity rapidly. Cloud computing relies on sharing of resources to achieve coherence and scalability; having in the foundation the broader concept of converged infrastructure and shared resources. Evolution and proliferation of Cloud has introduced major challenges to the field of informatics in terms of security. Cloud Computing Security involves concepts of identity management, physical and personnel security, availability and privacy. Current cloud system has addressed the issues with security only to a certain degree. Cloud computing is still suffering from major issues like security of data and privacy. Recent Apple iCloud Leak is an example of system’s vulnerabilities. Research and development related to informatics in Cloud Computing is being done to build more secure cloud servers and applications, impenetrable to unauthorized access.

Informatics has made life easier for the manufacturer with automation but it also has made the systems vulnerable to fatal attacks. With countries now implementing Cyber Warfare, security of Technical Systems has become extremely crucial. An attack on System can collapse power grid, disintegrate communication network, steal confidential information, vanish information crucial to national security etc. Prevention is better than cure. That’s why; wakefulness of investing more in Informatics for developing systems with minimal or no vulnerabilities has increased


we can write the assignment for you. Just click the “ORDER NOW” button to place Your Order

Introducing our Online Essay Writing Services Agency, where you can confidently place orders for a wide range of academic assignments. Our reputable homework writing company specializes in crafting essays, term papers, research papers, capstone projects, movie reviews, presentations, annotated bibliographies, reaction papers, research proposals, discussions, and various other assignments. Rest assured, our content is guaranteed to be 100% original, as every piece is meticulously written from scratch. Say goodbye to concerns about plagiarism and trust us to deliver authentic and high-quality work.

WRITE MY ESSAY NOW

PLACE YOUR ORDER