SlideShare a Scribd company logo
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 06 Issue: 11 | Nov 2019 www.irjet.net p-ISSN: 2395-0072
© 2019, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 3594
A Review of Information Systems Security: Types, Security Issues, and
Main Systems Affected
Jean Claude MUNYANEZA1, Felix NSENGIYUMVA2, Papias NIYIGENA3
1,2,3Department of information systems, University of lay Adventists of Kigali, Master’s Program
---------------------------------------------------------------------***----------------------------------------------------------------------
Abstract - This paper discusses the different issues
pertaining to security of information systems. First, the
different types of information security are discussedsuchas
network security and endpoint security. Additionally, the
other important aspect of information systems security that
is discussed is the different threats to information security.
These are also the security issues, and they include, viruses
and other malicious programs, phishing, as well as denial of
service. Alongside the discussion of the different security
issues, some solutions for the issuesarealsomentionedwith
techniques on how such issues can be avoided when
possible. Lastly, the paper also covers the different systems
that are at highest risk of security issues. These systems
include the ones used in financial systems, the aviation
industry, as well as consumer systems. The paper uses a
research methodology to outline the manner in which data
on information systems security is obtained.
Key Words: Systems, industry, information security,
business,
1. INTRODUCTION
Information technology security, sometimes known as
computer security, refers to protecting computer systems
and information from any damage, stealing, and illicit use.
This security can be done to the computer hardware,
software, or any other component of the computer system
(Peltier, 2016). The protection of computer hardware
against security breaches is done throughthesamemethods
that are utilized to guard other precious and sensitive
apparatus such as doors and locks, serial numbers, and
alarms. On the other hand, information and system access
are protected through the use of tactics. This protection
prevents any physical access or cybercrime, whichisdonein
different ways.
2. Literature Review
2.1 Types of Information Security
Network Security is a type of security used in preventing
unauthorized and malicious users fromaccessinga network.
This security ensures that there is no compromise on
reliability, usability, and integrity of the network. It is
important to maintain network security as it helps in
preventing hackers from accessing data from a network
(Peltier, 2016). Additionally, it is also important as it
prevents hackers from having any negative effects on the
ability of users in their access and use of a network. It is
increasingly difficult to ensure network security in
businesses as they raise the number of endpoints and carry
out a migration of services to the public cloud. The other
type of information security is internet security. This
security involves protecting information that is transmitted
and received through the use of browsers and network
security that involves the use of applications that are based
on the web. Additionally, this type of protection is designed
to monitor the internet traffic that is incomingto ensurethat
malware and other unwanted traffic does not get to the
system (Ahson & Ilyas, 2008). Such protection for internet
security is done using different methods such as
antimalware, firewalls, and antispyware.
The other common type of information technology security
is endpoint security. This security ensures that there is the
provision of protection at all the different levels of devices.
Examples of devices that can be secured using this security
are tablets, laptops, cell phones, and desktop computers.
Endpoint security helps in preventing these devices from
having any access to malicious networks, whichcanresultin
a threat to the organization (Peltier, 2016). Endpoint
security instances include advance malware protection and
software for device management. The other type of internet
security is cloud security. This security covers information
technology aspects such as data, applications, and identities
that move to the cloud. This movement means that users
connect directly to the internet, but they do not have the
protection of tradition security procedures. Cloud security
aids in securing the use of applications such as software-as-
a-service (SaaS) and the public cloud (Stallings et al., 2012).
Finally, there is application security, where the coding of
applications is done in a manner that they are quite secure
and ensure that their vulnerability to attacks is limited. The
addition of this layer to security entails the evaluation of a
code of an application and the identification of
vulnerabilities that exist within the software programs.
2.2 Security Issues in Information Security
Viruses and Malicious Programs
First, there is the aspect of viruses and malicious programs.
Through this increased use of the internet, it likewise poses
more risks to the computer network of a business as there
are more malicious programs that can affect it. A computer
virus refers to a computer code that is inserted into another
computer program,butit remainsdormantuntil themoment
that a user triggers it without suspecting. Such triggers can
be quite simple such as opening an attachment of a file and
downloading an internet file. Viruses are sometimes quite
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 06 Issue: 11 | Nov 2019 www.irjet.net p-ISSN: 2395-0072
© 2019, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 3595
dangerous as they can end up deleting important data files
(Peltier, 2016). As a result, most people and organizations
use anti-virus software throughouttheirnetworks,butitstill
becomes difficult to cope with the ever-increasing number
and sophistication of virus programs. There are different
motives that software creators have when they develop
viruses, for example, seeking profit through a ransom.
Additionally, others are also interested in sendingparticular
messages such as a political message. There is also the
reason for demonstrating that there is a vulnerability that
exists in software. Lastly,somehackersaresimplyinterested
in exploring cyber-security issues (Stallings et al., 2012).
Such malicious programs and virus often have catastrophic
effects as they can end up destroying the entirenetwork that
a person or a company operates and electronic recordsheld.
Phishing
This is also one of the most prevalent cyber-attacks and it
refers to when a scammer uses deceitful texts, emails, or
impersonator websites with the intention of getting other
users to share their important personal information, for
example, accountnumbers,loginidentificationdetails,social
security numbers, and passwords (Stallings et al., 2012).
After sharing this information, scammers normally use it to
steal money from people, their identity, or even both money
and identity. The use of phishing emails byscammerstogain
access to a computer network from where they then install
programs, for example, ransomware. These programs are
used to lock a person from accessing important files in their
computer system.Additionally,phishingscammersluretheir
target personalities such that they make them feel that they
have a fake logic of protection through the spoofing of
trusted and well-known logos of well-known and valid
companies or even pretending to be relatives. These
cybercriminals also make things seem as if they need to use
the information of a target swiftly or else something bad is
likely to happen to them, for example, they give out
information that a bank account can be frozen and a tax
refund will not be possible, among other reasons (Peltier,
2016). The different lies that they use are meant to enable
them to solicit information from their targets.
For people to ensure that they are protected personally and
for their companies against such malice, the United States
Federal Trade Commission recommends several
precautions. First, people should be secure regarding the
attachments that they open and clicking links in their emails
(Peltier, 2016). If wrong files or links are clicked, they may
contain malware that can end up weakening the security of
the computer system. The otherimportantprecautionisthat
people should get used to the use of two-factor
authentication. For the different accounts that bear this
security measure, it requires a password and other pieces of
information that are needed before gaining access to an
account. For example, the second part of the information
may comprise a code that is sent to a phone or a random
number that is often generated, which helps to protect the
account even when a password may have been
compromised. The other important measure that is given is
that people should ensure that they maintain a backup of
records in an exterior hard drive or in other times cloud
storage (Von Solms & Van Niekerk, 2013). Such a backup
should be done regularly to ensure that there is maximum
protection against malware programs, viruses, or even
ransomware attack. Additionally, the U.S. federal trade
commission maintainsthatsecurityshouldbemaintainedup
to date. In this regard, computer systems should be
protected using software that is trusted and ensure that it is
updated automatically.
Denial of Service
The other method that cybercriminals use to compromise
computer security is a denial of service (DoS) attacks. This
kind of attack occurs when the lawful people that use a
computer system are not able to access to their information
systems, devices, and other network resources as a result of
the actions of a malicious actor of a cyber-threat.Suchactors
affect services such as websites, emails, onlineaccounts,and
other services that rely on the computer system or network
that is affected (Ahson & Ilyas, 2008). This kind of cyber
threat is often accomplished through the floodingofthehost
network with traffic to ensure that the target is not able to
respond or experiences a crash that prohibits legitimate
users to access the information technology systems. For
example, in the year 2012, six banks in the United States
were the target of a different denial of service attacks. These
victims were big banks in the United States, such as the JP
Morgan Chase, PNC Bank, and the Bank of America.
3. Research Methodology
The research methodology employed two approaches:
experiments as well as surveys.
Experiments
The purpose of the tests carried out using experiments was
to find out the vulnerabilities that put information systems
at risk through a verification of corporate application
systems and how they are exposed to security
vulnerabilities. The different methods that are used include
social engineering, SQL injection, as well as brute force
attack. On social engineering, attemptsto penetrate aredone
on employees to test whether they do follow all security
policies and standards. A phishing attack is used to evaluate
the accuracy of policies and measurements that people
follow. Secondly, SQL injection is an error based injection
attack string that is done to evaluate whether the corporate
web application is vulnerable to different kinds of attacks.
Two different criteria areusedindetectionofvulnerabilities.
The first one is for the web application to allow query
execution from different url. Secondly, the web application
should show errors for queries. Thirdly, there is brute force
attack that helps to reveal human factors that makedata and
information systems vulnerable to attacks.
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 06 Issue: 11 | Nov 2019 www.irjet.net p-ISSN: 2395-0072
© 2019, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 3596
Surveys
First, surveys entail the use of a smoke-screenapproachasit
is more effective in capturing the security awareness of
respondents if they lack awareness of their assessment. The
survey utilizes seven scenarios where two of them are
general ones and are employed as a diversion from the main
subject. Secondly, interviews are alsousedinsurveys, where
ten professionals of informationtechnologyareinterviewed.
They are used to give their views regarding the issue of
security on information systems.
4. Results and Discussion
There is rapid growth in the number of computer systemsin
different industries globally. In this regard, the different
types of institutions and individuals that rely on computer
systems include businesses, government institutions,
industries, and individual people. In this regard, oneofthese
groups whose systems are at risk is financial systems as the
information technology systems that they use are often
prominent targets for hackers andcybercriminals.Examples
of financial institutions systems that are under this threat
are the ones used by the United States Securities and
Exchange Commission, investment banks, SWIFT, and
commercial banks (Mo et al., 2011). The cybercriminals are
often interested in manipulating their financial markets and
make illicit gains from them. Other similar institutions
whose systems are at risk for the same reasons are
brokerage accounts and websites that hold information
regarding bank accounts and credit card numbers.
Additionally, the aviation industry is another target market
for cybercriminals. This industry heavily relies on complex
systems that could be attacked and compromised by cyber
threats, for example, a single power outage in an airport
causes multiple repercussions globally as most systems use
radio transmissions that can be disrupted badly. In such a
case, the control of aircraft as they traverse oceans is
dangerous as the surveillance of radar systems only goes up
to 175 and 225 miles offshore (Ahson & Ilyas, 2008). The
other main targets are devices that are used by consumers.
These devices includedesktopcomputersandlaptops.These
devices are used in gathering passwords regarding the
financial information of users and use them to come up with
botnets for attacking other targets. Different devicessuchas
tablets, smartphones, mobile devices, and mobile devices
have sensors such as compasses, cameras,andGPSreceivers
that can be exploited for security thus used for collecting
sensitive information from users. The increase in the
number of automated home devices, for example, the Nest
thermostat, increases thechancesofconsumerdevices being
targets of cybercriminals.
Conclusion
The protection against cybercrime or physical access to
information security systems are important to ensure that
information is not compromised. Variable types of
information security exist, and they include network
security, internet security, endpoint security, and cloud
security. In these information security types, multiple
security issues exist. However, the main security issues are
three. These include malicious programs and viruses,
phishing, and denial of service. For example, six banks were
the target of different instances of denial ofserviceattacksin
the United States in 2012. Lastly,therearemainsystemsthat
are at the highest risk of cyber threats, and they include
financial institutions and consumer devices.

More Related Content

PDF
Fundamentals of information systems security ( pdf drive ) chapter 1
PPTX
Session#7; securing information systems
PPT
Securing information systems
PPT
386sum08ch8
PDF
OverseeCyberSecurityAsHackersSeekToInfiltrate
PDF
Security Solutions against Computer Networks Threats
PDF
Cyber Security
PPTX
Risks and Security of Internet and System
Fundamentals of information systems security ( pdf drive ) chapter 1
Session#7; securing information systems
Securing information systems
386sum08ch8
OverseeCyberSecurityAsHackersSeekToInfiltrate
Security Solutions against Computer Networks Threats
Cyber Security
Risks and Security of Internet and System

What's hot (20)

PPT
Information security and Attacks
PPT
Information security in todays world
PDF
Comparative Study on Intrusion Detection Systems for Smartphones
PDF
Analytical survey of active intrusion detection techniques in mobile ad hoc n...
PDF
IRJET- Security from Threats of Computer System
PDF
An Overview of Intrusion Detection and Prevention Systems (IDPS) and Security...
PDF
An Overview of Intrusion Detection and Prevention Systems (IDPS) and security...
PPT
Information security.pptx
PDF
Report: Study and Implementation of Advance Intrusion Detection and Preventio...
PPT
Security Incidents
PDF
10 security problems unique to it
PPT
Giving The Heave Ho To Worms, Spyware, And Bots!
PDF
A Collaborative Intrusion Detection System for Cloud Computing
PDF
Network monitoring white paper
PDF
Intrusion Detection System (IDS): Anomaly Detection using Outlier Detection A...
DOC
Intrusion detection and anomaly detection system using sequential pattern mining
PPT
Information security
PDF
Whitepaper: BATTLING IT OUT: APPLICATION AND MOBILE SECURITY - Happiest Minds
Information security and Attacks
Information security in todays world
Comparative Study on Intrusion Detection Systems for Smartphones
Analytical survey of active intrusion detection techniques in mobile ad hoc n...
IRJET- Security from Threats of Computer System
An Overview of Intrusion Detection and Prevention Systems (IDPS) and Security...
An Overview of Intrusion Detection and Prevention Systems (IDPS) and security...
Information security.pptx
Report: Study and Implementation of Advance Intrusion Detection and Preventio...
Security Incidents
10 security problems unique to it
Giving The Heave Ho To Worms, Spyware, And Bots!
A Collaborative Intrusion Detection System for Cloud Computing
Network monitoring white paper
Intrusion Detection System (IDS): Anomaly Detection using Outlier Detection A...
Intrusion detection and anomaly detection system using sequential pattern mining
Information security
Whitepaper: BATTLING IT OUT: APPLICATION AND MOBILE SECURITY - Happiest Minds
Ad

Similar to IRJET- A Review of Information Systems Security: Types, Security Issues, and Main Systems Affected (20)

DOCX
Team 3_Final Project.docx
PDF
Type of Security Threats and its Prevention
PDF
Cyber Attacks and Crimes in Cyber Security: A Comparative Analysis
PDF
“In 2024 Guide to Cyber Security: Protect Your Data Today”
PDF
“In 2024 Guide to Cyber Security: Protect Your Data Today”
PPTX
Cyber security
PDF
Information cyber security
PDF
Information & cyber security, Winter training ,bsnl. online
PDF
Lecture 7---Security (1).pdf
PDF
Mis 1
PDF
Edu 03 assingment
PDF
Cyber Security Threats | Cyberroot Risk Advisory
PPTX
Cyber security
PPTX
Chapter-2 (1).pptx
DOCX
So692 cyber security-document
PDF
CYBER SECURITY: A SURVEY ON ISSUES AND SOLUTIONS
DOCX
Cyber crime
KEY
Mis
KEY
Chapter 10, part 1
PPTX
Cyber crime and security
Team 3_Final Project.docx
Type of Security Threats and its Prevention
Cyber Attacks and Crimes in Cyber Security: A Comparative Analysis
“In 2024 Guide to Cyber Security: Protect Your Data Today”
“In 2024 Guide to Cyber Security: Protect Your Data Today”
Cyber security
Information cyber security
Information & cyber security, Winter training ,bsnl. online
Lecture 7---Security (1).pdf
Mis 1
Edu 03 assingment
Cyber Security Threats | Cyberroot Risk Advisory
Cyber security
Chapter-2 (1).pptx
So692 cyber security-document
CYBER SECURITY: A SURVEY ON ISSUES AND SOLUTIONS
Cyber crime
Mis
Chapter 10, part 1
Cyber crime and security
Ad

More from IRJET Journal (20)

PDF
Enhanced heart disease prediction using SKNDGR ensemble Machine Learning Model
PDF
Utilizing Biomedical Waste for Sustainable Brick Manufacturing: A Novel Appro...
PDF
Kiona – A Smart Society Automation Project
PDF
DESIGN AND DEVELOPMENT OF BATTERY THERMAL MANAGEMENT SYSTEM USING PHASE CHANG...
PDF
Invest in Innovation: Empowering Ideas through Blockchain Based Crowdfunding
PDF
SPACE WATCH YOUR REAL-TIME SPACE INFORMATION HUB
PDF
A Review on Influence of Fluid Viscous Damper on The Behaviour of Multi-store...
PDF
Wireless Arduino Control via Mobile: Eliminating the Need for a Dedicated Wir...
PDF
Explainable AI(XAI) using LIME and Disease Detection in Mango Leaf by Transfe...
PDF
BRAIN TUMOUR DETECTION AND CLASSIFICATION
PDF
The Project Manager as an ambassador of the contract. The case of NEC4 ECC co...
PDF
"Enhanced Heat Transfer Performance in Shell and Tube Heat Exchangers: A CFD ...
PDF
Advancements in CFD Analysis of Shell and Tube Heat Exchangers with Nanofluid...
PDF
Breast Cancer Detection using Computer Vision
PDF
Auto-Charging E-Vehicle with its battery Management.
PDF
Analysis of high energy charge particle in the Heliosphere
PDF
A Novel System for Recommending Agricultural Crops Using Machine Learning App...
PDF
Auto-Charging E-Vehicle with its battery Management.
PDF
Analysis of high energy charge particle in the Heliosphere
PDF
Wireless Arduino Control via Mobile: Eliminating the Need for a Dedicated Wir...
Enhanced heart disease prediction using SKNDGR ensemble Machine Learning Model
Utilizing Biomedical Waste for Sustainable Brick Manufacturing: A Novel Appro...
Kiona – A Smart Society Automation Project
DESIGN AND DEVELOPMENT OF BATTERY THERMAL MANAGEMENT SYSTEM USING PHASE CHANG...
Invest in Innovation: Empowering Ideas through Blockchain Based Crowdfunding
SPACE WATCH YOUR REAL-TIME SPACE INFORMATION HUB
A Review on Influence of Fluid Viscous Damper on The Behaviour of Multi-store...
Wireless Arduino Control via Mobile: Eliminating the Need for a Dedicated Wir...
Explainable AI(XAI) using LIME and Disease Detection in Mango Leaf by Transfe...
BRAIN TUMOUR DETECTION AND CLASSIFICATION
The Project Manager as an ambassador of the contract. The case of NEC4 ECC co...
"Enhanced Heat Transfer Performance in Shell and Tube Heat Exchangers: A CFD ...
Advancements in CFD Analysis of Shell and Tube Heat Exchangers with Nanofluid...
Breast Cancer Detection using Computer Vision
Auto-Charging E-Vehicle with its battery Management.
Analysis of high energy charge particle in the Heliosphere
A Novel System for Recommending Agricultural Crops Using Machine Learning App...
Auto-Charging E-Vehicle with its battery Management.
Analysis of high energy charge particle in the Heliosphere
Wireless Arduino Control via Mobile: Eliminating the Need for a Dedicated Wir...

Recently uploaded (20)

PPTX
IOT PPTs Week 10 Lecture Material.pptx of NPTEL Smart Cities contd
PPTX
Strings in CPP - Strings in C++ are sequences of characters used to store and...
PPTX
CYBER-CRIMES AND SECURITY A guide to understanding
PDF
Arduino robotics embedded978-1-4302-3184-4.pdf
PPTX
KTU 2019 -S7-MCN 401 MODULE 2-VINAY.pptx
DOCX
ASol_English-Language-Literature-Set-1-27-02-2023-converted.docx
PDF
July 2025 - Top 10 Read Articles in International Journal of Software Enginee...
PPTX
Welding lecture in detail for understanding
PPTX
MET 305 2019 SCHEME MODULE 2 COMPLETE.pptx
PPTX
FINAL REVIEW FOR COPD DIANOSIS FOR PULMONARY DISEASE.pptx
PDF
BMEC211 - INTRODUCTION TO MECHATRONICS-1.pdf
PDF
PRIZ Academy - 9 Windows Thinking Where to Invest Today to Win Tomorrow.pdf
PPTX
Lesson 3_Tessellation.pptx finite Mathematics
PPTX
CARTOGRAPHY AND GEOINFORMATION VISUALIZATION chapter1 NPTE (2).pptx
PDF
Embodied AI: Ushering in the Next Era of Intelligent Systems
PPTX
Foundation to blockchain - A guide to Blockchain Tech
PDF
PPT on Performance Review to get promotions
PPTX
additive manufacturing of ss316l using mig welding
PDF
The CXO Playbook 2025 – Future-Ready Strategies for C-Suite Leaders Cerebrai...
PPTX
CH1 Production IntroductoryConcepts.pptx
IOT PPTs Week 10 Lecture Material.pptx of NPTEL Smart Cities contd
Strings in CPP - Strings in C++ are sequences of characters used to store and...
CYBER-CRIMES AND SECURITY A guide to understanding
Arduino robotics embedded978-1-4302-3184-4.pdf
KTU 2019 -S7-MCN 401 MODULE 2-VINAY.pptx
ASol_English-Language-Literature-Set-1-27-02-2023-converted.docx
July 2025 - Top 10 Read Articles in International Journal of Software Enginee...
Welding lecture in detail for understanding
MET 305 2019 SCHEME MODULE 2 COMPLETE.pptx
FINAL REVIEW FOR COPD DIANOSIS FOR PULMONARY DISEASE.pptx
BMEC211 - INTRODUCTION TO MECHATRONICS-1.pdf
PRIZ Academy - 9 Windows Thinking Where to Invest Today to Win Tomorrow.pdf
Lesson 3_Tessellation.pptx finite Mathematics
CARTOGRAPHY AND GEOINFORMATION VISUALIZATION chapter1 NPTE (2).pptx
Embodied AI: Ushering in the Next Era of Intelligent Systems
Foundation to blockchain - A guide to Blockchain Tech
PPT on Performance Review to get promotions
additive manufacturing of ss316l using mig welding
The CXO Playbook 2025 – Future-Ready Strategies for C-Suite Leaders Cerebrai...
CH1 Production IntroductoryConcepts.pptx

IRJET- A Review of Information Systems Security: Types, Security Issues, and Main Systems Affected

  • 1. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 11 | Nov 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 3594 A Review of Information Systems Security: Types, Security Issues, and Main Systems Affected Jean Claude MUNYANEZA1, Felix NSENGIYUMVA2, Papias NIYIGENA3 1,2,3Department of information systems, University of lay Adventists of Kigali, Master’s Program ---------------------------------------------------------------------***---------------------------------------------------------------------- Abstract - This paper discusses the different issues pertaining to security of information systems. First, the different types of information security are discussedsuchas network security and endpoint security. Additionally, the other important aspect of information systems security that is discussed is the different threats to information security. These are also the security issues, and they include, viruses and other malicious programs, phishing, as well as denial of service. Alongside the discussion of the different security issues, some solutions for the issuesarealsomentionedwith techniques on how such issues can be avoided when possible. Lastly, the paper also covers the different systems that are at highest risk of security issues. These systems include the ones used in financial systems, the aviation industry, as well as consumer systems. The paper uses a research methodology to outline the manner in which data on information systems security is obtained. Key Words: Systems, industry, information security, business, 1. INTRODUCTION Information technology security, sometimes known as computer security, refers to protecting computer systems and information from any damage, stealing, and illicit use. This security can be done to the computer hardware, software, or any other component of the computer system (Peltier, 2016). The protection of computer hardware against security breaches is done throughthesamemethods that are utilized to guard other precious and sensitive apparatus such as doors and locks, serial numbers, and alarms. On the other hand, information and system access are protected through the use of tactics. This protection prevents any physical access or cybercrime, whichisdonein different ways. 2. Literature Review 2.1 Types of Information Security Network Security is a type of security used in preventing unauthorized and malicious users fromaccessinga network. This security ensures that there is no compromise on reliability, usability, and integrity of the network. It is important to maintain network security as it helps in preventing hackers from accessing data from a network (Peltier, 2016). Additionally, it is also important as it prevents hackers from having any negative effects on the ability of users in their access and use of a network. It is increasingly difficult to ensure network security in businesses as they raise the number of endpoints and carry out a migration of services to the public cloud. The other type of information security is internet security. This security involves protecting information that is transmitted and received through the use of browsers and network security that involves the use of applications that are based on the web. Additionally, this type of protection is designed to monitor the internet traffic that is incomingto ensurethat malware and other unwanted traffic does not get to the system (Ahson & Ilyas, 2008). Such protection for internet security is done using different methods such as antimalware, firewalls, and antispyware. The other common type of information technology security is endpoint security. This security ensures that there is the provision of protection at all the different levels of devices. Examples of devices that can be secured using this security are tablets, laptops, cell phones, and desktop computers. Endpoint security helps in preventing these devices from having any access to malicious networks, whichcanresultin a threat to the organization (Peltier, 2016). Endpoint security instances include advance malware protection and software for device management. The other type of internet security is cloud security. This security covers information technology aspects such as data, applications, and identities that move to the cloud. This movement means that users connect directly to the internet, but they do not have the protection of tradition security procedures. Cloud security aids in securing the use of applications such as software-as- a-service (SaaS) and the public cloud (Stallings et al., 2012). Finally, there is application security, where the coding of applications is done in a manner that they are quite secure and ensure that their vulnerability to attacks is limited. The addition of this layer to security entails the evaluation of a code of an application and the identification of vulnerabilities that exist within the software programs. 2.2 Security Issues in Information Security Viruses and Malicious Programs First, there is the aspect of viruses and malicious programs. Through this increased use of the internet, it likewise poses more risks to the computer network of a business as there are more malicious programs that can affect it. A computer virus refers to a computer code that is inserted into another computer program,butit remainsdormantuntil themoment that a user triggers it without suspecting. Such triggers can be quite simple such as opening an attachment of a file and downloading an internet file. Viruses are sometimes quite
  • 2. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 11 | Nov 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 3595 dangerous as they can end up deleting important data files (Peltier, 2016). As a result, most people and organizations use anti-virus software throughouttheirnetworks,butitstill becomes difficult to cope with the ever-increasing number and sophistication of virus programs. There are different motives that software creators have when they develop viruses, for example, seeking profit through a ransom. Additionally, others are also interested in sendingparticular messages such as a political message. There is also the reason for demonstrating that there is a vulnerability that exists in software. Lastly,somehackersaresimplyinterested in exploring cyber-security issues (Stallings et al., 2012). Such malicious programs and virus often have catastrophic effects as they can end up destroying the entirenetwork that a person or a company operates and electronic recordsheld. Phishing This is also one of the most prevalent cyber-attacks and it refers to when a scammer uses deceitful texts, emails, or impersonator websites with the intention of getting other users to share their important personal information, for example, accountnumbers,loginidentificationdetails,social security numbers, and passwords (Stallings et al., 2012). After sharing this information, scammers normally use it to steal money from people, their identity, or even both money and identity. The use of phishing emails byscammerstogain access to a computer network from where they then install programs, for example, ransomware. These programs are used to lock a person from accessing important files in their computer system.Additionally,phishingscammersluretheir target personalities such that they make them feel that they have a fake logic of protection through the spoofing of trusted and well-known logos of well-known and valid companies or even pretending to be relatives. These cybercriminals also make things seem as if they need to use the information of a target swiftly or else something bad is likely to happen to them, for example, they give out information that a bank account can be frozen and a tax refund will not be possible, among other reasons (Peltier, 2016). The different lies that they use are meant to enable them to solicit information from their targets. For people to ensure that they are protected personally and for their companies against such malice, the United States Federal Trade Commission recommends several precautions. First, people should be secure regarding the attachments that they open and clicking links in their emails (Peltier, 2016). If wrong files or links are clicked, they may contain malware that can end up weakening the security of the computer system. The otherimportantprecautionisthat people should get used to the use of two-factor authentication. For the different accounts that bear this security measure, it requires a password and other pieces of information that are needed before gaining access to an account. For example, the second part of the information may comprise a code that is sent to a phone or a random number that is often generated, which helps to protect the account even when a password may have been compromised. The other important measure that is given is that people should ensure that they maintain a backup of records in an exterior hard drive or in other times cloud storage (Von Solms & Van Niekerk, 2013). Such a backup should be done regularly to ensure that there is maximum protection against malware programs, viruses, or even ransomware attack. Additionally, the U.S. federal trade commission maintainsthatsecurityshouldbemaintainedup to date. In this regard, computer systems should be protected using software that is trusted and ensure that it is updated automatically. Denial of Service The other method that cybercriminals use to compromise computer security is a denial of service (DoS) attacks. This kind of attack occurs when the lawful people that use a computer system are not able to access to their information systems, devices, and other network resources as a result of the actions of a malicious actor of a cyber-threat.Suchactors affect services such as websites, emails, onlineaccounts,and other services that rely on the computer system or network that is affected (Ahson & Ilyas, 2008). This kind of cyber threat is often accomplished through the floodingofthehost network with traffic to ensure that the target is not able to respond or experiences a crash that prohibits legitimate users to access the information technology systems. For example, in the year 2012, six banks in the United States were the target of a different denial of service attacks. These victims were big banks in the United States, such as the JP Morgan Chase, PNC Bank, and the Bank of America. 3. Research Methodology The research methodology employed two approaches: experiments as well as surveys. Experiments The purpose of the tests carried out using experiments was to find out the vulnerabilities that put information systems at risk through a verification of corporate application systems and how they are exposed to security vulnerabilities. The different methods that are used include social engineering, SQL injection, as well as brute force attack. On social engineering, attemptsto penetrate aredone on employees to test whether they do follow all security policies and standards. A phishing attack is used to evaluate the accuracy of policies and measurements that people follow. Secondly, SQL injection is an error based injection attack string that is done to evaluate whether the corporate web application is vulnerable to different kinds of attacks. Two different criteria areusedindetectionofvulnerabilities. The first one is for the web application to allow query execution from different url. Secondly, the web application should show errors for queries. Thirdly, there is brute force attack that helps to reveal human factors that makedata and information systems vulnerable to attacks.
  • 3. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 11 | Nov 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 3596 Surveys First, surveys entail the use of a smoke-screenapproachasit is more effective in capturing the security awareness of respondents if they lack awareness of their assessment. The survey utilizes seven scenarios where two of them are general ones and are employed as a diversion from the main subject. Secondly, interviews are alsousedinsurveys, where ten professionals of informationtechnologyareinterviewed. They are used to give their views regarding the issue of security on information systems. 4. Results and Discussion There is rapid growth in the number of computer systemsin different industries globally. In this regard, the different types of institutions and individuals that rely on computer systems include businesses, government institutions, industries, and individual people. In this regard, oneofthese groups whose systems are at risk is financial systems as the information technology systems that they use are often prominent targets for hackers andcybercriminals.Examples of financial institutions systems that are under this threat are the ones used by the United States Securities and Exchange Commission, investment banks, SWIFT, and commercial banks (Mo et al., 2011). The cybercriminals are often interested in manipulating their financial markets and make illicit gains from them. Other similar institutions whose systems are at risk for the same reasons are brokerage accounts and websites that hold information regarding bank accounts and credit card numbers. Additionally, the aviation industry is another target market for cybercriminals. This industry heavily relies on complex systems that could be attacked and compromised by cyber threats, for example, a single power outage in an airport causes multiple repercussions globally as most systems use radio transmissions that can be disrupted badly. In such a case, the control of aircraft as they traverse oceans is dangerous as the surveillance of radar systems only goes up to 175 and 225 miles offshore (Ahson & Ilyas, 2008). The other main targets are devices that are used by consumers. These devices includedesktopcomputersandlaptops.These devices are used in gathering passwords regarding the financial information of users and use them to come up with botnets for attacking other targets. Different devicessuchas tablets, smartphones, mobile devices, and mobile devices have sensors such as compasses, cameras,andGPSreceivers that can be exploited for security thus used for collecting sensitive information from users. The increase in the number of automated home devices, for example, the Nest thermostat, increases thechancesofconsumerdevices being targets of cybercriminals. Conclusion The protection against cybercrime or physical access to information security systems are important to ensure that information is not compromised. Variable types of information security exist, and they include network security, internet security, endpoint security, and cloud security. In these information security types, multiple security issues exist. However, the main security issues are three. These include malicious programs and viruses, phishing, and denial of service. For example, six banks were the target of different instances of denial ofserviceattacksin the United States in 2012. Lastly,therearemainsystemsthat are at the highest risk of cyber threats, and they include financial institutions and consumer devices.