answersLogoWhite

0

What are the u ses of information technology in security?

Updated: 8/17/2019
User Avatar

Wiki User

14y ago

Best Answer

This very much depends on what type of security you speak of. Information Security is most often categorized broadly but has to do with keeping unwanted people out of servers and end-user computer systems, there are many jobs in the field of security, its best known for its white hat hackers who penetrate computer systems and network in an attempt to better the stability and security of a network. Analysts analyze and manipulate data from routers and servers used to record events in an attempt to find faults in a network.

User Avatar

Wiki User

14y ago
This answer is:
User Avatar

Add your answer:

Earn +20 pts
Q: What are the u ses of information technology in security?
Write your answer...
Submit
Still have questions?
magnify glass
imp
Related questions

How many information technology companies are in India?

there are many companies in indiaas u have why u should worry about it.


What are Safe working habits that should be practice in an information technology environment?

four safety erules involves in an information technology environment


How do you get in minnrel town on havest moon Ds?

you can't because he ses tht u havnt finished work during the day and if u try at night he ses tht it's to dangerous so i dnt think u can.. sorry!


Is it better to do MSC information technology after B-TECH information technology?

Nope.... Better U try M.Tech. Because, The portions of B.Tech & Msc IT are nearly same.


What 3 laws have had a significant effect on information security in the U S?

There are more than 3 laws with significant effect on information security, but three of them are:Gramm-Leach-Bliley Act (GLB), also known as the Financial Services Modernization Act of 1999 This one requires financial institutions to develop a written information security plan that describes how the company is prepared for, and plans to continue to protect clients' nonpublic personal information. (The Safeguards Rule applies to information of any consumers past or present of the financial institution's products or services.)Sarbanes-Oxley Act of 2002 (Pub.L. 107-204, 116 Stat. 745) This one dictates requirements for information and information technology audits in publicly traded companiesFederal Information Security Management Act of 2002("FISMA", 44 U.S.C. § 3541) This one assigns specific responsibilities to federal agencies, the National Institute of Standards and Technology (NIST) and the Office of Management and Budget (OMB) in order to strengthen information system security. In particular, FISMA requires the head of each agency to implement policies and procedures to cost-effectively reduce information technology security risks to an acceptable level.


How do you do you unblock sites?

type in weenieserver.com and go to the left i ses unblock sights and u type the sight in and there u go


What is GIS Applications?

GIS means Geographical Information System used to get the information about an area where u stand using GPS like technology.


4th semester syllabus for btech information technology?

if you go to Anna university website, u can find


Should you study Information Technology and Computer Science in China or Russia?

u should study in Russia


Does the information technology is hard to study?

Studying information technology can be challenging, but not necessarily hard. It requires dedication, problem-solving skills, and a willingness to learn new technologies. With the right resources and support, you can succeed in studying information technology.


How much does an information security officer earn?

they get around £65000 per year. and u start of with £45000.


What is the nortel networks Inc company rank ic information technology largest employers?

r u in wmms