Start networking and exchanging professional insights

Register now or log in to join your professional community.

Follow

How IT contributes in Security System ?

user-image
Question added by AHMED IMRUL KAYES , Senior Consultant , HR Bangladesh Ltd.
Date Posted: 2015/01/28
Moaaz El Shazly
by Moaaz El Shazly , Business Development Manager , Lighthouse Solutions

Security Systems is not a simple word to be simply defined or described as a unit, it's many classes and types like:

  • Physical Security (Road Blockers, Gate Barriers, Turnstiles ... etc.)
  • Low current Security Systems (CCTV, Access Control, Intrusion Detection, Fire Alarm, ... etc.)
  • Security Over Networks (Hacking, Computer Viruses, Stealing Information, ... etc.)

And each Type has its unique relation with IT, so it's not correct to just consider the Security Systems as a unit.

Zohaib Moazzam Khan
by Zohaib Moazzam Khan , Sr. Manager Eng. Utilities & MBR-Recycling Plant , Eastern Garments

Some of the most common threats today are software attacks, theft of intellectual property, identity theft, theft of equipment or information, sabotage, and information extortion.

Through IT contribution we can protect such common threats by securing networks, applications, data base, systems auditing, business continuity plans etc.

Talha kaim khani
by Talha kaim khani , Traniee engineer , Pakistan Telecommunication limited(PTCL)

well there are lots of examples.like in wireless provides security using wsap.use access list to provide security.

ASHIK MUHAMMED HANEEF
by ASHIK MUHAMMED HANEEF , Technical Engineer , Kuwait Flour Mills & Bakeries Co

The proliferation of cyber crime means businesses and government agencies around the globe face constant threats to their financial information, customer data, and military and trade secrets. It’s the role of cybersecurity specialists to protect organizations and the public from hackers, scammers and other online criminals.

The growing demand for cybersecurity specialists can be seen in national employment projections. According to the U.S. Bureau of Labor Statistics (BLS), jobs in this category will increase by37% during the decade ending in2022. That’s more than triple the average growth rate (11%) for all occupations in the United States.

What is a Cybersecurity Specialist?

Cybersecurity specialists work with organizations to keep their computer information systems secure. They determine who requires access to which information, and then plan, coordinate and implement information security programs. Using a multi-layered approach, they use their specialized expertise and up-to-date knowledge to help protect against Web threats that facilitate cyber crime, including malware, phishing, viruses, denial-of-service attacks, information warfare and hacking.

AHMED IMRUL KAYES
by AHMED IMRUL KAYES , Senior Consultant , HR Bangladesh Ltd.

Thank you all for the important answers.

Kalim Muhammad
by Kalim Muhammad , Senior Ios Developer , AppzVenture

According to my point of view there is the key and grass root level of security system that depend on IT infrastructure. If there is any loop in meta data then system fails.

Mahaboob basha Syed
by Mahaboob basha Syed , Network Engineer , Pan Kingdom Holding Company

in any organization or firm IT dept plays a major role in setting up security systems like setting up CCTV, access Controls, Providing Smart cards and also IT dept helps to prevent malicious attacks from hackers to company assets.

vijay babu
by vijay babu , Power System Consultant / Technical Specialist , IBM India Pvt Ltd (IBM Systems)

Yes , Information Technology contributes  in Security System in many ways for example , take the system access control that is one point where as the authentic or authorized people only can be access those systems or we can login. Another, IT (SYSTEMS )  keeps the record of the biometric of the right person and  if the same biometric detected than only it allows to access the protocol.

Farathullakhan Gulam Muhammad
by Farathullakhan Gulam Muhammad , IT Infrastructure Manager , Binghatti Developers FZE

To allow and deny the network traffic considering bandwidth and other concepts.

Pier Nicola Di Gravio
by Pier Nicola Di Gravio , IT Operation Service Manager , Ericsson Telecomunicazioni - Telecom Italia Sparkle S.p.A.

IT contributes definitely for all aspects of Security: Physical, Access, Network, Data.

these days IT has replaced human people in all cases of security system. Humans can e dodged and played with but not technology.All technology which is introduced in this modern world relevant to security systems in IT based.

More Questions Like This

Do you need help in adding the right keywords to your CV? Let our CV writing experts help you.