A Critical Analysis of Information Security -A Case Study of Cognizant Technology Solutions

Author:

J Anvar Shathik1,K. Krishna Prasad2

Affiliation:

1. Assistant Professor, Department of Cloud Technology and Data Science, College of Engineering & Technology, Srinivas University, Mukka, Mangaluru, India

2. College of Computer Science and Information Science, Srinivas University, India

Abstract

Security was not a major concern of the past in Information Technology Organizations. Butpresently, due to the vast growth in fraud and hacking techniques, the security of organizationsis a great concern. Organizations usually spend millions every year just to protect theirenvironment and to maintain security. Yet, no company claims to be a hundred percent secureas fraudulent techniques are more tricky and latest. As the hackers are becoming hard andtricky, the major Information Technology (IT) Organizations are willing to pay a large sum ofmoney for providers offering services of enterprise security schemes. The hackers are alwaysready to intrude into the company's valuable information sources. As per the recent survey by'Security Week', nearly seventy percentages of respondents have faced a security threat whichended up in the loss of valuable information or the collapse of functioning last year. Anemployer of the company can indeed be a major attacker than an outside intruder. An employeeof the company is already having all privileges to use resources of the company while variousother ways are needed for an outer intruder for accessing the same company's network or data.Cisco, the networking giant has a major focus on Enterprise Security Policies. The companyhas seen a valuable improvement in the last few decades, which shows the importance ofsecurity. Cisco had recently released data that showed a lack of security policies in about 23percentages of companies worldwide. More than 70% of Information Technology persons saythat their organizations lack behind in areas of security policy. Large numbers of IT peoplefail to practice security policies as they are not easily understandable. For every organization,policies are the building blocks. They function as road maps which each employee of thecompany uses in various ways. Developing a well-defined policy requires artistic skill. Federalagencies have a Statutory obligation is available for federal agencies for maintaining day-today security policies. The primary Information Security Officer (ISO) is usually pledged forimplementing these policies and the Chief Executive Officer (CEO) of the Company as well.The best security policies consider the vision and mission of companies, the important assetsthat need security, and security threats imposed against certain factors. All these come underrisk management which needs defect identification by business impact policies. The weaknessof a company has to be identified to find the vulnerability ratio of that company. Designing asecurity policy is not a nightmare once the major scope of policy design is identified. Themajor challenge lies in identifying the scope and threat areas for security policy. The policy isnothing but a collection of guidelines and procedures on what and how it can be implemented.In this paper, we are analyzing how Cognizant Technology Solutions (CTS) maintaining itsstandards, policies, technologies, and management policies which are defined for securing dataof an organization.

Publisher

Srinivas University

Subject

General Medicine

同舟云学术

1.学者识别学者识别

2.学术分析学术分析

3.人才评估人才评估

"同舟云学术"是以全球学者为主线,采集、加工和组织学术论文而形成的新型学术文献查询和分析系统,可以对全球学者进行文献检索和人才价值评估。用户可以通过关注某些学科领域的顶尖人物而持续追踪该领域的学科进展和研究前沿。经过近期的数据扩容,当前同舟云学术共收录了国内外主流学术期刊6万余种,收集的期刊论文及会议论文总量共计约1.5亿篇,并以每天添加12000余篇中外论文的速度递增。我们也可以为用户提供个性化、定制化的学者数据。欢迎来电咨询!咨询电话:010-8811{复制后删除}0370

www.globalauthorid.com

TOP

Copyright © 2019-2024 北京同舟云网络信息技术有限公司
京公网安备11010802033243号  京ICP备18003416号-3