Free

The Myth of Secure Computing by Austin and Christopher - Article Example

Comments (0) Cite this document
Summary
This paper presents digital security which is gaining importance nowadays as all business processing is shifted to a computerized setup. Austin and Christopher in their article, “The Myth of Secure Computing”, inform about the state of digital security in companies nowadays…
Download full paperFile format: .doc, available for editing
GRAB THE BEST PAPER91.9% of users find it useful
The Myth of Secure Computing by Austin and Christopher
Read TextPreview

Extract of sample "The Myth of Secure Computing by Austin and Christopher"


Digital security is gaining importance nowadays as all business processing is shifted to a computerized setup. Austin and Christopher in their article, “The Myth of Secure Computing” (2003), inform about the state of digital security in companies nowadays. Digital security is given least importance in any business setup ignoring the fact that every year companies face heavy financial losses on the basis of security breaches. Austin and Christopher inform that companies have developed networks for their day-to-day processing and separate IT departments with IT heads are there to control any kind of digital issues. However, the amount of money spent on digital security is only 5 to 10 percent of a company’s total expenditure due to which, there are risky security concerns.

There are many threats to digital security, which are as follows:

Network Attacks, which are responsible for slowing network functions and disrupting online performance, are common threats to digital security that can result in big financial losses for the company. Network attacks are external.
Intrusions are internal attacks and are more dangerous than network attacks as the intruders can use the same rights to alter or damage data as authorized users. Intrusions can cause not only monetary but also data leakage loss.

Malicious Codes are in form of viruses and worms that keep the capacity of destructing a company’s whole network. Company’s data can be erased wholly because of viruses and worms.

All kinds of threats are highly dangerous and need to be analyzed in advance. The IT department of a company needs to be highly efficient in identifying all kinds of threats and the level of security that should be provided to each and every asset. An operational approach needs to be followed in order to secure the company, its assets and its reputation from any digital security breach. Risk management should be there in order to check the possible risks to a company’s digital security and to control them in time.

The IT department is required to keep continuous check to day-to-day processing. If software programs are used in a company, they must be tested regularly. The coding, testing and implementation process should not be conducted with proper care and efficiency. The IT staff should be well equipped with all concerned knowledge about IT state of the company and required security measures.

The writers of the article have pointed towards a crucial issue that needs attention to detail. The companies working today are computerized mostly and have their own networks due to which, they are in need of digital security measures so that they face minimum security breaches and can control any intrusion in order to save them from big losses. The article is an affective write-up and needs attention.
References

Austin, Robert D. and Christopher, A. R. (June 2003). The Myth of Secure Computing. Harvard Business Review 81 (6) Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“The Myth of Secure Computing by Austin and Christopher Article”, n.d.)
Retrieved from https://studentshare.org/design-technology/1563095-write-a-report-on-the-article
(The Myth of Secure Computing by Austin and Christopher Article)
https://studentshare.org/design-technology/1563095-write-a-report-on-the-article.
“The Myth of Secure Computing by Austin and Christopher Article”, n.d. https://studentshare.org/design-technology/1563095-write-a-report-on-the-article.
  • Cited: 0 times
Comments (0)
Click to create a comment or rate a document

CHECK THESE SAMPLES OF The Myth of Secure Computing by Austin and Christopher

Christopher Columbus

...?Section A: 2. Discovery of America by Christopher Columbus is held to be in appropriate and false as some historical evidence reflect the fact that America was discovered by Scandinavians in the early tenth century. It is believed that in the Viking era a group of Scandinavians who were sailors and warriors actually discovered America. According to a chart of the library of congress in Washington, it is however claimed that the West coast of America was discovered by Marco Polo two centuries before it was done by Christopher Columbus. Several theories have been reported from the chart of the library which includes the possibility of the discovery of the Northern coast of America in the year 1295, when...
3 Pages(750 words)Essay

Christopher Columbus

...Thesis Out of all the numerous great explorers nearly all people assume of Christopher Columbus as the greatest. People would think of him as the greatest for the reason that he was the first traveler to reach the Americas. He happens to be one of the few early believers that the world was round. All through Columbus's great existence as an voyager he went on about four vast voyages and made numerous great discoveries. Columbus had a grand life and many appealing things occurred to him during his lifetime. Columbus forever transformed the world by his various discoveries and it is remarkable how many findings were he managed to return to the same location each time even though he had no thought where he really was and he made lots... of...
2 Pages(500 words)Essay

Myth

... What is a myth' A myth can be said to be a story with a purpose, which tries to explain the way the world is.Through myths, a relationship between human being and god can be explained. In most cases, myths send a message that has got an important religious or social meaning to people, even though the events might be impossible. Myths can as well be used to explain other things such as the customs or behavior of certain group of people or even explain the nature. Through told stories, myths helped to teach human beings behaviors that enabled them to live well with fellow human beings. According to Campbell, myths are not lies or tall-tales. They are however imaginative, symbolic stories that people of virtually all times have told... as a...
6 Pages(1500 words)Essay

Christopher Columbus

...and Section # of Christopher Columbus Christopher Columbus was born in 1451, he is known as a great navigator and colonizer. The word that best explains him is explorer because he explored the Americas and traveled far off to discover it. Columbus was the second one to discover Americas after Vikings. Many people have reached Americas before Columbus but his discovery is important that he did not only discover it but had introduced the European culture in America and provided the basis for the establishment of European rule in the continent. Columbus started his voyage across the Atlantic Ocean in order to explore the world and to reach at new horizons. The western colonization was on its way and...
15 Pages(3750 words)Essay

Austin Farrer Can Myth be Fact

...Can Myth Be Fact” by Austin Farrer Myths are tales that are known to be stories running since generations. Every cultural system and religion portrays these myths in their own ways while focusing on a similar central idea. The time when the myth was written is not actually significant but rather it is the concept and the idea of the legend that is important. Myths bear a long history of development. The origin of myth dates to the olden times and it is through explanation that it is learnt that myths are closely associated with reality and it is the analysis of the myth in a broad term...
2 Pages(500 words)Essay

David Christopher

...David Christopher Case Study David Christopher Case Study The weekly load for the surgeons in a week can be described as hectic given the kind of timetable they abide by. The timetable for the surgeons in this case be divided into two; the active hours in the surgery is computed to be from Monday to Thursday in which they work for 11 hours a day and since one hour is for lunch between 12 noon to 1 pm. It can be considered that the surgeons take 40 effective hours as the effective engagement time. The 4 hours for lunch can be considered non-effective hours. Though from Friday and the weekends, the surgeons are not involved in direct surgery, they are engaged in other activities like...
2 Pages(500 words)Case Study

Christopher Billop

...Christopher Billop Christopher was born in New York to Thomas and Sarah Billopp in 1738; he was the firstborn among the eight children. Christopher’s father was the son of Anne Billopp, who got married to Colonel Thomas in 1705 (Sabine 23). Christopher was a British loyalist in the American Revolution, and he led a group of loyalists during the war. After the Revolution, he left for Canada together with other loyalists where he joined politics by becoming a representative of Saint John in the New Brunswick Legislature. Christopher is well known for opposing the American Revolution. From the viewpoint of the Patriots, Christopher, and...
3 Pages(750 words)Essay

Myth

...Tricksters in Greek Mythology Many Greek gods are described as envious, vicious, cruel and quite negative personalities. It is possible to several gods that could be called tricksters. For example, such gods as Cronus, Zeus, Hermes and Prometheus can be regarded as some of the major tricksters in the Greek mythology. However, first, it is important to provide major characteristics of a trickster. These are intelligence, thievery and deceitful nature. For instance, Evans (2010) notes that the trickster is cunning, knowledgeable and intelligent. Of course, all of the gods mentioned above were intelligent, wise and knowledgeable. However, they were also cunning. Cronus tried to trick the destiny and swallowed his children, as he... in Greek...
1 Pages(250 words)Essay

Myth

...Female Danger to Male in Greek Mythology Female Danger to Male in Greek Mythology Greek mythology is a valuable culturalheritage of the ancient world which has reflected the thoughts of the ancient Greeks about the way the world is organized. By means of myths they tried to explain everything around them because they did not have enough knowledge to do this from other points of view. In this regard, myths contain many significant male and female characters which are described in different ways, and this paper will consider the danger the females represent to the males. It is necessary to state first that women are described with a bigger degree of heroism in the Greek myths: if the men...
1 Pages(250 words)Essay

Myth

...MYTH In Greek mythology or hero myths, the Oracle of Delphi was a respected priestess at the Apollo. In this regard, the oracleof Apollo at Delphi and various sources of prophecy play the important role in hero myths. The roles that it played are broad and range from societal rituals to ensuring wellbeing of the individuals who consulted it. One of the important roles that the Oracle of Apollo at Delphi and sources of prophecy played in hero myths was that of consultation. The Oracle of Delphi would be consulted by the community before various important decisions, such as war or the establishing of colonies and various societal rituals. Likewise, priestesses at an Oracle...
1 Pages(250 words)Essay
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.

Let us find you another Article on topic The Myth of Secure Computing by Austin and Christopher for FREE!

Contact Us