We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.

Elements of Computer Security - Research Paper Example

Availability has been identified as one of the most important elements of a computer security system. Quite understandably, computers have become critical to humans in so many different ways that our lives are dependent upon them. The last thing that a computer user would expect is the failure of its computer security system at any given moment. Computer security systems are employed for constant, fulltime, and round the clock security and not on temporary basis (Lehtinen, Russell & Gangemi, 2006). Consider the example of the security systems, which failed to protect their host computers from the outbreak of CIH virus that using deleting bits and parts of flashable BIOS areas. The experts claim that the security system was intact although, it failed to perform at those given moments due to technical reasons. The same is no longer acceptable today. Therefore, availability remains a key element of the computer security system (Shim, Qureshi & Siegel, 2000). Computer security systems should also attempt towards maintaining a balance between security and confidentiality of the members of the system. It is highly likely that every system will face or provoke a certain degree of conflict between the management and experts trying to secure the system by leaving no stone unturned and users would try to ensure that they face minimum interference in their private lives or minimum exposure of their confidential information. Organizations and managers then have to find a middle ground between the demands

Check these samples - they also fit your topic

Computer Forensics
The paper focuses on the importance of computer forensics in collecting, interpreting and presenting evidence relating to cyberspace crimes. The value added by computer forensic to information gathered is also discussed. The paper presents proposals of alternative methods which can be used to protect company data from cyberspace attack.
11 pages (2750 words)Research Paper
Computer Security and Biometrics
The essay discussed the three concepts proposed by covering formal, informal and technical dimensions of threats affecting information systems. It has also discussed biometric security challenges representing five domains, each having its own challenges. Moreover, the paper also discussed researches and studies addressing fingerprint template databases.
10 pages (2500 words)Research Paper
Computer Security
This is an appropriate response from a commercial enterprise because they are concerned with customer relationship building. Such companies want to be ethical by being honest about the weakness of their products. At least, the general public is forewarned and can seek preventive measures.
2 pages (500 words)Research Paper
Computer Security
To update your privacy settings or to at the very least review the privacy policies of social communities that you are members of is a necessary precaution. This is mainly due to the fact that although online social networks offer exciting new opportunities for interaction and communication but due to their vast membership and easily identifiable data they open up a window of highly personal information revelation behavior of millions of people to friends as well as complete strangers.
2 pages (500 words)Essay
Computer Information Security Certification
It will discuss the requirements for one to be certified and areas that one can receive certification. In addition the paper will evaluate the employment opportunities available after receiving certifications. Introduction Computers systems and networks face many security threats such as unauthorized access and intrusion.
8 pages (2000 words)Research Paper
Software Technology Evaluation
This technology has been of interest to many users since it derives its effectiveness from the power of the client computers rather than a centralized server. Despite the many benefits of peer-to-peer networks and files sharing softwares, there has been increased concern on the security of users who utilize this technology.
5 pages (1250 words)Research Paper
Security in Computer Networks
Apart from the Internet that is the largest public data network there are private networks such as Wide Area Networks (WANs) of companies connecting their offices located remotely as well as billions of Local Area Networks (LANs) within the premises that connect computers in a local environment.
6 pages (1500 words)Research Paper
Computer Networking
The essay below therefor investigates various security features that help secure a computer network. Such include the use of effective antiviruses, the development of effective firewalls, the use of passwords and dedicated manipulation of the user interface.
5 pages (1250 words)Research Paper
The Convergence of Physical and Information Security
The concept of security convergence has evolved from the fact that most business assets today are becoming information based, and hence businesses cannot avoid adopting
20 pages (5000 words)Research Paper
Computer Antivirus

Depending on the person asked, people will always argue that paying for antivirus computer software is either a total rip-off or a good investment. In actuality, both positions can be argued against each other. There are many reasons as to why a free antivirus is a preferred vis-à-vis paid software and vice-versa.

3 pages (750 words)Research Paper
of both the parties (Bishop, 2003). Therefore, “privacy” is yet another crucial element of computer security. Furthermore, “confidentiality” also is a corresponding element to privacy, which refers to ensuring the fact that unauthorized people or outsiders should not get the chance to access the confidential information. There are no doubts in the fact that leakage of confidential information to outsiders or people with other motives may result in extreme damages to businesses and personal lives (Lehtinen, Russell & Gangemi, 2006). Much of the concerned literature about computer security recognizes “integrity” as an important element of computer security. Quite understandably, computers hold information and data and any corruption, alteration or deletion of the data may decrease the value of the information greatly (Bishop, 2003). Losing data of any sort can be extremely devastating since in many cases, it becomes almost impossible to recover that data or prove that the recovered data is authentic and reliable. Therefore, the expectation from any computer security is that it protect that information in such a way that it remains intact at all times (Lehtinen, Russell & Gangemi, 2006). Another less widely discussed element of computer security is its “cost effectiveness”. Organizations usually spend hundreds and thousands of dollars on ensuring that their computer security systems are effective enough to secure them from threats. However, equally important is to assess its efficiency (Gollmann, 2011). A computer security system trying to prevent the fire may be costing the company in thousands of millions but on the other hand, fire fighting with the threats that have already affected the computer may cause the company only a few hundreds of dollars. Therefore, it is important to ensure that the security system is providing more benefits than the direct and


Running Head: Elements of Computer Security Elements of Computer Security Elements of Computer Security Without any doubts, the key purpose of any computer security system is to ensure that its users and stakeholders could be a part of a safe and reliable computing environment…
Elements of Computer Security
Read TextPreview
Comments (0)
Click to create a comment or rate a document
Let us find you another Research Paper on topic Elements of Computer Security for FREE!
Contact us:
Contact Us Now
FREE Mobile Apps:
  • About StudentShare
  • Testimonials
  • FAQ
  • Blog
  • Free Essays
  • New Essays
  • Essays
  • The Newest Essay Topics
  • Index samples by all dates
Join us:
Contact Us