StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Computer security - Term Paper Example

Cite this document
Summary
The Information Revolution and the accompanying developments in hardware and software research have changed forever the way businesses, economies, institutions and organizations interact and conduct business with each other. It would not be wrong to say that much of the wealth of the world today exists today in a digitized form…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER93.4% of users find it useful
Computer security
Read Text Preview

Extract of sample "Computer security"

? Computer Security of the of the Concerned August 31, Computer Security Introduction The Information Revolution and the accompanying developments in hardware and software research have changed forever the way businesses, economies, institutions and organizations interact and conduct business with each other. With the digitization of the world economies, the wealth of the world is no more confined to banks and security vaults, but has also come to reside in the servers and computers scattered across corporations and financial institutions, in the form of bits and bytes. It would not be wrong to say that much of the wealth of the world today exists today in a digitized form (Gollmann, 1999, p. 6). Once, one comes to terms with this astounding fact that then comes in the concept of computer security. Simply speaking the purpose of the computer security is to look to it that the data residing within the computers remains safe and sound. The arrangements for computer security within organizations look to it that no harm gets done to the computers owned by the organizations and the information saved in those computers remains inaccessible to the unwanted people and organizations (Gollmann, 1999, p. 9). Most of the computer security systems have been designed with the help of the logical technologies. The concept of computer security is mostly relevant in the situations where a computer or computers in an organization are connected to other computers and networks with the help of the accompanying networking technologies and services (Gollmann, 1999, p. 10). The primary and essential objective of the computer security is to protect the organizations from unwarranted data loss and the resultant financial and intellectual losses. The Debilitating Consequences of Data Loss The data saved in the digital hardware and computer networks within corporate and financial organizations could be considered to be the very backbone of these institutions. Any loss to the organizational data in the form of a data theft or a virus threat or say a natural disaster does always have the potential to bring an organization to its knees. Most of the times it is almost impossible to recover the lost data and any recovery if possible is not devoid of a serious threat to the viability of the concerned organization (Vacca, 2009, p. 40). As already said, the businesses in the 21st century are totally digitized and do tend to depend on their hardware and computer networks for survival and sustenance (Vacca, 2009, p. 469). In this very fact lies the very vulnerability of these businesses, which if not safeguarded with the help of proper security, could give way to irretrievable losses and damages. The consequences of a data loss to an organization owing to a lack of computer security or a breach of this security could be manifold. It is not exactly possible to financially quantify the losses owing to data loess, but it would not be wrong to say that such losses at an international scale do run into billions of dollars (Vacca, 2009, p. 136). Research has shown that many companies every year have to contend with data loss, which also includes some of the most reputed companies of the world (Vacca, 2009, p. 136). Many of such companies when struck with a data breach or data losses get immediately shut down and even those which manage to strive, a considerable number have to deal with dire consequences in the following years (Vacca, 2009). Realistically speaking it is not always possible to estimate the losses incurred by a company owing to data loss. In the age of brand considerations and intellectual property, if the impact to the perceptions and views of the customers and trading partners owing to data loss could be considered to be tangible assets, then the looses to a company owing to loss of sensitive data and information is no doubt invaluable and debilitating. Hence, the biggest loss that an institution, corporation or organization could face owing to data loss is the loss of the confidence of its customers, business partners, shareholders and the associated stakeholders (Vacca, 2009, p. 339). In the current times it is the information that runs the businesses and keeps them on move. So loss of data also means a loss of valuable information collected over a prolonged period of time, some of which may be valuable or extremely confidential and crucial to the survival of a business. Not to mention, sometimes a data loss may shut down a company and may leave the employees and customers ideal and frustrated, leading to massive looses in terms of loss of credibility and employee and customer moral (Vacca, 2009, p. 456). The above discussion proves beyond doubt that considering the dangerous consequences of data loss to an organization, computer security is a concept that is of paramount and central importance in the current times. What is Computer Security? Normally speaking the data and information stored in a computer is rarely vulnerable unless that computer is connected to a network. As the usage of internet for personal, professional and business usage is becoming pervasive, the concept of computer security is getting popular in the context of the computers connected to networks. To put it simply the alpha and omega of computer security could be summarized in three words that are confidentiality, integrity and availability (Gollmann, 1999, p. 3). Confidentiality means that the data saved in a computer should be accessible only to the authorized sources and people (Gollmann, 1999, p. 6). Integrity means that it should not be possible for an individual, group or an organization to wrought changes in the data and information stored on a computer, which may not get detected by the personnel authorized to access and use that computer (Gollmann, 1999, p. 5). Availability means that the people accessing and using a computer should be who they declare themselves to be (Gollmann, 1999, p. 7). Access control is the other big concern of the computer security professionals, Access control means that every authorized person should have access to only those aspects of information or applications saved on a computer as one is allowed to use and see (Gollmann, 1999, p. 9). However, it ought to be done in a way that does not hinder the varied authorized personnel from accessing the applications and data they are genuinely entitled to. In addition computer security includes within its ambit the concerns like non-repudiation, prevention of cyber crime, protection from computer viruses, spyware and malware, detection and neutralization of cyber attacks, identity protection, etc. Essentials of Computer Security Computer security personnel resort to a range of security measures and features to save and protect the data stored in a computer from unauthorized sources. Physical security of the computer hardware is the first and foremost tactics in any book of computer security. Physical security is also sometimes referred to as access control. Access control is a strategy resorted to by computer security professionals, which assures that only the authorized personnel get access to a computer system and that each authorized person should get access to only those applications and data as one is permitted to access (Whitman & Mattord, 2011, p. 397). Physical security or access control is assured by varied technologies like metal locks, biometric scanning and authentication, human and automated monitoring, hidden paths, digital signatures, etc (Whitman & Mattord, 2011, p. 398). Encryption is one of the most popular computer security measures. Encryption primarily involves the encoding of data and information in such a way that only the personnel or computers having the right key are able to decode that data (Russell & Gangemi, 2006, p. 137). The technique of computer encryption is based on the centuries old technique of cryptography used by the humans to save and transmit sensitive information. With the latest developments in computer programming and with computers getting faster and more efficient, encryption is the most widely used security measure in the modern times. Besides, computer security is also required to extend protection against internet vulnerabilities and web attacks (Russell & Gangemi, 2006, p. 112). Computer viruses are one of the most potent sources of threat to the digital data in the current times. To put it simply, a computer virus is essentially a malicious program, which has the ability to make multiple copies of it by using the friendly programs and applications saved on a computer. The computer security personnel use varied resources like specialized software, antivirus software and firewalls to protect data against web attacks and viruses. The discipline of computer security also takes care of varied other aspects of data security like data backup, data recovery in case some important data gets inaccessible owing to some physical or technical reasons and the safe and fool proof destruction of obsolete yet sensitive data. In fact, computer security is such a vast and multi faceted subject that it is difficult to touch all the aspects of this concept in a limited space. Conclusion In the coming times, as the information driven economies will tend to some most of their intellectual wealth and R&D in a digitized format, the science of computer security could well be expected to augment exceptionally in its scope and importance. It will not only give way to many scientific and technical developments and possibilities, but will touch upon varied moral, ethical, economic and social questions and issues. In the next 20 years, the corporations and organizations could well be expected to invest heavily in the establishment and maintenance of computer security technologies and policies. References Gollmann, Dieter. (1999). Computer Security. New York: John Wiley & Sons. Russell, Debby & Gangemi, GT. (2006). Computer Security Basics. New York: O’Reilly Media. Vacca, John R. (2009). Computer and Information Security Handbook. New York: Morgan Kaufmann. Whitman, Michael E & Mattord, Herbert J. (2011). Principles of Information Security. Westport, CT: Course Technology. Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Computer security Term Paper Example | Topics and Well Written Essays - 1500 words”, n.d.)
Retrieved de https://studentshare.org/information-technology/1391091-computer-security
(Computer Security Term Paper Example | Topics and Well Written Essays - 1500 Words)
https://studentshare.org/information-technology/1391091-computer-security.
“Computer Security Term Paper Example | Topics and Well Written Essays - 1500 Words”, n.d. https://studentshare.org/information-technology/1391091-computer-security.
  • Cited: 0 times

CHECK THESE SAMPLES OF Computer security

Cryptography and Computer Security

This report "Cryptography and Computer security" sheds some light on the fact that taking precautions along with the necessary software can prevent the system from malicious software and can also help to reduce the chances of any serious data loss.... This opened a gateway to many viruses and unwanted material into the computer.... In order to protect the computer from such threats, many techniques and methods were adopted and up till now new techniques and soft wares are being developed to protect the computer....
8 Pages (2000 words) Report

Adoption of Computer Security

This report "Adoption of Computer security" discusses Computer security usage via the use of firewalls, anti-virus, offensive defense, and anti-spyware software applications.... Situation Analysis This project rolls out several ambitious although critical objectives that are directed towards laying out the central concepts for the current situations in regards to Computer security of the stand-alone or interconnected devices; to come up with the best definitions that cover the logic encompassed by insecurity consequences over the unprotected computer systems; and the subsequent establishment of a set of foundations that the thereafter work can be built upon....
31 Pages (7750 words) Research Paper

Attacking Cryptography Computer Security

This report "Attacking Cryptography Computer security" discusses computer operating systems that use various data protection methods to prevent any form of malware and spyware from getting access to the data stored into a computer or a computer network.... Various Computer security firms provide information about data protection methods, encryption, and decryption being one of them (Echizen, Kunihiro & Sasaki, 2010).... The experts in the field of information security use special software applications to block hackers from accessing information from their servers and in the entire unsecured channels in the networks....
6 Pages (1500 words) Report

Computer Security Analyses

For this assignment, several important issues, concerning Computer security threat perceptions, have been taken up and possible solutions suggested encountering any potential problems. … The spectacular growth of internet and network system has lead to an increased awareness of, and keen interest in, various security issues that are affecting the entire virtual spectrum.... As and when, there are reports of Computer security breaches and vulnerabilities, system administrators and business managers tend to publish the vulnerabilities that have affected the system....
15 Pages (3750 words) Essay

Computer Security Policies

To further enhance our capabilities aside from our modern infrastructure and certified personnel, our company has started the “road map” to ISO 17799/27001 – Code of Practice for Information security Management and Information security Management Systems certification.... This is a globally-recognized information security certification that ensures a company practices globally-accepted and best practices in information security – all our corporate policies are based on this ISO standards....
4 Pages (1000 words) Essay

Computer Security Licensing

The paper "Computer security Licensing" states that generally, computer users should be taught on the varied solutions to computer problems.... Users should, therefore, be taught the various Computer security measures such as encryption of computer software to prevent and reduce fraud and fraud-related acts.... hellip; Because the use of computers is becoming part of the population's daily lives: it is only prudent that computer users are as well equipped with the knowledge of how to protect such devices....
6 Pages (1500 words) Essay

Principles of Computer Security

The paper "Principles of Computer security" traces concepts and terms related to cryptography, intrusion detection systems, standards and protocols, public and private keys, and hardening of the network.... Hence, suitable methods to overcome hackers' challenges become a part of Computer security.... Criminals have managed to adapt the traditional method breaking into a house to breaking into computer systems.... Cryptography is the process used in computer engineering used for providing secure communication to avoid interception of the message by unauthorized parties....
6 Pages (1500 words) Coursework

Computer Security Research

The paper "Computer security Research" states that generally, the National Institute of Standards and Technology gets its guidelines on the systems to use from the NSA.... These guidelines include the kind of security to implement to protect sensitive data.... This hacking is done in the name of ensuring national security, although it faces a lot of rebellion from the public.... The biggest challenge to the transmission of information by the use of computers in a network is its security....
5 Pages (1250 words) Essay
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us