StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

The Nature of Information and Computer Security - Personal Statement Example

Cite this document
Summary
The paper presents peer response. The author of this work states "You brought to light some of the various laws that cover security in relation to the technological world, and how individuals who break the law may be handled in a court of law"…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER95.3% of users find it useful
The Nature of Information and Computer Security
Read Text Preview

Extract of sample "The Nature of Information and Computer Security"

I personally commend your use of easy to understand language, which made it possible for me to understand some of the laws and the various Acts that cover them. This makes it possible for even the most of average people to read and find your post motivating and educative. By making the government Acts available in your post, you provided enough evidence to support your strong arguments. In my opinion, there was no misrepresentation of any evidence through the post because any and all your sources of information are recorded and sufficient.

The practicality of what you researched on can be seen in what is happening in some of the states in America. Some criminal acts are often treated differently if the perpetrators are based in certain states. For my part, I would say that your interpretation of the laws present provided me, and other readers, with the much-needed insight into what happens when one breaks laws with regards to computer and information security. This insight may work toward guiding us as we deal with the ever-changing face of the technological world.

Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(The Nature of Information and Computer Security Personal Statement, n.d.)
The Nature of Information and Computer Security Personal Statement. Retrieved from https://studentshare.org/information-technology/1650599-peer-response
(The Nature of Information and Computer Security Personal Statement)
The Nature of Information and Computer Security Personal Statement. https://studentshare.org/information-technology/1650599-peer-response.
“The Nature of Information and Computer Security Personal Statement”, n.d. https://studentshare.org/information-technology/1650599-peer-response.
  • Cited: 0 times

CHECK THESE SAMPLES OF The Nature of Information and Computer Security

Threats to Computer Security

computer security Grade Course (24th, Nov.... 2012) computer security Computers have always been a major target for security threats.... Thus, the issue of computer security is very diverse such that it is not easy to cover.... This is because, the threats to computer security range from cyber crimes, to computer crimes and internet crimes, as well as computer privacy issues.... hellip; The following are the major, recent computer security threats: Blended threats This refers to a combination of spyware and malware attacks on a computer....
3 Pages (750 words) Essay

Developing Computer Networking

computer security.... Information can be stored in a common location and this location be put in a network where everyone who can access the network will have the chance to access it and therefore save them the trouble of having to look for that information and carry it using external storage devices.... Proposed client-tier architecture The application architecture that I better and promises better security is that of 3-tier architecture.... computer networking has been developed over the years and this has brought many advantages in the today's business society....
4 Pages (1000 words) Essay

Project on Spyware and Viruses

With the rapid advancement in the information and communication technology cyber-security has become a global issue which needs to be addressed in a focused way for the users to survive in the technological era.... Thus any organization or individual who is a user of the internet for commercial or other purposes has been made the otential target of these fraudsters who indulge in spreading computer viruses, identity theft, phishing for information and data and several other forms of electronic crimes....
8 Pages (2000 words) Essay

Discussion question

The safe keeping of hardware even includes security of computers where information computer security vs.... Information security computer security vs.... This part of information security is recognized as computer security where professionals try to secure computers from being manipulated in order to obtain ensure that the information that is secured on these computers remain safe (Smith, 2000, p.... In the case of computer security, professionals try to secure various parts of a particular computer as on these parts the information of individuals and organizations is secured....
1 Pages (250 words) Essay

Computer and Types of Computers

They perform several instructions exceeding millions in These make of computers are expensive and mainly used for specific operations and applications that need huge amount of information and calculations.... The machine is set to work in a way that it is able to execute instructions that are… In addition, it is able to store as well as retrieve huge amount of information in faster manner (Piccinini 2008, pp.... Mainframe computers- it is a powerful computer used by several users thus referred to as a multi-user computer....
6 Pages (1500 words) Essay

Data and Information in a Company - Essential Facilities That Should Be Properly Maintained and Protected

Information security is a very essential necessity in an organization or company.... Teleworking or telecommuting is a terminology used to define the aspect of working from a remote location using a personal computer or a work station connected to the company's network than sending the information through the network (Fisher 2005 p 5).... This means that one does not necessarily have to have an office in the company but rather he can work from the comfort of his computer at home....
8 Pages (2000 words) Essay

Information Technology Threats and Security

From the paper "Information Technology Threats and security" it is clear that The threats are explored like a virus, malware, malicious activities, etc.... The growing demand for dependency on information technology requires the high demand for the prevention of threats and improved security as McCarthy (2013) founded in his work on E-authentication.... There are many effective antivirus and internet security software that detect the latest threats....
6 Pages (1500 words) Assignment

Importance of Security in Cyberspace

The author of the paper under the title "Importance of Security in Cyberspace" will begin with the statement that the advent of information and communication technologies has come along with benefits as well as limitations to the users.... In the current society, the main challenge in cyberspace or the internet platform is that of security risks.... As a result of the losses and damages that have been caused by the numerous internet security risks, various solutions have been adopted in order to bring the situation into control....
8 Pages (2000 words) Essay
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us