Nobody downloaded yet

The Importance of Computer Security - Literature review Example

Comments (0) Cite this document
Summary
The paper "The Importance of Computer Security " highlights that Ashgapour stated that a primary goal of effective risk communication is to assist individuals in making informed decisions about the type of risks which are acceptable and which are not. …
Download full paperFile format: .doc, available for editing
GRAB THE BEST PAPER91.5% of users find it useful
The Importance of Computer Security
Read TextPreview

Extract of sample "The Importance of Computer Security"

Download file to see previous pages The importance of computer security has been emphasized by two expert studies. One study was done by a group of academicians. The second study was done by computer security professionals. One is a seminal work carried out by Farzeneh Asghapour, Debin Lin and Jean Camp (2007) in assessing the indirect and implicit use of mental models applied to computer security. Asghapour et. al., (2007) did three experiments which revealed corresponding results. First, the experiments showed that for a set of security risks, the self-identified security experts and non-experts exhibit specific mental models. Second, a brand of expertise increases the distance between the mental models of non-experts and experts. Finally, the utilization of models through metaphors did not correspond to metaphors that are similar to the mental models of simple users. The second study on computer security done by Stuart Schechter and Daniel Smith tackled the kind of security required to protect a packaged system which is present in large organizations from thieves who would plot a vulnerability to attack multiple installations. Both studies are similar since they relay the importance of computer security in organizations.
The main theme of Asghapour and her co-researchers were to emphasize the importance of effective security risk communication. The researchers argue that this requires both communicating risk information and motivating the appropriate risk behaviors. The crucial argument is that the purpose of risk communication is not transmitting truth to the users, but training them to take an appropriate move to respond against a certain threat to their system. Similarly, Schechter and David present an economic threat modeling as a measure for understanding adversaries who are attracted for financial gain. They did a mathematical model on thieves outside the target organization who would enter through a simple vulnerability in one of the target company’s packaged systems. This model can determine what these thieves are willing to pay for system vulnerabilities and how secure the system should be to withstand any form of theft. ...Download file to see next pagesRead More
Cite this document
  • APA
  • MLA
  • CHICAGO
(The Importance of Computer Security Literature review, n.d.)
The Importance of Computer Security Literature review. Retrieved from https://studentshare.org/information-technology/1717594-e-security
(The Importance of Computer Security Literature Review)
The Importance of Computer Security Literature Review. https://studentshare.org/information-technology/1717594-e-security.
“The Importance of Computer Security Literature Review”. https://studentshare.org/information-technology/1717594-e-security.
  • Cited: 0 times
Comments (0)
Click to create a comment or rate a document

CHECK THESE SAMPLES OF The Importance of Computer Security

Computer security

...leave the employees and customers ideal and frustrated, leading to massive looses in terms of loss of credibility and employee and customer moral (Vacca, 2009, p. 456). The above discussion proves beyond doubt that considering the dangerous consequences of data loss to an organization, computer security is a concept that is of paramount and central importance in the current times. What is Computer Security? Normally speaking the data and information stored in a computer is rarely vulnerable unless that computer is connected to a network. As the usage of internet for personal, professional and business usage is becoming...
6 Pages(1500 words)Term Paper

Computer Security

...the basic design and deployment of computer systems, which form a major chunk of the issue. These misguided incentives begin with what economists call a moral hazard effect which resulted in a landslide of fraud. Other incentives include consumer’s lack of prioritizing on security measures which resulted in their minimum spending on software security. This is referred to by economists as ‘The tragedy of the commons’ with consumer’s unwilling to spend on measures that did not directly benefit them. Third is the failure in privacy and prolonged regulatory issues due to poor allocation of online risks. Last is the ability of these incentives to affect defense and offense strategies. With...
3 Pages(750 words)Essay

Computer Security

...?Differences in the two papers with respect to approaches and conclusions The paper ed by MacCarthy on Information Security Policy in the U.S. Retail Payments Industry is a thorough analysis of the security policies which incorporates and evaluates the legal doctrines embraced by the players in the industry with regards to information security. The information security policies are evaluated as an economical idea; incorporating the impact of externalities which create inefficiencies and undermine incentives for investments in information security. The paper carefully examined the impact of various acts and laws such as PCI (Payment Card Industry...
3 Pages(750 words)Essay

Computer security

...to company files and other information which constitute a large value of the company gives rise to threats to the security of the computer. The junior officer did not know much about the application that launched to change the keys. The application could have been a malicious software too and could have corrupted the entire system if the junior officer simply ‘pressed a few buttons’, causing the application to disappear. The junior officer did not know about the right tape to be used for backing up the information. He used the wrong tape, causing important information from the past two weeks to be rewritten and hence lost. This also entails that anyone who has the password could use the...
6 Pages(1500 words)Essay

Computer Security

...personal information revelation behavior of millions of people to friends as well as complete strangers. Millions of people around the world use social networks like Friendster, MySpace, Facebook to communicate, find friends, dates and jobs – and in doing so they wittingly reveal highly personal information about themselves to everyone. With the burst in advertising of these social networks most of them now days encourage users to reveal highly personal information. This includes their dates of birth, cell phone numbers, addresses and highly confidential health information. The weak structural design of social networks in terms of security and access controls is cleverly concealed by a false sense of...
2 Pages(500 words)Essay

Computer Security

...?Q: Return to the discussion of how spam has or has not changed the infrastructure. Has this changed your perspective? What could incent ISPs to improve detection in terms of architecture and disclosure? How might that empower attackers? My perspective has greatly changed when I look at the effect that spam has had on the infrastructure of technology. Spam, spyware, identity and data theft are a form of technological abuse that have brought along noticeable shifts in the technological infrastructure. Spyware the term loosely describes a new class of computer software that may track user activities online and offline, provide targeted advertising and engage in other types of activities that users describe as invasive or undesirable... , out of...
2 Pages(500 words)Essay

Computer Security

..., pp. 425-478.). In computer security, it is important take note that technology in never enough for a trusted system. Any business organization must ensure that its secure program takes into account other managerial controls, means of recovery from security breaches, and also full awareness and acceptance of people who are entrusted with the use of such devices (Weirich, D., and Sasse, M. A., 2001, pp. 137-143.). This idea of recognizing a person is brought about by the fact that security cannot be attained in an environment where people are not of full commitment in achieving a secure computer operation...
30 Pages(7500 words)Essay

Computer security

...A Report on Computer security for Oracle Inc Report of the Topic The topic reports that computer security is an essential aspect that Oracle Corporation emphasizes to the users to enable them avoid cases of hacking. Oracle Corporation is the world’s principal software company for the database enhancement. The article is significant since it exposes aspects about hacking as a grave offense that can affect the reliability and status of an individual or an organization. In March 2011, Oracle experienced this crisis when its Website was hacked by Cernaianu Manole Razvan (Lennon, 2012). This made the users of the Website encounter difficulty in accessing data from their...
1 Pages(250 words)Essay

Computer security

...of reading and replying to spam emails. It is also important to teach solutions to computer problems so as to avoid the loss of information. The computer users should be aware of the importance of backing up information so as to prevent the loss of information and ensure the data stored is safe. Consequently, the users should be taught how to encrypt the software. Teaching the computer users about secure online habits and proactive defense is important. Educating the users on what is required of them and their effects is a more efficient strategy on tackling computer problems; rather than expecting...
6 Pages(1500 words)Essay

Computer Security

...College: Computer Security Vulnerabilities in risk management are simply conditions that may result in an attack by impending threats. Maram et.al further suggests that vulnerabilities are attributes that are easily exploited by the threats (51-53). During the vulnerability appraisal on my personal computer, I discovered the following vulnerabilities. First, I discovered that I was a bit careless with storage of my personal computer which is portable since I often leave it on top of the table when out of the house and whenever I carry it around or when travelling I normally left my computer bag unattended. Secondly, I discovered that my wireless internet...
1 Pages(250 words)Essay
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.

Let us find you another Literature review on topic The Importance of Computer Security for FREE!

Contact Us