Contact Us
Sign In / Sign Up for FREE
Go to advanced search...
Nobody downloaded yet

Methods Available for Maintaining Computer System Security - Coursework Example

Comments (0) Cite this document
The paper "Methods Available for Maintaining Computer System Security" states that the computer system has reached an invaluable stage. The need for computer system increased multifold with the advent of the internet. The internet has brought with it several threats to the computer system. …
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER97.5% of users find it useful
Methods Available for Maintaining Computer System Security
Read Text Preview

Extract of sample "Methods Available for Maintaining Computer System Security"

Download file to see previous pages In the process related to denial of service, an adversary looks for preventing someone from using any feature of a computer system. This intention is accomplished by trying up or monopolising significant resources. Therefore, a total solution for any computer security system has to meet the three requirements like integrity, secrecy or confidentiality, and availability. Integrity relates to preventing improper or unauthorised modification of any data. Secrecy or confidentiality relates to the protection of any data or information from unauthorised disclosure. Availability means avoidance of denial of any authorised access to services as well as information. These requirements are of paramount importance in almost all of the computer systems. The security-related problem of a computer system is resolved by maintaining a division between various data as well as computing-related resources and the user of the computer system. This prevents any misuse of data and information. This separation can be achieved by involving three subproblems as a part of computer security i.e. mechanism, security policy, and also assurance (Yu & Jajodia).
In the past few decades, data and information have grown in stature. In different sectors like business, financial sectors, government sector, military, hospital data and information are transmitted across various networks. This data transmission has brought with it the need to secure the network in order to prevent misuse and forgery of data. In the information and data security concept, the basic three elements are availability, confidentiality, and integrity. It is highly important for an organisation or an individual who is using a computer system to transmit data to adhere to these three concepts to protect and secure their data.
Data security is critical for any organisation in this era of high tech information system. Business organisations use computers and networks to store various information like client information, personal files, payment information, bank account related details and information. This information’s are extremely sensitive to an organisation.  ...Download file to see next pages Read More
Cite this document
  • APA
  • MLA
(Methods Available for Maintaining Computer System Security Coursework, n.d.)
Methods Available for Maintaining Computer System Security Coursework. Retrieved from
(Methods Available for Maintaining Computer System Security Coursework)
Methods Available for Maintaining Computer System Security Coursework.
“Methods Available for Maintaining Computer System Security Coursework”.
  • Cited: 0 times
Comments (0)
Click to create a comment or rate a document

CHECK THESE SAMPLES OF Methods Available for Maintaining Computer System Security

MSc computer system security 'Practical Windows Security'

...? Practical Windows Security Contents Introduction to windows security and vulnerabilities 3 The use of remote procedurecall 5 CVE- 2003-0352 7 Mitigating Factors 9 Security solutions 9 Conclusion 10 Reference List 12 Introduction to windows security and vulnerabilities A Windows system is prone to security threats once it is used as an internet server. The typical installation of the windows NT/2000 and other vulnerabilities makes it an easy target for attackers. This way computer networks are damaged on a regular basis. Although network security has improved and strengthened over time but so have the attackers advanced with respect to the new security solutions. The main types of attacks include Denial of Service, Trojan Horse, viruses...
9 Pages (2250 words) Essay

MSc computer system security 'RFID'

The prime advantage of RFID technology is its ease of use and minimalism. RFID replaces barcodes and is a time saving, effective and reliable alternative. That is the reason why it is adopted and deployed in multipurpose applications i.e. Supply Chain Management (SCM), Inventory Tracking, Theft Protection, Location based Services, Electronic Health Monitoring for health care systems, RFID integrated travel documents, payment systems and context-aware applications. In recent years, this technology is flourishing robustly due to its extensive usability in upcoming technologies i.e. Ubiquitous Computing, Pervasive Computing or Ambient Intelligence Solutions. RFID technology comprises of transmitters spreading electromagnetic technol...
20 Pages (5000 words) Essay

Computer Security

... associated with security breaches according to cardholders, merchants, financial institutions, cost of breaches and compliance. In addition to that, it has discussed compliance issues and identified significant data breaches that have occurred in the US Retail Payment Industry. More importantly, it has recognized and discussed critical public policy related issues with an emphasis on data notification laws and the role of Federal Trade commission in tightening up security risks. The paper has also proposed a framework to upgrade the current system with the potential Chip and PIN based dynamic network procedure which will mitigate the risks associated with security matters. The author stated that information security can be guaranteed...
3 Pages (750 words) Essay

Computer security

It also provides recommendations for them. Threats to the system include the absence of multilayered protection. The ease with which the junior officer accessed the DRS is suggestive of implies threats too. The backup copies were not functional and the ease of access meant that the information is at a greater risk. There were also a number of security principles that were broken. These include the need for professionals to have knowledge about their profession, lack of responsibility by the duty manager etc. The recommendations encompass the development of multifactor authentication, a risk management system, introducing firewalls etc. Introduction One of the oldest definitions for security is that it is the process whereby steps...
6 Pages (1500 words) Essay

Computer Security

... personal information revelation behavior of millions of people to friends as well as complete strangers. Millions of people around the world use social networks like Friendster, MySpace, Facebook to communicate, find friends, dates and jobs – and in doing so they wittingly reveal highly personal information about themselves to everyone. With the burst in advertising of these social networks most of them now days encourage users to reveal highly personal information. This includes their dates of birth, cell phone numbers, addresses and highly confidential health information. The weak structural design of social networks in terms of security and access controls is cleverly concealed by a false sense of security which is aided by the current...
2 Pages (500 words) Essay

Computer system Network Security

... can also be supported with regaular locking of your PC, not opening attachment mails if you are not expecting any mail. Platform security systems ensure that each device is available to perform its intended function and doesn't become the network's single point of failure. The isolation of different nodes will make sure than the ill effect of one particular node will not effect the other. The network security plan should include antivirus checking and host-based intrusion detection and alert system. To meet with endpoint compliance, ensure that security policies check user devices for required security software. Computer or Network access: Access login ensures that each user has access to only those network elements and applications...
5 Pages (1250 words) Essay

Computer Network Security Methods

...Running head: A CRITICAL ANALYSIS OF COMPUTER NETWORK SECURITY METHODS A Critical Analysis of Computer Network Security Methods ------------------------------------- Abstract The paper presents a detailed overview of network security issues with critical examination of mechanisms and tools that have been developed to provide protection to networks. The paper brings out the network vulnerabilities, describing the types of probable attacks followed by the counter measures that can be adopted to safeguard against these attacks. All existing technical mechanisms like, cryptography, network security applications and network security systems, related to network security, are briefly explained (not physical measures). Finally...
24 Pages (6000 words) Essay

Computer Methods

...Manchester Metropolitan Department of Computing and Mathematics MA1261 Computing Methods: Test Revision P, Q and R are the sets P = {1, 2, 3, 4}, Q = {3, 4, 5, 6} and R = {3, 5, 7, 9}. a) Draw the Venn diagram containing P, Q and R. [4] b) List the elements in the sets P - (Q'R) and (P - Q)'(P - R). Are these two sets equal' Justify your answer. [6] c) List the elements in T = X ''Y when X = P - Q and Y = P - R. Assuming T is the universal set and S = {(x, y), x
5 Pages (1250 words) Assignment

Computer Methods

..., Q and the sets Q,R respectively so these elements are written where this intersection point occurs. And all the points that are not common in any set are placed in circles where no intersection is occurring. b) first we will take left hand side of the equation and in oreder to compute P - (QR) we will first compute QR and then we will find P - (QR) QR will contain all elements that are common in set Q and set R so QR = { 3, 5 } Now the set P- (QR) will contain all elements that are in P but not in the set QR, so P- (QR) = { 1, 2, 4 } Now we will compute the right hand side and in order to compute (P - Q)(P - R) we will first compute P-Q and then Q-R and then we will find the union. Set P-Q will contain all elements that are in P...
4 Pages (1000 words) Math Problem

Computer security

...A Report on Computer security for Oracle Inc Report of the Topic The topic reports that computer security is an essential aspect that Oracle Corporation emphasizes to the users to enable them avoid cases of hacking. Oracle Corporation is the world’s principal software company for the database enhancement. The article is significant since it exposes aspects about hacking as a grave offense that can affect the reliability and status of an individual or an organization. In March 2011, Oracle experienced this crisis when its Website was hacked by Cernaianu Manole Razvan (Lennon, 2012). This made the users of the Website encounter difficulty in accessing data from their website. Every organization should be cautions to information or sites...
1 Pages (250 words) Essay
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.

Let us find you another Coursework on topic Methods Available for Maintaining Computer System Security for FREE!

Contact Us