StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Secure Computer Systems - Essay Example

Cite this document
Summary
With the growing incidents of PII data theft and negligence in securing PII data. Stringent measures must be taken by the federal government and concerned government agencies. There should be frequent checks on the PII data security, in banks and hospitals apart from government agencies who store PII data in huge volumes .Partnerships with , major software companies like IBM (windows) and data security firms like RSA will help in reducing potential PII theft as security measures will be introduced during the software development stage.
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER98.2% of users find it useful
Secure Computer Systems
Read Text Preview

Extract of sample "Secure Computer Systems"

With the growing incidents of PII data theft and negligence in securing PII data. Stringent measures must be taken by the federal government and concerned government agencies. There should be frequent checks on the PII data security, in banks and hospitals apart from government agencies who store PII data in huge volumes .Partnerships with , major software companies like IBM (windows) and data security firms like RSA will help in reducing potential PII theft as security measures will be introduced during the software development stage. Quote .* "Improving data protection reduces risks associated with breaches and will enhance confidence in the government's ability to protect citizens' privacy and personal information, while simultaneously enabling greater efficiency in the delivery of e government services.

Through a depth of experience and breadth of technologies spanning from servers to desktops and laptop PCs to mobile devices, Microsoft offers the most comprehensive technological solution to address this ongoing need". By Kimberly Nelson, Microsoft executive director for e-government, and William Billings, chief security advisor for the Microsoft U.S. Public Sector division. 'Protecting personally identifiable information (PII) (http://www.microsoft.com/industry/government/federal/protectinginformation.mspx) Crippling penalties and fines on errant institutions that have had a lax approach to PII data security will make other private and public institutions vary of storing un-necessary PII data and putting up air-tight security procedures for their existing PII data banks.

Frequent changes in PII data security laws will keep private and public institutions on their toes and they will take measures in advance, in order to reduce the cost of updating their security measures. I would like to cite -** A Nevada law that took effect this month which requires all businesses there to encrypt personally-identifiable customer data, including names and credit-card numbers, that are transmitted electronically. "A spokeswoman said -"The laws establish a liability that could be used in civil suits against businesses following a data breach", privacy lawyers said.

"In Nevada, companies that suffer a security breach but comply with the new law would cap their damages at $1,000 per customer for each occurrence. Those that don't comply would be subject to unlimited civil penalties under the proposed enforcement plan", said James Earl, executive director of the state's task force for technological crimes". Worthen, B.(2007) page B1 of the Wall street journal 'New data privacy laws set for firms'. (http://online.wsj.com/article/SB122411532152538495-email.html)The federal government's policy of a carrot and stick approach towards private institutions and government agencies who store PII data might speed up changes in the prevention of PII security breach.

Along with fines and penalties imposed on private and public institutions, individuals accountable must also be penalized with fines and imprisonment. Quote " Users and supervisors are subject to disciplinary actions (reprimand, suspension, removal, or other actions in accordance with applicable law and agency policy) for failure to take appropriate action upon discovering a breach or failure to take the required steps to prevent the breach from occurring" .(Johnson, 2007, p. 21). References*Nelson K , Microsoft executive director for e-government, and William Billings, chief security advisor for the Microsoft U.S. Public Sector division.

'Protecting personally identifiable information (PII) (http://www.microsoft.com/industry/government/federal/protectinginformation.mspx)** Worthen, B. (2007) page B1 of the Wall street journal 'New data privacy laws set for firms'. (http://online.wsj.com/article/SB122411532152538495-email.html)

Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Secure Computer Systems Essay Example | Topics and Well Written Essays - 500 words”, n.d.)
Secure Computer Systems Essay Example | Topics and Well Written Essays - 500 words. Retrieved from https://studentshare.org/miscellaneous/1510648-secure-computer-systems
(Secure Computer Systems Essay Example | Topics and Well Written Essays - 500 Words)
Secure Computer Systems Essay Example | Topics and Well Written Essays - 500 Words. https://studentshare.org/miscellaneous/1510648-secure-computer-systems.
“Secure Computer Systems Essay Example | Topics and Well Written Essays - 500 Words”, n.d. https://studentshare.org/miscellaneous/1510648-secure-computer-systems.
  • Cited: 0 times

CHECK THESE SAMPLES OF Secure Computer Systems

Partitions and Principles for Secure Operating Systems

Thus, being an intermediary between the users of computer applications and the resources of the computer systems, the OS offers the following three fundamental services to the users: 1.... This report "Partitions and Principles for Secure Operating systems" presents various essential system administration tasks offered by different operating systems and concludes that with the improvements in the tools available in modern operating systems has been eliminated to a great extent....
9 Pages (2250 words) Report

Methodologies to Minimize the Chances of Database Breach Recurrence

The over-reliance on information technology presents great threats to private and confidential data besides the possible damages to the physical properties such as computer systems and applications.... It is therefore, imperative for higher education institutions to familiarize themselves with the constantly changing threats besides the high cost associated with leaving data and systems unprotected.... The considerable number of system hacks and data breaches experienced by higher educational institutions can be attributed to such factors as resource plague issues experienced by IT department within the institutions, budgetary constraints and desperate database systems among other factors (Gahm, 2010)....
8 Pages (2000 words) Case Study

Should All Hacking be Banned

The United States legal definition describes computer hacking as the deliberate access of computer systems without authority or exceeding authorised access.... Hacking is the practice of manipulating computer systems and software to perform contrary to what they were initially created for....
8 Pages (2000 words) Literature review

Healty Care Informatics

Health Care Informatics is the study relating to the application of Information Technology to Health Care Information.... The increasing computerization of health care data, combined with the emergence of new telecommunications applications and technologies create vast opportunities for the provision of health care (Manning, 1997)....
4 Pages (1000 words) Essay

The Bell-Lapadula Model for Laboratory Information Management Systems

hellip; This makes it possible for scientists to explore data rates that otherwise may be too fast or too slow for proper scientific examination. In recent years, the Bell-LaPadula model has been employed more and more in scientific laboratories, and has also dominated efforts to build Secure Computer Systems for laboratory use.... The objective of this research is to ascertain the ways in which the bell-lapadula model can be applied to Laboratory Information Management systems....
3 Pages (750 words) Essay

Convergence: The Use of Both Technology and Physical Security

Intrusion detectors/ electronic surveillance comprise of alarm systems, which function by alerting security personnel when unauthorized entrants attempt to trespass a secured area.... Without prompt response from security personnel, alarm systems prove futile in preventing unauthorized...
9 Pages (2250 words) Research Paper

Computer Security and Protecting Its Data and Information: Proper Measures and Strategies

This essay describes computer systems and the relevant measures and plans which can be used to secure the computer systems.... computer systems face many challenges that make them vulnerable security risks.... To ensure that these risks are controlled the systems, proper measures and strategies should be put in place to protect the systems.... hellip; According to Halibozek (2008), the most common risks to computer security include and not limited to computer viruses, hackers, and crackers, vandalism, environment, and depreciation....
7 Pages (1750 words) Research Paper

Should All Hacking Be Banned

The United States legal definition describes computer hacking as the deliberate access of computer systems without authorization or exceeding authorized access.... Hacking is the practice of manipulating computer systems and software to perform contrary to what they were initially created for.... The most significant of them is that a hacker is more dependent on the networking of computer systems while a cracker focuses on software to inflict damage....
7 Pages (1750 words) Coursework
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us