StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Computer Security - Research Paper Example

Cite this document
Summary
The paper gives detailed information about the computer security. Due to the amazing efficiency of a computer system, every business feels the need to utilize computer technology within the business infrastructure to enhance its operational performance…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER95.1% of users find it useful
Computer Security
Read Text Preview

Extract of sample "Computer Security"

Computer Security Executive Summary Due to the amazing efficiency of computer system, every business feels the need to utilize computer technology inside the business infrastructure to enhance its operational performance. Additionally, corporations utilize computer technologies in various disciplines such as for communication with other people through e-mail or chatting. However, due to the negative impacts of technology, information is not considered as private and secret. In this scenario, corporations don’t like their business information such as customers’ data and economic statements to be exposed to the public. Therefore, computer system security is considered to be the vital aspect in any organization (Armor2net Software Ltd., 2011; Laudon & Laudon, 2010). In addition, intruders or hackers usually try to break into business information. Frequently these hackers like to get control over company’s computer system in order to initiate devastating attacks over further computers. In this scenario, if a business has a system linked to the web based technology just to send communication messages, so business system can definitely be the target. Moreover, these hackers have the power to change or delete sensitive business or personal data and information. Furthermore, web based technology and digital companies make it simple to collect, incorporate, and share business information, offering new fears regarding the suitable usage of customer details, the safety of individual confidentiality, as well as the security of intellectual property of the organization (Armor2net Software Ltd., 2011; Laudon & Laudon, 2010). This paper presents a detailed overview of computer security. This paper discusses how computer security has become an important issue for the companies. This paper outlines various security issues along with their solutions. Introduction Computer security can be perceived as the procedure of averting as well as identifying illegal exploitation of a company computer system. For a large number of companies averting actions facilitate them to prevent illegal users/impostors from seeing and understanding the data lying onto a company system. In this scenario, the procedure of identification or detection assists businesses to decide if anybody tries to force an entry into our system, so if they get the access and what would happen with our system consequently. In view of the fact that the word computer security is employed regularly; however the framework of a computer system is defenseless to a number of threats except the system is linked with more computer systems using some sort of network arrangement. Additionally, with the utilization of computer and communication networks, particularly the web based technology like internet the idea of computer security has extended to indicate problems regarding the exploitation of computer systems inside the network (Armor2net Software Ltd., 2011; Kinkus, 2002; Laudon & Laudon, 2010). However, for most of the businesses, the imperative technological domains of computer security are typically characterized through the word known as CIA which means confidentiality, integrity, and authentication. In general terms the word confidentiality denotes that the business data and vital information is not able to be used by illegal users. Confidentiality is as well acknowledged as concealment or privacy. However, the integrity implies that business information is secured beside illegal access that is not obvious to authoritative computer system users. Additionally, lots of attacks to computer security occurrences of hacking usually negotiate the integrity of system database as well as additional contrivances and services. In this scenario, the computer security is concerned with various fields like ethics, risk assessment, computer system offense, the preclusion, recognition, and measures against various computer attacks; as well as individuality and secrecy inside cyberspace world (Armor2net Software Ltd., 2011; Kinkus, 2002; Laudon & Laudon, 2010). The paper will outline the importance of computer security. This paper will present a detailed analysis of some of the major computer security issues. Evolving issues of Computer Security In this information technology based age business executives have begun to realize the significance of computer security. Businesses have started to spend huge money on computer security issue and for employees to supervise security actions. During the past few decades one of the most dangerous security issues was the denial of service (DOS) attack that just overloads into a network arrangement until it collapses. Such as an internet seller monster eBay was attacked by DOS attack during the 2nd month of 2000, which was about transferring the website a stream of false requests for company websites pages and resultantly eBay’s network collapsed. Another problems found in mail bombs perform in the similar way. Conversely, they try to crash mail server with the purpose of closing an email service through network congestion. Illegal users or intruders are as well attempting to acquire access to sensitive details and domains comprising insightful data, for instance credit card numbers of individuals (HostIP, 2011). In addition, a well-known department FBI reported that yearly victims to United States businesses amount to be $63 billion from stealing of computer system intellectual property. In the same way, the Computer Security Institute (CIA) currently surveyed five hundred corporations who stated fatalities counting to be $236 million to saboteurs, computer viruses, laptop robbery, monetary scam, telecommunications scam and theft of business sensitive information. According to a senior analyst named “Patrick Bihammar”, the companies have started to understand the importance of data outflow as well as in-house risks. During the year 2008 another survey conducted and it revealed that data outflow is measured an extremely severe risk that was graded as an awfully severe risk to businesses after malware programs for example spyware, computer viruses, destructive worms, and spamming codes (Salek, 2008; Entrust Technologies, 2010). Moreover, in the computer security world, the concept of information systems has formed latest ethical problems wherein individual group of benefit is eroded beside another. Such as, several of the large worldwide businesses inside the US are exploiting IT to decrease number of employees hired. Additionally, the massive utilization of technology and voice recognition application suite minimizes the necessity for human workers by making computer systems to distinguish a client’s reaction to a sequence of automated queries. So in this scenario a lot of organizations feel that how the staff is using internet to stop them from using and thus killing business imperative resources on trivial actions (Laudon & Laudon, 2010). Company’s response to computer security issue Current Security Solutions Considering the important aspects of computer security many organizations have realized that how important it is to keep business data secure and confidential from illegal access. In this scenario, latest security solutions usually comprise numerous useful means or products. These security enhancing products have to be acquired, established, set up, administered, and simplified in an efficient manner. By using this method, IT executives have to tackle issues associated with the shortage of interoperability among all the products. Additionally, the security is typically not inclusive since manufacturer’s capability to work jointly problems generally permits computer security risks to violate the boundaries, which results in breaking the computer security. In this scenario the dilemma would yet continue though the same retailers were utilized for numerous security mechanisms and products, since those emerging technologies are not planned to incorporate and work jointly. When a security breach happens, the "fixes" which every retailer offers must be experienced as well as confirmed with the help of a variety of technologies. Thus, this thing has the potential to lessen attack rates, strongly augmenting the costs that are acquired (Technology Evaluation Centers inc. , 2011; Laudon & Laudon, 2010). Moreover, the inferences of latest security solutions comprise ineptitudes; unsatisfactory outcomes such as lesser than expected threat alleviation and loss of consumer and marketplace conviction, in addition to an elevated outlay of rights. Also offering insufficient security existing security products seems to have manual execution and arrangement. In addition, these computer security products are fraction of a corporate security position which may perhaps be hard to recognize and that offer less perception into security preparation plus implementation (Technology Evaluation Centers inc. , 2011; Laudon & Laudon, 2010). The Consistent Solution: incorporated security Incorporated computer security mechanism offers an inclusive; entirety secure arrangement which deals with confronts and prospects of current businesses through networked environment. Additionally, considering the computer security issues, most of the company’s security systems incorporate several protection technologies as well as merge them with policy conformity, administration, consumer service and help desk, and sophisticated study, for additional absolute security. So businesses implement the standards of security thoroughly and utilize matching security activities at various levels inside the information technology framework. In this scenario, some of the vital security mechanisms and technologies which can be incorporated comprise: Virtual Private Networks (VPNs). A VPN secures communication beyond the boundary, facilitating businesses to securely correspond through additional networks over the web based technology. Implementation of Firewalls: This computer security technology controls the entire network and communication passage by viewing the data packets coming inward and going outward the network or some segment of network to facilitate guarantee that no illegal access is made to the computers and/or the network. Exposure Evaluation: It facilitates evaluation of a network as well as communication security situation by detecting security holes and thereafter signifying possible solutions Intrusion Detection System: It discovers illegal access as well as offers notices and information which are able to be evaluated for planning purposes. Virus Safety: It facilitates in protecting beside various types of computer viruses, spyware, worms, as well as Trojan Horses Content Filtering: This mechanism eradicates discarded network packets, whether they appear in message headers, messages itself, downloadable attachments, and additional means. Considering the above mentioned technologies, the implementation of these protection technologies could be a protracted task to establish and autonomously would typically be hard and costly to administer and keep their setting up-to-date with the requirements. However, once incorporated into a particular solution, they provide much inclusive security by minimizing the cost and complication. In addition, within the frameworks of many organizations, various security mechanisms and products from diverse retailers have perhaps been installed since network security has developed. So companies are incorporating security solutions to enhance their performance and confidentiality of business activities (Technology Evaluation Centers inc. , 2011; Laudon & Laudon, 2010). Advantages of Incorporated Security Enhanced Security Position Security technologies which are incorporated with the corporate will eventually work jointly, offering an improved security mechanism over their separate complements. IDS (intrusion detection system) technology can recognize a possible risk as well as support an advanced firewall position. In this scenario, the Firewall has the power to start a virus-scan of a mistrustful communication. This reduces the risk of a technology as well as augments the possibility for analyzing and minimizing computer security related risks (Technology Evaluation Centers inc. , 2011). Working Effectiveness of Security Tasks Incorporated computer security mechanisms inside the organizations lessen the necessity to buy, establish, modernize, and administer numerous security procedures otherwise tackle rising problems. Such computer security technology enables re-distribution of Information Technology employees to additional strategic activities as enhancing the efficiency of the frequently overloaded IT sector, developing security methodologies with great competence (Technology Evaluation Centers inc. , 2011). Reduced Influence of Attacks over Company Because an incorporated computer security solution could be applied across various frameworks, it provides elevated security of various resources or assets of the company. In addition, incorporated security mechanism effectively permits for continuous business activities, enhances worker efficiency, augments returns, and lessens the chance of any form of proceedings (Technology Evaluation Centers inc. , 2011). Recommendations about computer security A computer security professional (or an IT professional) is the person who is responsible to defend computer systems and offers protection from a diversity of intimidations. These security related threats may occur from inside as well as outside sources. The computer security professional usually offers services to management departments, learning businesses and enterprise level domains. Additionally, every movement inside the business is usually exposed to fresh types of threats. This usually needs a computer security professional to continually improve his/her level of awareness and augment his/her cache of confrontational tools as well as systems (Damewood, 2011; Brenner, 2011). Another security measure I will recommend is to make use of full control over passwords or secret codes. In this scenario clients are required to often change their passwords; this lessens the prospects of illegal admittance to controlled or secret applications, database arrangements or network communication. This implementation has the potential to provide fundamental computer security inside the business (Damewood, 2011; Brenner, 2011). In addition, the most dangerous risks to computer security often come from outside sources. In this scenario, the security professionals usually set up firewalls to discourage illegal users. Thus, they regularly deploy programs those offer warnings once any effort to penetrate the system is carried out. Moreover, a number of extremely complicated computer programs are able to trace the origin of network intruder or hacker by recognizing the IP address of the source (Damewood, 2011; Brenner, 2011). Moreover, in some scenarios deletion of infected file simply will not remove the viruses since the viruses frequently make multiple files so as to avoid deletion. In this scenario, it is extremely significant not to transfer e-mail messages yet a virus code has been removed, since this will just transfer from individual system to the other. Thus, it is incredibly vital to confirm that businesses totally delete the virus from the computer in order to maintain maximum security and optimal performance (Damewood, 2011; Brenner, 2011). Another major recommendation is to offer safety and protection to a business’s computer system and communication network, in this respect the computer security professional is usually responsible to obviously convey business and security policies along with actions to all the personnel, related human resources and business executives. In addition, the computer security actions professional deploys will only be efficient if the computer’s users recognize the significance of security procedures as well as use the technology to keep the communication protocol advanced and practical. In this scenario if the computer security professional expects inside security violation, then he/she should have to report the incident to the top management (Damewood, 2011; Brenner, 2011). Bibliography Armor2net Software Ltd. (2011). Why is the computer security important? Retrieved May 07, 2011, from http://www.armor2net.com/knowledge/computer_security.htm Brenner, K. (2011). Few Tips On How To Maintain Computer Security And Preventing Viruses . Retrieved May 09, 2011, from http://www.thecomputerspot.net/few-tips-on-how-to-maintain-computer-security-and-preventing-viruses-2/ Damewood, C. L. (2011). What Does a Computer Security Specialist Do? . Retrieved May 08, 2011, from WiseGeek.com: http://www.wisegeek.com/what-does-a-computer-security-specialist-do.htm Entrust Technologies. (2010). COMPUTER SECURITY FACT SHEET. Retrieved May 08, 2011, from http://www.firstnetsecurity.com/library/entrust/compsecu.pdf HostIP. (2011). Computer Security - Types Of Computer Security Problems. Retrieved May 07, 2011, from http://ecommerce.hostip.info/pages/250/Computer-Security-TYPES-COMPUTER-SECURITY-PROBLEMS.html Kinkus, J. F. (2002). Science and Technology Resources on the Internet Computer Security. Retrieved May 08, 2011, from http://www.library.ucsb.edu/istl/02-fall/internet.html Laudon, K. C., & Laudon, J. P. (2010). Essentials of Management Information Systems. Upper Saddle River, NJ: Prentice Hall. Salek, N. (2008, March 19). Australian companies praised for implementing data security. Retrieved May 06, 2011, from SC Magazine : http://www.scmagazine.com.au/News/106101,australian-companies-praised-for-implementing-data-security.aspx Technology Evaluation Centers inc. . (2011). Integrated Security: A New Network Approach . Retrieved May 10, 2011, from http://security.technologyevaluation.com/articles/integrated-security-a-new-network-approach-part-two-the-shift-toward-integration-8-1749.html Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(Computer Security Research Paper Example | Topics and Well Written Essays - 2250 words - 1, n.d.)
Computer Security Research Paper Example | Topics and Well Written Essays - 2250 words - 1. Retrieved from https://studentshare.org/information-technology/1752533-computer-security-or-ethical-issue-see-laudon-laudon-text-below
(Computer Security Research Paper Example | Topics and Well Written Essays - 2250 Words - 1)
Computer Security Research Paper Example | Topics and Well Written Essays - 2250 Words - 1. https://studentshare.org/information-technology/1752533-computer-security-or-ethical-issue-see-laudon-laudon-text-below.
“Computer Security Research Paper Example | Topics and Well Written Essays - 2250 Words - 1”, n.d. https://studentshare.org/information-technology/1752533-computer-security-or-ethical-issue-see-laudon-laudon-text-below.
  • Cited: 0 times

CHECK THESE SAMPLES OF Computer Security

Protection and Security of a Company

Resources and information are quite important to every organization and therefore security measures are maintained by every organization to keep data secrecy.... Viruses are not only a threat for data security but in order to protect and secure an organization's data a solution or an effective data recovery and backup plan must be maintained by an organization.... security analysts are hired to maintain security in an organization both internally and externally....
5 Pages (1250 words) Essay

The CSI Computer Crime and Security Survey

The Computer Security Institute (CSI) Computer Crime and Security Survey for 2008 as reported by Robert Richardson, CSI Director outlined the latest important facts and trends in regard to network and computer crime. The study was conducted from over 500 respondents –… The respondents were pooled from organizations covering a number of industries, which include government, manufacturing, transportation, telecommunication, education, health services, and The CSI Computer Crime and Security Survey 2008 Summary The Computer Security Institute (CSI) Computer Crime and Security Survey for 2008 as reportedby Robert Richardson, CSI Director outlined the latest important facts and trends in regard to network and computer crime....
1 Pages (250 words) Essay

Hacking Exposed, Underlying Motivation

ooking Inside the BoxThe crime could have been deterred by a more effective and serious Computer Security system.... “They lack some serious Computer Security, and the hard part is learning it.... The criminal act is an opening call for an improvement in the Computer Security of high profile and sensitive organizations to ensure that their systems are ultimately foolproof and safe.... However, he served six months in prison for violation of parole” (IT security, 2010, par....
2 Pages (500 words) Essay

Information Security Skills

Undertaking postgraduate studies in Computer Security is an important academic and career advantage in the modern computing market due its unique position.... Any postgraduate student in Computer Security enjoys a more specialized niche in the huge market of computing needs,… By taking the MSc in Computer Security, the candidate focuses on real global challenges facing the computing world at an advanced specificity.... With respect to the evolution of computing Computer Sciences and Information Technology Undertaking postgraduate studies in Computer Security is an important academic and career advantage inthe modern computing market due its unique position....
2 Pages (500 words) Essay

Computer Security Threats

Therefore, Computer Security threats are capable of interfering with the Computer Security Threats Summery A threat to information assurance can be defined as any instances or possible event with the potential to extremely impact any organizational operations, organizational assets, persons through an information system by the use of unauthorized access, destruction, disclosure, information modification, and denial of service.... Therefore, Computer Security threats are capable of interfering with the normal functioning of the computer systems....
2 Pages (500 words) Essay

Define a Remote Access Policy to Support Remote Health Care Clinics

2001) Insiders are main Computer Security threat.... The security policy of organizations sets specific standards on how business information systems are protected from both external and internal threats.... Defining a particular security policy gives an organization the opportunity to refine and define its collective responsibility… It embraces every sphere of the operations done by the organization and not strictly impinged by information technology....
2 Pages (500 words) Essay

Cracker Control

Moreover, SSID hiding, MAC ID filtering, Static IP addressing, access control and integrity controls, and training on Computer Security can address this problem (Federal Trade Commission, 2011).... Computer Security and Penetration Testing.... umerous security principles or processes can address this problem when effectively implemented.... Other security principles include identifying the kind and purpose of personal information stored in files and on the computer (Federal Trade Commission, 2011)....
1 Pages (250 words) Assignment

ITEC 9 activity

Computer Security refers to information security, which applies to computing devices like smart phones and computers, and computer networks like public and private networks and the internet as a whole.... The growth of technology has led to many security breaches via the use of… Computer Security is involved with the mechanism and processes by which information, digital equipments and services are defended from unauthorized or unintended access, destruction or change, and its importance is growing due to the increased dependence on computer ITEC 9 activity al affiliation ITEC 9 activity Introduction Computer Security refers to information security, which applies to computing devices like smart phones and computers, and computer networks like public and private networks and the internet as a whole....
1 Pages (250 words) Assignment
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us