Preview

computer

Good Essays
Open Document
Open Document
873 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
computer
UNIVERSITY OF LA VERNE
La Verne, CA

July 25, 2014

Research paper
Computer Security

Submitted in partial fulfillment of the requirements for the degree of Master of MBA

Professor Yehia Mortagy
BUS 510 Management of Information Technology

RUI GAO
11560047

College of Business and Public Management

ABSTRACT
In the modern society, information can benefits both groups and individuals in many different areas. Whereas, at the same time, information also can be used to bring out a threat or even an act of war such as if a cyber attack which take down our financial systems or government systems. Computer security arouses the ethics and risk analysis, and is concerned with topics such as computer crime, the prevention, detection, remediation of attacks, identity and anonymity in cyberspace. In this paper, I want discuss the main problems of computer security and its serious threats.

Computer security, also known as cyber security or IT security, is information security as applied to computing devices such as computers and smartphones, as well as computer networks such as private and public networks, including the Internet. Computer security, which is the composition of hardware, software network system and the safety of delivering information through network, has been an essential issue. Computer security has not only technical problems but also management problems, and at the same time, both of them affect each other.
The major technical areas of computer security are usually represented by the initials CIA: confidentiality, integrity, and authentication or availability. Confidentiality means information cannot be access by some parties unauthorized. It is a kind of secrecy or privacy, which breaches of confidentiality range from the embarrassing to the disastrous. Integrity means that information is protected in order to against unauthorized changes that are not detectable to authorized

You May Also Find These Documents Helpful

  • Powerful Essays

    Nt1310 Unit 1 Assignment 1

    • 1434 Words
    • 6 Pages

    Information has become the most valuable asset of any organization. And keeping that information secure is a major factor in the design and development of any computer system. Security is defined by Merriam-Webster as “the state of being protected or safe from harm”. It is up to every organization to insure that their data is protected, and that nothing that is harmful to the company or its clients is compromised.…

    • 1434 Words
    • 6 Pages
    Powerful Essays
  • Good Essays

    Information security includes the protection of information assets in storage, processing, or transmission. To assure the security of things such as schools, prisons, toads, and power plants, the confidentiality and integrity of information must be protected.…

    • 982 Words
    • 4 Pages
    Good Essays
  • Better Essays

    Cmgt 400 Week 2

    • 1100 Words
    • 3 Pages

    The internet is approximately 40 years old and is continuing to grow at a rapid pace. This rapid growth and use of the internet for practically everything you can do in life has also cause a major increase in threats. Cyber-criminals are often breaking into security on many major websites and making the news. Information Security is turning into an important part in protect a business’s information.…

    • 1100 Words
    • 3 Pages
    Better Essays
  • Better Essays

    Cis 333 Final Term Paper

    • 2531 Words
    • 11 Pages

    In today’s IT world every organization has a responsibility to protect the information and sensitive data they have. Protecting data is not only responsibility of security and IT staff but every individual is involved in protecting the information. The risks to information security are not digital only, but it involves technology, people and process that an organization may have. These threats may represent the problems that are associated to complex and expensive solution, but doing nothing about these risks is not the solution.…

    • 2531 Words
    • 11 Pages
    Better Essays
  • Powerful Essays

    The information in this paper will investigate the elements involved in computer security. Protecting information today requires more than just locking a door or filing cabinet. With data being stored electronically, it is vital that important information be protected from prying eyes. There are many different methods for protecting information that is stored on computers. These methods include everything from password and usernames to biometric devices. There are also software solutions that are used, including antivirus and anti-malware software along with firewalls. All of this is to accomplish the desired…

    • 1544 Words
    • 7 Pages
    Powerful Essays
  • Satisfactory Essays

    computer

    • 269 Words
    • 2 Pages

    Technical skills are most important at lower organizational levels while human skills become more important as managers move up the organizational hierarchy.…

    • 269 Words
    • 2 Pages
    Satisfactory Essays
  • Better Essays

    The novel Lord of the Flies composed by William Golding tells a fictional story about several boys that are stranded on an island, as a result of being in a plane crash. Initially, the group of boys try and build a civilization based off of the supplies that they can access. However, many of them get drafted into using using the resources that their former ancestors have recycled. In a result to this, the boys switch into groups. While one group behaves calmly, and uses teamwork to keep order and accomplish goals, the other group uses violence and chaos. Civil v. Savage is separated by both leaders Jack and Ralph. Civil relating to Ralph and the other involving Jack. While Ralph uses his power to create regulations and apply respectable codes…

    • 1059 Words
    • 5 Pages
    Better Essays
  • Good Essays

    Page 5 Compliance and Operational Security................................. Page 6 Risk Management..................................................................... Page 7 Managing Security Incidents.................................................. Page 8 Business Continuity and Disaster Recovery Planning...... Page 8 Fundamentals Information Security Information security refers to the protection of available information or information resources from unauthorized access, attacks, thefts, or data damage.…

    • 5718 Words
    • 23 Pages
    Good Essays
  • Powerful Essays

    Internet security is a division of actions aimed at securing information based on computers and in transit between them. In the modern environment the two subjects are intimately linked. Neither computers nor the networks that connect them are inherently secure. Computers were subject to attack before the Internet became a public utility—because illegitimate software hidden on commercial diskettes could be fashioned to load itself on a computer and play havoc with data in memory or placed on a fixed drive. The Internet, by its very nature—initially conceived of as an open network to facilitate free exchange of ideas and information—is vulnerable. According…

    • 3034 Words
    • 13 Pages
    Powerful Essays
  • Satisfactory Essays

    computers

    • 1169 Words
    • 4 Pages

    Summarize the case study, being sure to describe the underlying problem(s) of the collapse of the system…

    • 1169 Words
    • 4 Pages
    Satisfactory Essays
  • Good Essays

    Web security means to keep your information in your control. In other words, cannot gain access to it by anyone else without your permission. The most people want to preserve the privacy of sensitive their information such as passwords and credit card information and the inability of others to access. The goal of the process of protection is to reduce the number of threats that harm the network. In this essay I will high light many points which are: the goals essential to the security of web CIA model, the classified types of threats and attacks, hacker web page and how to hacker by the virus, and firewall.…

    • 898 Words
    • 4 Pages
    Good Essays
  • Good Essays

    Computer

    • 1114 Words
    • 5 Pages

    (a) Calculate the exact value of : (2⅓ - 1⅚) ÷ 1⅓ (4 marks)(b)The simple interest on $15 000 for 4 years is $8100. Calculate the rate per centper annum. (3 marks)(c) The sum of $2500 is divided among Peter, Queen and Raymond. Raymondreceived half, Peter received $312.50 and Queen received the remainder.Calculate (i) Raymond’s share(ii) Queen’s share…

    • 1114 Words
    • 5 Pages
    Good Essays
  • Powerful Essays

    Computer

    • 17984 Words
    • 72 Pages

    Contents ....................................................................................................................................................... 1 Introduction .................................................................................................................................................. 3 Cisco Security Management Tools ........................................................................................................... 4 Control of Data ......................................................................................................................................... 4 Security Policy........................................................................................................................................... 5 Risk............................................................................................................................................................ 6 System Development Life Cycle (SDLC) .................................................................................................... 6 Understanding the Risks ............................................................................................................................... 7 Layer 2 risks .............................................................................................................................................. 8 Layer 3 risks .............................................................................................................................................. 9 Upper Layer risks .................................................................................................................................... 11 Physical ................................................................................................................................................... 12 Configuring Devices…

    • 17984 Words
    • 72 Pages
    Powerful Essays
  • Satisfactory Essays

    In this age where the use of computers and networks related to them has become commonplace, there has developed problems concerning cyber security. Cyber security is an important factor to be considered if one is to be able to protect oneself from malicious people and software from the internet. Most of the threats to computer networks come from the internet and these are often intentional, having been developed by people with malicious intent. Cyber security is, therefore, an attempt by individuals to protect their personal information and other digital assets from attacks from the internet.…

    • 375 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    computer

    • 382 Words
    • 2 Pages

    A computer is a general purpose device that can be programmed to carry out a set of arithmetic or logical operations automatically. Since a sequence of operations can be readily changed, the computer can solve more than one kind of problem.…

    • 382 Words
    • 2 Pages
    Satisfactory Essays