Preview

Computer Security

Good Essays
Open Document
Open Document
792 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Computer Security
Computer technology permeates most aspects of our lives. The ability to use computer technology and to evaluate electronic information has become a basic skill for most of people.
In most places of business, a computer is standard. In the bank they use computers to look up for account information. They use computers in the auto repair shop to assess the cars. We can't find books in the library by looking in a card catalog — we must use a computerized database. Doctors' offices utilize computers to store patient information. The point is this — no matter what we’re doing, a computer will be a basic tool we will have to use and come with it is an important thing: The Computer security.
Computer security means to protect information. It deals with the prevention and detection of unauthorized actions by users of a computer. Computer security has come to play an extremely vital role in today's fast moving, but invariably technically fragile business environment. Consequently, secured communications are needed in order for both companies and customers to benefit from the advancements that the Internet is empowering us with.
The importance of this fact needs to be clearly highlighted so that adequate measures will be implemented, not only enhancing the company's daily business procedures and transactions, but also to ensure that the much needed security measures are implemented with an acceptable level of security competency when there’re so many threats to the computer out there.
The greatest threat to computer systems and their information comes from humans, through actions that are either malicious or ignorant. When the action is malicious, some motivation or goal is generally behind the attack. For instance, the goal could be to disrupt normal business operations, thereby denying data availability and production. This could happen between two rival companies or even as a hoax. Here is a real life example: April 13, 2000, 3:55 P.M. Pacific time: The Web site for

You May Also Find These Documents Helpful

  • Powerful Essays

    Nt1310 Unit 1 Assignment 1

    • 1434 Words
    • 6 Pages

    Information has become the most valuable asset of any organization. And keeping that information secure is a major factor in the design and development of any computer system. Security is defined by Merriam-Webster as “the state of being protected or safe from harm”. It is up to every organization to insure that their data is protected, and that nothing that is harmful to the company or its clients is compromised.…

    • 1434 Words
    • 6 Pages
    Powerful Essays
  • Satisfactory Essays

    NT2580

    • 526 Words
    • 5 Pages

    All rights reserved. Page 5 Types of Threats  Malicious software  Device failure  Application failure  Natural disaster  Intrusive cracker NT2580 Introduction to Information Security © ITT Educational Services, Inc.…

    • 526 Words
    • 5 Pages
    Satisfactory Essays
  • Good Essays

    [242.1] Select and use appropriate methods to minimise security risk to IT systems and data…

    • 793 Words
    • 4 Pages
    Good Essays
  • Better Essays

    Cyber security must be an aggressive and evolving practice. Not only is it important to put security in place for current technology that can access electronic information, but also to look forward to future trends and strategies. Methods must also be developed that will continuously protect information regardless of growth and technological advances. As trends change and new technology develops it is the responsibility of businesses to balance cost saving measures with adequate security measures.…

    • 1208 Words
    • 5 Pages
    Better Essays
  • Good Essays

    Information Security has come to play an extremely vital role in today’s fast moving but invariably technically fragile business environment. Consequently, secured communications and business are needed in order for both Cooney Hardware Ltd. and our customers to benefit from the advancements the internet has given us. The importance of this fact needs to be clearly highlighted, not only to enhance the company’s daily business procedures and transactions, but also to ensure that the much needed security measures are implemented with an acceptable level of security.…

    • 676 Words
    • 2 Pages
    Good Essays
  • Better Essays

    Cis 333 Final Term Paper

    • 2531 Words
    • 11 Pages

    In today’s IT world every organization has a responsibility to protect the information and sensitive data they have. Protecting data is not only responsibility of security and IT staff but every individual is involved in protecting the information. The risks to information security are not digital only, but it involves technology, people and process that an organization may have. These threats may represent the problems that are associated to complex and expensive solution, but doing nothing about these risks is not the solution.…

    • 2531 Words
    • 11 Pages
    Better Essays
  • Powerful Essays

    In a global economy, businesses thrive with good Information technology infrastructures. Information technology plays vital roles in successful businesses. Although tools like online advertising, and e-commerce can help businesses thrive in today’s global economy. However, this paper will focus on the importance of Information security functions within Ecolab’s IT organization. Furthermore, the impacts of information security functions from a business perspective will be discussed.…

    • 1661 Words
    • 7 Pages
    Powerful Essays
  • Good Essays

    Week 5 you decide

    • 928 Words
    • 4 Pages

    Security is an ever moving target that must be continually managed and refined to ensure appropriate confidentiality, integrity, and availability of services and systems that are critical to business, as well as the valuable data.…

    • 928 Words
    • 4 Pages
    Good Essays
  • Powerful Essays

    Network Security

    • 581 Words
    • 3 Pages

    1. A(n) hub____ is a standard network device for connecting multiple Ethernet devices together by using twisted-pair copper or fiber-optic cables in order to make them function as a single network segment.…

    • 581 Words
    • 3 Pages
    Powerful Essays
  • Good Essays

    A computer security career is a highly diverse and important position, where you could work anywhere from a College Campus to a Hospital Administration building, all the way up to the Government Agencies all over the world. With so many new businesses’ opening daily, worldwide, the job market will be forever expanding. Whenever a business’s computer system acts up it’s the job of their computer security specialist to carefully take all the required steps to identify and resolve the specific issue, combining many people into one, saving the company lots of money. These specialists have and exceptional and advanced overall knowledge of all things computer.…

    • 525 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    • CYBERCRIME is formally defined as any criminal action perpetrated primarily through the use of a computer. • CYBERCRIMINALS are individuals who use computers, networks, and the Internet to perpetrate crime. • The existence of cybercrime means that computer users must take precautions to protect themselves.…

    • 5495 Words
    • 157 Pages
    Powerful Essays
  • Satisfactory Essays

    Security

    • 409 Words
    • 2 Pages

    Michael Nhan SE578-Practices for Administration of Physical & Operations Security Prof: Rodney Smith How do Administrative, Technical, and Physical Controls introduce a false sense of security? According to research and studies, the leading broadband providers have accumulated a total of over 17.4 million high-speed Internet subscribers in the US” This means that in the United States alone there are more than 17 million computers with fast connections most of which are connected to the Internet 24 hours a day, 7 days a week and that number continues to grow. Having a false sense of security is very common among consumers who own and operate a PC within their homes. Nothing is ever secured. I would never say something is secured within the terms of information security. Administrative, Technical, and Physical introduce a false sense of security by the idea of what we use to safeguard sensitive data and protect consumers’ privacy. The idea of purchasing a virus protection identifies that all personal information will be safeguarded and protected, which gives consumers a false sense of security. Having a false sense of security means that I entrust beliefs that I’m guaranteed protection at all times and, that I should not be concerns about my computer being compromised because I took the necessary precautions in purchasing a virus protection. What are the consequences to the strategy if there are no verification practices? disclosure of proprietary corporate information. What can a firm do to bolster confidence in their Defense-in-Depth strategy? How do these activities relate to “Best Practices”? How can these activities be used to demonstrate regulatory compliance? Sarbanes-Oxley_Act. (n.d.). Wikipedia, the free encyclopedia. Retrieved September 21, 2008, from Reference.com website: http://dictionary.reference.com/browse/Sarbanes-Oxley_Act M2PressWIRE; 08/12/2008 Dublin: “Data New Report Details the Data Center Automation Solutions Market for 2007-2010"…

    • 409 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    Computers began from a wild imaginative idea to the world’s highly prioritized tool. Computers today are now used as a substitute to manual processes and other past inventions like the radio, television, etc. It is now used by people for much simpler, easier and faster way to do things. Some used it as a hobby, and some use it as a job.…

    • 1287 Words
    • 6 Pages
    Powerful Essays
  • Satisfactory Essays

    The last two decades have witnessed a dramatic increase in the utilization of computer devices almost everywhere. It is indisputable that it has brought significant benefits to our lives in many spheres such as economics and science. However, it is also alarming as to whether we are becoming increasingly dependent on computers or not. As far as I am concerned, I believe that computers are playing a highly important role in our modern life and we need not doubt their advantages.…

    • 339 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    Computers began from a wild imaginative idea to the world’s highly prioritized tool. Computers today are now used as a substitute to manual processes and other past inventions like the radio, television, etc. It is now used by people for much simpler, easier and faster way to do things. Some used it as a hobby, and some use it as a job.…

    • 2018 Words
    • 9 Pages
    Powerful Essays