Preview

General Computer Security

Good Essays
Open Document
Open Document
2174 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
General Computer Security
General computer security
Presented by developerWorks, your source for great tutorials ibm.com/developerWorks

Table of Contents
If you're viewing this document online, you can click any of the topics below to link directly to that section.

1. Tutorial tips 2. Security concepts 3. Physical security 4. Logistical security 5. Data security 6. Technical security 7. Overview and summary 8. Feedback

2 3 5 6 7 9 11 12

General computer security

Page 1

Presented by developerWorks, your source for great tutorials

ibm.com/developerWorks

Section 1. Tutorial tips Should I take this tutorial?
The objective of this tutorial is to give an overview of the security process surrounding computer systems. It is aimed at the computer professional who may or may not already have some security background. This tutorial is general in scope. Many of the issues covered here will be examined in more depth in future tutorials.

Tutorial navigation
Navigating through the tutorial is easy: * Use the Next and Previous buttons to move forward and backward through the tutorial. * Use the Main menu button to return to the tutorial menu. * If you'd like to tell us what you think, use the Feedback button. * If you must stop and want to resume on a specific panel, use the Section menu to find your place again.

About the author
Larry Loeb has been writing and consulting since the 20th century about computer topics. He has published a book on SET, the protocol developed by Visa and MasterCard for secure electronic transactions. He can usually be contacted at larryloeb@prodigy.net .

General computer security

Page 2

Presented by developerWorks, your source for great tutorials

ibm.com/developerWorks

Section 2. Security concepts Security is spherical
Computer systems can never have absolute security in real life. They exist to be used; not to be admired in a locked room sealed away from the outside world. Systems can, however, be made more secure than they

You May Also Find These Documents Helpful

  • Powerful Essays

    Pos420 Final Paper

    • 2424 Words
    • 10 Pages

    When beginning a discussion of computer security, a number of variables come into play. From patch availability to OS popularity, antivirus offerings, user/administrator knowledge and even physical user controls, many elements must be considered to create a computing environment that is secure. While Windows and Linux each have their advantages and disadvantages, neither operating system is, at its core, more or less safe than the other from attacks and data theft. All operating systems have vulnerabilities before they ever ship, and it is up to the administrator of those systems to maintain a level of security that protects the valuable data stored on those servers.…

    • 2424 Words
    • 10 Pages
    Powerful Essays
  • Good Essays

    Week 3 Assignment Bsa 375

    • 361 Words
    • 2 Pages

    Architecture design is used to define how options can be used to improve the hardware and software specifications. This paper will describe the application architecture and process design. A detailed observation is necessary to determine what kind of hardware can accommodate the software and it is a critical part of the system development life cycle. A high-level explanation of the security controls suggestions will be included.…

    • 361 Words
    • 2 Pages
    Good Essays
  • Good Essays

    Sunica Music

    • 697 Words
    • 3 Pages

    Due in Week One: Give an overview of the company and the security goals to be achieved.…

    • 697 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    Nt1310 Unit 1 Assignment 1

    • 1434 Words
    • 6 Pages

    This course covers much material about information security in a few short weeks. Whereas the subject is much deeper than what is covered in the course material, you should obtain a useful overview of how important effective information security is, and some ways it can be effectively…

    • 1434 Words
    • 6 Pages
    Powerful Essays
  • Satisfactory Essays

    NT2580

    • 526 Words
    • 5 Pages

    Introduction to Information Security © ITT Educational Services, Inc. All rights reserved. Page 2 Key Concepts  Attacks, threats, and vulnerabilities in a typical IT infrastructure …

    • 526 Words
    • 5 Pages
    Satisfactory Essays
  • Better Essays

    The internet has pervaded every aspect of business and Kudler Fine Foods has used it as a tool to further their goals. Wireless technology should be the next stepping stone for Kudler to use to advance in their field, and much like most new technologies the use of wirelessly connected devices can pose a number of security concerns. The benefits of having connectivity throughout the enterprise can outweigh the security concerns that wireless technology can pose. There are certain steps that can be taken to mitigate most of the concerns of having wirelessly connected devices on the network and these steps will be touched upon along with some of the major threats.…

    • 1352 Words
    • 6 Pages
    Better Essays
  • Good Essays

    operations in organisations and business environments. Security threats on the remote machines can always be averted easily and their impacts are not as serious compared to threats on the central computer system (Kaufman et al, 2002).The central computer system is a valuable resource that must be secured to ensure continued operation in the organisation. Securing a central computer network is the key to ensuring network security in any institution (Kaeo, 1999).…

    • 349 Words
    • 2 Pages
    Good Essays
  • Good Essays

    With the use of computers and networks, there is also a large focus on security. Whenever there is sensitive data being stored and transferred through computer networks, there is the risk of unauthorized individuals gaining access to this information. To lower these chances, we have several different pieces of software and also require multiple passwords that are unique to each authorized individual and a requirement to change the passwords…

    • 791 Words
    • 4 Pages
    Good Essays
  • Good Essays

    german history

    • 22532 Words
    • 91 Pages

     IT tip: If you are using this document or the course handbook electronically, the Navigation Pane is helpful. On the View tab at the top of your screen, tick the box next to Navigation Pane in the Show menu, and the contents list will appear on the left of your screen. You can then click on different sections to move around the document easily.…

    • 22532 Words
    • 91 Pages
    Good Essays
  • Good Essays

    Bluefin Tuna Effect

    • 1534 Words
    • 7 Pages

    Some around the world enjoy eating a lot of food; they try to discover some new food from the different countries. Sushi is one kind of food to make people like to eat; it is a famous food in Japan and around the world: America, China, and the others. Sushi has some ingredients: rice, seaweed sheets, seafood, vegetables, and tropical fruit sauce. However Bluefin tuna sushi is the best to make some like the most. As a result, at this time some want to have more Bluefin tuna so that over ten hundred of thousand dollars people can buy a Bluefin tuna (Richardson). Since the high demand and price have stimulated, some fishermen work hard to catch more and more Bluefin. What is the happening? The overall ecosystem and economy the world are influenced…

    • 1534 Words
    • 7 Pages
    Good Essays
  • Better Essays

    Stallings, W., & Brown, L. (2012) Computer security: Principles and practice (2nd ed.). Boston, MA: Pearson.…

    • 1167 Words
    • 4 Pages
    Better Essays
  • Good Essays

    A computer security career is a highly diverse and important position, where you could work anywhere from a College Campus to a Hospital Administration building, all the way up to the Government Agencies all over the world. With so many new businesses’ opening daily, worldwide, the job market will be forever expanding. Whenever a business’s computer system acts up it’s the job of their computer security specialist to carefully take all the required steps to identify and resolve the specific issue, combining many people into one, saving the company lots of money. These specialists have and exceptional and advanced overall knowledge of all things computer.…

    • 525 Words
    • 3 Pages
    Good Essays
  • Better Essays

    Cmgt400 Week 3

    • 1752 Words
    • 8 Pages

    References: Conklin, A., White, G., Williams, D., Davis, R., & Cothren, C. (2012). Principles of Computer Security: Comp TIA Security + and Beyond (third ed.). Boston, MA: McGraw-Hill Company.…

    • 1752 Words
    • 8 Pages
    Better Essays
  • Powerful Essays

    college algebra

    • 1862 Words
    • 11 Pages

    References: Wm. Arthur Conklin, G. W. (2012). Principles of Computer Security: CompTIA Security+™ and Beyond (Exam SY0-301), Third Edition. In G. W. Wm. Arthur Conklin, _Principles of Computer Security: CompTIA Security+™ and Beyond (Exam SY0-301), Third Edition_ (p. Chapter 20). McGraw-Hill Company.…

    • 1862 Words
    • 11 Pages
    Powerful Essays
  • Powerful Essays

    Unit 2 Assignment 2

    • 1463 Words
    • 6 Pages

    - Security issues for particular data systems and information processing facilities, given business needs, anticipated threats and vulnerabilities;…

    • 1463 Words
    • 6 Pages
    Powerful Essays