StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...

Computer Security Information Risk Assessment & Security Management - Essay Example

Cite this document
Summary
In today's world Computers are used to store and process a variety of confidential information like financial data, records of criminals and the crimes committed by them, medical history of patients, social security data, a company's personnel and payroll data, inventory and sales data, weather data, troops deployment data, missile deployment data, satellite surveillance obtained topographical data, etc…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER95.8% of users find it useful
Computer Security Information Risk Assessment & Security Management
Read Text Preview

Extract of sample "Computer Security Information Risk Assessment & Security Management"

Download file to see previous pages

Before computers became ubiquitous, confidential information was stored in documents, photographs, audio or video tapes, etc. The confidentiality was ensured by keeping these items in locked safes, bank vaults, dual control safes, etc. This is prevalent to some extent even today. With Computers becoming ubiquitous, documents are now largely electronic. To preserve their integrity and confidentiality, recourse is made to password protection, data encryption, firewalls, intrusion detection software, etc. (Parker. B, Donn.

Microsoft Encarta, n. d.) This is the age of the World Wide Web. Nowadays, almost every person having a vehicle loan, a housing loan, a credit or debit card, and automated teller machine card, a social security number, a passport, a driving license, a telephone connection, etc, has to provide detailed personal information to the agency or authority, which provides that particular facility or service. Most if not all such information is in electronic form and stored in some centralized Computer's Database.

The crux of the problem is this electronic form of personal data. If a hacker succeeds in his hacking attempt then all such confidential data can be viewed, changed or destroyed by the hacker. There exist a vast number of such co. software such as automatic computer virus generators, internet eavesdropping sniffers, password guessers, vulnerability testers and computer service saturators to further their criminal ends. Adoption of such methods makes identity theft, fraudulent withdrawals from a bank account, fraudulent electronic funds transfer, etc, possible.

A vast amount of confidential data is regularly exchanged between governmental agencies and financial institutions like banks and other corporations. This transfer of information usually takes place between computers located in different and far off places. In the 1970's Horst Fiestel of IBM, developed an encryption system known as Lucifer. In 1977, the U.S National Bureau of Standards developed an encryption standard known as the Data Encryption Standard. In 1997, the NIST developed the Advanced Encryption Standard.

The use of these methods makes the encrypted message almost impossible to decipher. Unfortunately, this is used by terrorists and international criminals to plan and execute their nefarious activities. (Sutton. G, William, Rubin .D, Aviel, Microsoft Encarta, n. d.)The world is becoming increasingly networked. In this scenario, data encryption algorithms of increasing complexity are ensuring the secure transmission of information across Computer Networks. Password protected logins, firewalls, anti - spy ware like intrusion detection systems, anti - virus, application safeguards like generation of checksums, use of maker checker concept in financial transactions, authentication message source, use of roles and privileges, limit on transaction amount, redundancy of backups, parallel databases and the physical security of hardware.

In addition to this, a mock disaster recovery drill should be conducted on a regular

...Download file to see next pages Read More
Tags
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Computer Security Information Risk Assessment & Security Management Essay”, n.d.)
Retrieved from https://studentshare.org/business/1527372-computer-security-information-risk-assessment-security-management
(Computer Security Information Risk Assessment & Security Management Essay)
https://studentshare.org/business/1527372-computer-security-information-risk-assessment-security-management.
“Computer Security Information Risk Assessment & Security Management Essay”, n.d. https://studentshare.org/business/1527372-computer-security-information-risk-assessment-security-management.
  • Cited: 0 times

CHECK THESE SAMPLES OF Computer Security Information Risk Assessment & Security Management

Information Security Issues

The management of Information Security Risks and to implement various methodologies to mitigate the security risks is a growing challenge in the filed of Information technology.... ecurity management and ResponsibilitiesData OwnerEach Line Department of the company, with its own computing facilities will appoint a senior member of the staff as Data Owner.... anagement ResponsibilitiesThe management plays the most important part in building a successful IT infrastructure (Royce, 1998)....
11 Pages (2750 words) Essay

Information Security Management

The management having been briefed of the challenges being faced within the firm, they decided to appoint a team of IT experts led by the IT systems administrator to look into the situation and address the matter amicably before it got out of... A group of staff members was set up to create recommendations on ways to improve a) the security of the information system, and b) the confidentiality of data, prevention of disaster, and safe storage devices. An appropriate judgment had to be put in place to ensure that team… The evaluation of risks has to be put in place to address the challenges....
24 Pages (6000 words) Essay

Information Security Risk and the Possible Threats to Information Security

The paper describes information security risk as any danger that may lead to the loss or damage of information.... While determining the course of action to be taken in maximizing security, the current activities and performance of the current information systems should be properly scrutinized.... This means that the information concerning these organizations can be accessed from any place in the whole world.... The most common threat to information is computer viruses....
7 Pages (1750 words) Research Paper

Methods Available for Maintaining Computer System Security

Therefore, computer security is a must in every field.... computer security can be achieved in different ways such as by using an anti-malware program, by using cryptography technique to encrypt the data, and also various other methods.... Therefore, a total solution for any computer security system has to meet the three requirements like integrity, secrecy or confidentiality, and availability.... This separation can be achieved by involving three subproblems as a part of computer security i....
8 Pages (2000 words) Coursework

Identifying Threats and Vulnerabilities to Computer

The study "computer security" concerns an example of how security lapses can occur and expose the system's vulnerabilities.... Security encompasses the elements of keeping information confidential and of upholding the integrity and availability of resources; these three elements are often used to describe computer security goals (Stallings 2009).... computer security gives rise to the notion of protecting systems from a technological point of view, as well as making systems more secure on the basis of the human factors (Trček 2006)....
6 Pages (1500 words) Report

Computer Security

The paper gives detailed information about the computer security.... This paper presents a detailed overview of computer security.... This paper discusses how computer security has become an important issue for the companies.... In view of the fact that the word computer security is employed regularly; however, the framework of a computer system is defenseless to a number of threats except the system is linked with more computer systems using some sort of network arrangement....
9 Pages (2250 words) Research Paper

Personal Computing Situation Security Assessment

… The paper “Personal Computing Situation security Assessment”  is an exciting example of an essay on information technology.... This is a report on a security assessment conducted on my personal computing situation with regards to the different gadgets, computers, and cloud storage servers.... The security assessment will be done on home computers, personal laptops, smartphones, etc.... The paper “Personal Computing Situation security Assessment”  is an exciting example of an essay on information technology....
8 Pages (2000 words) Essay
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us