StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

The Myth of Secure Computing by Austin and Christopher - Article Example

Cite this document
Summary
This paper presents digital security which is gaining importance nowadays as all business processing is shifted to a computerized setup. Austin and Christopher in their article, “The Myth of Secure Computing”, inform about the state of digital security in companies nowadays…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER94.4% of users find it useful
The Myth of Secure Computing by Austin and Christopher
Read Text Preview

Extract of sample "The Myth of Secure Computing by Austin and Christopher"

Digital security is gaining importance nowadays as all business processing is shifted to a computerized setup. Austin and Christopher in their article, “The Myth of Secure Computing” (2003), inform about the state of digital security in companies nowadays. Digital security is given least importance in any business setup ignoring the fact that every year companies face heavy financial losses on the basis of security breaches. Austin and Christopher inform that companies have developed networks for their day-to-day processing and separate IT departments with IT heads are there to control any kind of digital issues.

However, the amount of money spent on digital security is only 5 to 10 percent of a company’s total expenditure due to which, there are risky security concerns. There are many threats to digital security, which are as follows:Network Attacks, which are responsible for slowing network functions and disrupting online performance, are common threats to digital security that can result in big financial losses for the company. Network attacks are external.Intrusions are internal attacks and are more dangerous than network attacks as the intruders can use the same rights to alter or damage data as authorized users.

Intrusions can cause not only monetary but also data leakage loss.Malicious Codes are in form of viruses and worms that keep the capacity of destructing a company’s whole network. Company’s data can be erased wholly because of viruses and worms.All kinds of threats are highly dangerous and need to be analyzed in advance. The IT department of a company needs to be highly efficient in identifying all kinds of threats and the level of security that should be provided to each and every asset.

An operational approach needs to be followed in order to secure the company, its assets and its reputation from any digital security breach. Risk management should be there in order to check the possible risks to a company’s digital security and to control them in time. The IT department is required to keep continuous check to day-to-day processing. If software programs are used in a company, they must be tested regularly. The coding, testing and implementation process should not be conducted with proper care and efficiency.

The IT staff should be well equipped with all concerned knowledge about IT state of the company and required security measures.The writers of the article have pointed towards a crucial issue that needs attention to detail. The companies working today are computerized mostly and have their own networks due to which, they are in need of digital security measures so that they face minimum security breaches and can control any intrusion in order to save them from big losses. The article is an affective write-up and needs attention.

ReferencesAustin, Robert D. and Christopher, A. R. (June 2003). The Myth of Secure Computing. Harvard Business Review 81 (6)

Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“The Myth of Secure Computing by Austin and Christopher Article”, n.d.)
Retrieved from https://studentshare.org/design-technology/1563095-write-a-report-on-the-article
(The Myth of Secure Computing by Austin and Christopher Article)
https://studentshare.org/design-technology/1563095-write-a-report-on-the-article.
“The Myth of Secure Computing by Austin and Christopher Article”, n.d. https://studentshare.org/design-technology/1563095-write-a-report-on-the-article.
  • Cited: 0 times

CHECK THESE SAMPLES OF The Myth of Secure Computing by Austin and Christopher

Protection of Human Rights

Sovereignty rests in the hands of the people, according to Locke and he believes that the “law of nature” wills the “peace and preservation” of all mankind, so that one man is obliged to do no harm to another.... Under natural law, every person has a right to execute the… Rousseau believed that man was a “natural savage” and that freedom was vital to his development, with laws being framed through a common According to Feldman, individual rights must be balanced against social goals3 and he views human rights as being linked to the conditions necessary for a democracy; human rights “help to establish the conditions of free speech, tolerance, equality and mutual respect for people's dignity…”4 Locke lays the foundation of a civil society upon the premise that people surrender their natural freedoms to a system of common laws in order that they receive the protection of the Government and it is this system of laws that restrains them from harming others to enforce their natural laws....
37 Pages (9250 words) Essay

Pricing strategy of ipos and what are the reason behind failure in ipos in india

I, ……………( , certify that this dissertation is my own work, based on my personal study and / or research, and that I have acknowledged all material and sources used in the preparation of this assignment whether they be books, articles, reports, lecture… I also certify that this dissertation has not previously been submitted for assessment in any other course or at any other time in this course, unless by negotiation, and that I have not copied in part or I am aware of the policy on plagiarism and can understand its implications....
40 Pages (10000 words) Essay

Human Rights and Sustainable Development in Modern Africa

The paper "Human Rights and Sustainable Development in Modern Africa" presents a review on the role of human rights protection in Africa and considers the extent to which human rights and the rule of law in the continent impact sustainable development.... hellip; The post-colonial development of contemporary Africa has reiterated the debate on the interrelationship between sustainable economic development and human rights compliance on the African continent (Ukaga & Afoaku, 2005)....
6 Pages (1500 words) Research Proposal

Austin Farrer Can Myth be Fact

The origin of myth dates to the olden times and it is through explanation that it is learnt that myths are closely associated with reality and it is the analysis of the myth in a broad term Can Myth Be Fact” by austin Farrer Myths are tales that are known to be stories running since generations.... The time when the myth was written is not actually significant but rather it is the concept… Myths bear a long history of development.... The time when the myth was written is not actually significant but rather it is the concept and the idea of the legend that is important....
2 Pages (500 words) Essay

Theme of Education in Emma and Northanger Abbey

Jane austin is definitely one of the exceptional novelist who portrayed the life of woman and children more powerfully and successfully dragged the attention of her readers into the problems of the influence of the society in influencing her own characters.... But Most critique regards Jane austin as a writer of pure novels concentrating upon human beings and their mutual relations.... The same happens in the life of Jane austin when she produced her characters...
9 Pages (2250 words) Coursework

Persuasion by Jane Austen

It must not be, if by any fair interference of friendship, any representations from one who had almost a mother's love, and mother's rights, it would be prevented” (austin 23).... Persuasion by Jane Austen“Anne Elliot, with all her claims of birth, beauty, and mind, to throw herself away at nineteen; involve herself at nineteen in an engagement with a young man, who had nothing but himself to recommend him, and no hopes of attaining affluence, but in the chances of a most uncertain profession, and no connexions to secure even his farther rise in the profession, would be, indeed, a throwing away, which she grieved to think of!...
2 Pages (500 words) Assignment

Austin Farrers Theory of Images

This work "austin Farrer's Theory of Images" describes images that have an important role in the natural knowledge of God by conducting a deep analysis of Farrer's two articles, "Can Myth be Fact?... hellip; As austin Farrer briefly put it in his Images and Inspiration, “The great images interpreted the events of Christ's ministry, death, and resurrection, and the events interpreted the images; the interplay between the two is a revelation” (Farrer 1948, 43)....
7 Pages (1750 words) Report

Building a Secure Computing System

This assignment "Building a secure computing System" presents information security as inclusive of data security, information security management, network security, and data security.... The protection of confidentiality is facilitated by the execution of the following measures; secure document storage, end users education, the classification of information, and the use of general security policies.... Security in terms of information technology refers to the state or quality of data being secure....
8 Pages (2000 words) Assignment
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us