StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Elements of Computer Security - Research Paper Example

Cite this document
Summary
Running Head: Elements of Computer Security Elements of Computer Security Elements of Computer Security Without any doubts, the key purpose of any computer security system is to ensure that its users and stakeholders could be a part of a safe and reliable computing environment…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER96.7% of users find it useful
Elements of Computer Security
Read Text Preview

Extract of sample "Elements of Computer Security"

Running Head: Elements of Computer Security Elements of Computer Security [Institute’s Elements of Computer Security Without any doubts, the key purpose of any computer security system is to ensure that its users and stakeholders could be a part of a safe and reliable computing environment. With the increasing usage of computers and their ever-increasing role in human lives, computer security has become an area of great concern for organizations, institutions and even individuals (Gollmann, 2011).

This paper is an attempt to explore the key elements of computer security in light of the concerning available literature. Availability has been identified as one of the most important elements of a computer security system. Quite understandably, computers have become critical to humans in so many different ways that our lives are dependent upon them. The last thing that a computer user would expect is the failure of its computer security system at any given moment. Computer security systems are employed for constant, fulltime, and round the clock security and not on temporary basis (Lehtinen, Russell & Gangemi, 2006).

Consider the example of the security systems, which failed to protect their host computers from the outbreak of CIH virus that using deleting bits and parts of flashable BIOS areas. The experts claim that the security system was intact although, it failed to perform at those given moments due to technical reasons. The same is no longer acceptable today. Therefore, availability remains a key element of the computer security system (Shim, Qureshi & Siegel, 2000). Computer security systems should also attempt towards maintaining a balance between security and confidentiality of the members of the system.

It is highly likely that every system will face or provoke a certain degree of conflict between the management and experts trying to secure the system by leaving no stone unturned and users would try to ensure that they face minimum interference in their private lives or minimum exposure of their confidential information. Organizations and managers then have to find a middle ground between the demands of both the parties (Bishop, 2003). Therefore, “privacy” is yet another crucial element of computer security.

Furthermore, “confidentiality” also is a corresponding element to privacy, which refers to ensuring the fact that unauthorized people or outsiders should not get the chance to access the confidential information. There are no doubts in the fact that leakage of confidential information to outsiders or people with other motives may result in extreme damages to businesses and personal lives (Lehtinen, Russell & Gangemi, 2006). Much of the concerned literature about computer security recognizes “integrity” as an important element of computer security.

Quite understandably, computers hold information and data and any corruption, alteration or deletion of the data may decrease the value of the information greatly (Bishop, 2003). Losing data of any sort can be extremely devastating since in many cases, it becomes almost impossible to recover that data or prove that the recovered data is authentic and reliable. Therefore, the expectation from any computer security is that it protect that information in such a way that it remains intact at all times (Lehtinen, Russell & Gangemi, 2006).

Another less widely discussed element of computer security is its “cost effectiveness”. Organizations usually spend hundreds and thousands of dollars on ensuring that their computer security systems are effective enough to secure them from threats. However, equally important is to assess its efficiency (Gollmann, 2011). A computer security system trying to prevent the fire may be costing the company in thousands of millions but on the other hand, fire fighting with the threats that have already affected the computer may cause the company only a few hundreds of dollars.

Therefore, it is important to ensure that the security system is providing more benefits than the direct and indirect costs incurred by the institution or organization in employing that security system (Shim, Qureshi & Siegel, 2000). A soft element of computer security is “deterrence”. With a security system in place, one can observe lesser chances that people will actually step up to try that security system. Placing the security system provokes a sense of fear amongst the potential hackers.

If any system fails to do the same, then it either means that there are problems with the system itself or perception of the people regarding its strength and effectiveness are not up to the mark (Lehtinen, Russell & Gangemi, 2006). Recent writers and experts on the subject matter also stress “periodic reassessment” as an important element of computer security. The security requirements and dynamics are quickly changing and users today are facing threats, which were not even in the wildest dreams of the experts from the past (Bishop, 2003).

The last thing that any security system would want is to become predictable to its users and more importantly, to potential hackers and outsiders. Therefore, it is better to reassess the system from time to time so that the administrators are ready to fix the shortcomings and loopholes themselves rather than doing the same after the damage has been done (Shim, Qureshi & Siegel, 2000). References Bishop, M. (2003). Computer security: art and science. Addison-Wesley Professional. Gollmann, D. (2011).

Computer Security. John Wiley and Sons. Lehtinen, R., Russell, D., & Gangemi, G. T. (2006). Computer security basics. O'Reilly Media, Inc. Shim, J. K., Qureshi, A. A., & Siegel, J. G. (2000). The international handbook of computer security. Global Professional Publishers.

Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Elements of Computer Security Research Paper Example | Topics and Well Written Essays - 750 words”, n.d.)
Elements of Computer Security Research Paper Example | Topics and Well Written Essays - 750 words. Retrieved from https://studentshare.org/e-commerce/1431371-elements-of-computer-security
(Elements of Computer Security Research Paper Example | Topics and Well Written Essays - 750 Words)
Elements of Computer Security Research Paper Example | Topics and Well Written Essays - 750 Words. https://studentshare.org/e-commerce/1431371-elements-of-computer-security.
“Elements of Computer Security Research Paper Example | Topics and Well Written Essays - 750 Words”, n.d. https://studentshare.org/e-commerce/1431371-elements-of-computer-security.
  • Cited: 1 times

CHECK THESE SAMPLES OF Elements of Computer Security

Major Threats in Cybersecurity

Name: Title: Course: Tutor: Date: Cyber security Topic 1 Companies globally continue to record increasing incidences of cyber attacks with the recent years recording remarkable increase in both the rate and sophistication.... Salomon (2010) reports 40% chance of this occurrence according to reports from the FBI Computer Crime and security findings.... Training employees adequately on security and dividing critical functions among them limits frauds or sabotage committed solely (Cappelli, Moore, Shimeall & Trzeciak, 2006)....
3 Pages (750 words) Coursework

Computer Security as an Integral Element of Sound Management

Principle 1: Computer Security Supports the Organization's Mission The aim of computer security is to protect the valuable resources of an organization.... This literature review "computer security as an Integral Element of Sound Management" discusses computer security principles, cryptology, and its associated applications and secure software engineering.... computer security Principles There are many methods and approaches that are used to secure computer systems....
9 Pages (2250 words) Literature review

Macro Is a Shortcut Key

Elements of Computer Security.... In the essay “MS Word: Macro” the author describes Macro, a short cut key named with a macro name; there are embedded set of computer instruction that is linked with the shortcut key.... Department of Energy computer Incident Advisory Capability defines, “Macro Virus' as a piece of self-replicating code written in an application's macro language” (Salomon, 2010)....
1 Pages (250 words) Essay

Are We Too Dependent on Computers

Analyzing computer security: AThreat/vulnerability/countermeasure Approach.... a study of computer dependency.... Over reliance has also posed a threat to people, as if security being compromised due to a criminal element in many areas especially the banking sector.... The earliest reference on computer dependency was made in the 70's by two gentlemen who predicted the excitement that would be accompanied by overreliance on computers....
2 Pages (500 words) Essay

The Convergence of Physical and Information Security

In this approach, there is the merging of the two historically distinct functions of security, including information security and physical security.... In the management of… The concept of security convergence has evolved from the fact that most business assets today are becoming information based, and hence businesses cannot avoid adopting There before, organizations and enterprises used to protect their assets primarily with the use of physical efforts such as guns and gates....
20 Pages (5000 words) Research Paper

Hijacking, Cloud Security and Data Loss

This review ''Hijacking, Cloud security and Data Loss'' discusses that cloud computing entails saving and retrieving files from the cloud computing server sites.... The computer hijacking may cause security threats on the cloud computing clients' confidential data.... They can then access their files from the cloud server sites from any available computer, tablet, or internet- capable cell phones....
10 Pages (2500 words) Literature review

Methods Available for Maintaining Computer System Security

This separation can be achieved by involving three subproblems as a part of computer security i.... Therefore, computer security is a must in every field.... computer security can be achieved in different ways such as by using an anti-malware program, by using cryptography technique to encrypt the data, and also various other methods.... Therefore, a total solution for any computer security system has to meet the three requirements like integrity, secrecy or confidentiality, and availability....
8 Pages (2000 words) Coursework

Data Privacy and Security

This essay "Data Privacy and Security" presented some of the important features of computer security those need to be maintained for the sake of effective security management.... In view of the fact that the use of computer networks has turned out to be persistent, the thought of computer security system extended to point out problems covered in the way of networked use of computers and data resources.... In view of the fact that the use of computer networks, particularly the Internet (the largest network of the networks), has turned out to be persistent, the thought of computer security system has extended to point out problems covered in the way of networked use of computers and their information and data resources (Kinkus, 2002)....
8 Pages (2000 words) Essay
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us