Preview

computer

Good Essays
Open Document
Open Document
873 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
computer
UNIVERSITY OF LA VERNE
La Verne, CA

July 25, 2014

Research paper
Computer Security

Submitted in partial fulfillment of the requirements for the degree of Master of MBA

Professor Yehia Mortagy
BUS 510 Management of Information Technology

RUI GAO
11560047

College of Business and Public Management

ABSTRACT
In the modern society, information can benefits both groups and individuals in many different areas. Whereas, at the same time, information also can be used to bring out a threat or even an act of war such as if a cyber attack which take down our financial systems or government systems. Computer security arouses the ethics and risk analysis, and is concerned with topics such as computer crime, the prevention, detection, remediation of attacks, identity and anonymity in cyberspace. In this paper, I want discuss the main problems of computer security and its serious threats.

Computer security, also known as cyber security or IT security, is information security as applied to computing devices such as computers and smartphones, as well as computer networks such as private and public networks, including the Internet. Computer security, which is the composition of hardware, software network system and the safety of delivering information through network, has been an essential issue. Computer security has not only technical problems but also management problems, and at the same time, both of them affect each other.
The major technical areas of computer security are usually represented by the initials CIA: confidentiality, integrity, and authentication or availability. Confidentiality means information cannot be access by some parties unauthorized. It is a kind of secrecy or privacy, which breaches of confidentiality range from the embarrassing to the disastrous. Integrity means that information is protected in order to against unauthorized changes that are not detectable to authorized

You May Also Find These Documents Helpful

  • Powerful Essays

    Nt1310 Unit 1 Assignment 1

    • 1434 Words
    • 6 Pages

    Information has become the most valuable asset of any organization. And keeping that information secure is a major factor in the design and development of any computer system. Security is defined by Merriam-Webster as “the state of being protected or safe from harm”. It is up to every organization to insure that their data is protected, and that nothing that is harmful to the company or its clients is compromised.…

    • 1434 Words
    • 6 Pages
    Powerful Essays
  • Good Essays

    The three components of the CIA triangle are confidentiality, integrity, and availability of information. These components are used as the industry standard for computer security and they describe the utility of information.…

    • 982 Words
    • 4 Pages
    Good Essays
  • Better Essays

    Cmgt 400 Week 2

    • 1100 Words
    • 3 Pages

    The internet is approximately 40 years old and is continuing to grow at a rapid pace. This rapid growth and use of the internet for practically everything you can do in life has also cause a major increase in threats. Cyber-criminals are often breaking into security on many major websites and making the news. Information Security is turning into an important part in protect a business’s information.…

    • 1100 Words
    • 3 Pages
    Better Essays
  • Powerful Essays

    The information in this paper will investigate the elements involved in computer security. Protecting information today requires more than just locking a door or filing cabinet. With data being stored electronically, it is vital that important information be protected from prying eyes. There are many different methods for protecting information that is stored on computers. These methods include everything from password and usernames to biometric devices. There are also software solutions that are used, including antivirus and anti-malware software along with firewalls. All of this is to accomplish the desired…

    • 1544 Words
    • 7 Pages
    Powerful Essays
  • Better Essays

    Cis 333 Final Term Paper

    • 2531 Words
    • 11 Pages

    In today’s IT world every organization has a responsibility to protect the information and sensitive data they have. Protecting data is not only responsibility of security and IT staff but every individual is involved in protecting the information. The risks to information security are not digital only, but it involves technology, people and process that an organization may have. These threats may represent the problems that are associated to complex and expensive solution, but doing nothing about these risks is not the solution.…

    • 2531 Words
    • 11 Pages
    Better Essays
  • Satisfactory Essays

    computers

    • 1169 Words
    • 4 Pages

    Summarize the case study, being sure to describe the underlying problem(s) of the collapse of the system…

    • 1169 Words
    • 4 Pages
    Satisfactory Essays
  • Satisfactory Essays

    computer

    • 269 Words
    • 2 Pages

    Technical skills are most important at lower organizational levels while human skills become more important as managers move up the organizational hierarchy.…

    • 269 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    The three primary goals of information security are prevention, detection, and recovery. Confidentiality The CIA Triad Integrity Availability Principle Description Confidentiality The fundamental principle of keeping information and communications private and protecting them from unauthorized access.…

    • 5718 Words
    • 23 Pages
    Good Essays
  • Powerful Essays

    Internet security is a division of actions aimed at securing information based on computers and in transit between them. In the modern environment the two subjects are intimately linked. Neither computers nor the networks that connect them are inherently secure. Computers were subject to attack before the Internet became a public utility—because illegitimate software hidden on commercial diskettes could be fashioned to load itself on a computer and play havoc with data in memory or placed on a fixed drive. The Internet, by its very nature—initially conceived of as an open network to facilitate free exchange of ideas and information—is vulnerable. According…

    • 3034 Words
    • 13 Pages
    Powerful Essays
  • Good Essays

    Web security means to keep your information in your control. In other words, cannot gain access to it by anyone else without your permission. The most people want to preserve the privacy of sensitive their information such as passwords and credit card information and the inability of others to access. The goal of the process of protection is to reduce the number of threats that harm the network. In this essay I will high light many points which are: the goals essential to the security of web CIA model, the classified types of threats and attacks, hacker web page and how to hacker by the virus, and firewall.…

    • 898 Words
    • 4 Pages
    Good Essays
  • Powerful Essays

    Computer

    • 17984 Words
    • 72 Pages

    Contents ....................................................................................................................................................... 1 Introduction .................................................................................................................................................. 3 Cisco Security Management Tools ........................................................................................................... 4 Control of Data ......................................................................................................................................... 4 Security Policy........................................................................................................................................... 5 Risk............................................................................................................................................................ 6 System Development Life Cycle (SDLC) .................................................................................................... 6 Understanding the Risks ............................................................................................................................... 7 Layer 2 risks .............................................................................................................................................. 8 Layer 3 risks .............................................................................................................................................. 9 Upper Layer risks .................................................................................................................................... 11 Physical ................................................................................................................................................... 12 Configuring Devices…

    • 17984 Words
    • 72 Pages
    Powerful Essays
  • Good Essays

    Research Paper

    • 1186 Words
    • 5 Pages

    Cyber crime is unlawful act in which computer is either tool or target. After development of internet every computer is able access data and information from all over the world. This also lead to the misuse of computer and internet for Crime such as Financial crimes, Cyber pornography, Online gambling, Intellectual Property crimes, Forgery, Cyber Defamation, Cyber stalking, Email spoofing, Email bombing, Denial of Service attack, Salami attacks, Virus / worm attacks, Web jacking, Data diddling etc..…

    • 1186 Words
    • 5 Pages
    Good Essays
  • Good Essays

    Computer

    • 1114 Words
    • 5 Pages

    (a) Calculate the exact value of : (2⅓ - 1⅚) ÷ 1⅓ (4 marks)(b)The simple interest on $15 000 for 4 years is $8100. Calculate the rate per centper annum. (3 marks)(c) The sum of $2500 is divided among Peter, Queen and Raymond. Raymondreceived half, Peter received $312.50 and Queen received the remainder.Calculate (i) Raymond’s share(ii) Queen’s share…

    • 1114 Words
    • 5 Pages
    Good Essays
  • Good Essays

    Computer

    • 2493 Words
    • 10 Pages

    Q No.1) Marketing has taken a prominent position during the last decade due to............... (A) Increased Competition ( B) Better Literacy Rate (C) Foreign Compulsions (D) Govt Instructions (E) RBI Policy Guidelines Q No.2) Marketing is definitely required when.......…

    • 2493 Words
    • 10 Pages
    Good Essays
  • Satisfactory Essays

    computer

    • 382 Words
    • 2 Pages

    A computer is a general purpose device that can be programmed to carry out a set of arithmetic or logical operations automatically. Since a sequence of operations can be readily changed, the computer can solve more than one kind of problem.…

    • 382 Words
    • 2 Pages
    Satisfactory Essays