Preview

Identifying and Managing Forms of Computer Security

Better Essays
Open Document
Open Document
1007 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Identifying and Managing Forms of Computer Security
Running head: IDENTIFYING AND MANAGING FORMS OF COMPUTER SECURITY

Identifying and Managing Forms of Computer Security
Professor Francis Marin
Rodney Wakefall
Strayer University
CIS 105 Introduction to Information Systems
September 1, 2009

Abstract
The corporate IT environment has changed irrevocably over the last few years. Threats are no longer high-profile viruses that spread themselves to millions of Internet users for maximum publicity. Today 's fast, targeted, silent threats take advantage of the open network and new technologies that support an increasingly mobile workforce. Organizations need innovative approaches to protect the web, email servers and endpoint. This paper discusses the different types of threats, types of security and how to prevent data loss.

Computer Security Computer security is a branch of technology known as information security as applied to computers and networks. The objective of computer security includes protection of information and property from theft, corruption, or natural disaster, while allowing the information and property to remain accessible and productive to its intended users. Computers face constant threats from viruses, worms, Trojan horses, spyware, zero-day attacks, and other types of malware. Achieving effective computer security requires a solution that 's designed to fit your needs today and can adapt to tomorrow 's security threats. Security is becoming increasingly complex, as new Internet threats appear daily or even hourly. Computer Security was first developed for providing physical protection to limit access to all but a few authorized individuals. “With today’s worldwide networks, however, computer security involves much more. Despite its expanded nature and increased importance, computer security today has the same basic objectives as forty years ago” (White, Fisch, & Udo, 1995).
We use the term security in many ways in our daily lives. A security system protects our house, warning



Citations: and Referencing (APA Style) | 20 | 17 | The requirement stipulated that you use a minimum of four sources. | Total | 100 | 94 | |

You May Also Find These Documents Helpful

  • Powerful Essays

    IS3110 U5L1

    • 912 Words
    • 4 Pages

    One of the most important first steps to risk management and implementing a security strategy is to identify all resources and hosts within the IT infrastructure. Once you identify the workstations and servers, you now must then find the threats and vulnerabilities found on these workstations and servers. Servers that support mission critical applications require security operations and management procedures to ensure C-I-A throughout. Servers that house customer privacy data or intellectual property require additional security controls to ensure the C-I-A of that data. This lab requires the students to identify threats and vulnerabilities found within the Workstation, LAN, and Systems/Applications Domains.…

    • 912 Words
    • 4 Pages
    Powerful Essays
  • Satisfactory Essays

    It205 Capstone Question

    • 633 Words
    • 3 Pages

    In modern business, information and enterprise systems are becoming major backbones, relied upon for function, communication and longevity. Even smaller businesses have become dependent on computers for operations as well as management of information, from everything from billing, stock levels, to payroll. With the growing demand and need for computer systems and networks, issues begin to arise with systems security. Viruses, Trojan horses, worms, hackers, as well as internal security issues can plague a business. This paper will cover some of the basic concepts for system security, and possible threats.…

    • 633 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    Often Information Technology Directors overlook that information security is more of a people issue rather than a technology issue. We rely heavily on people’s awareness, ethics and behavior, and an understanding of what they want to achieve is essential to accomplish the goals of business. This includes the employees that deliver services and the customers that take advantage of them, as well as the senior executives that outline the budgets.…

    • 801 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    NT2580

    • 526 Words
    • 5 Pages

    Introduction to Information Security © ITT Educational Services, Inc. All rights reserved. Page 2 Key Concepts  Attacks, threats, and vulnerabilities in a typical IT infrastructure …

    • 526 Words
    • 5 Pages
    Satisfactory Essays
  • Better Essays

    Cmgt 400 Week 2

    • 1100 Words
    • 3 Pages

    The internet is approximately 40 years old and is continuing to grow at a rapid pace. This rapid growth and use of the internet for practically everything you can do in life has also cause a major increase in threats. Cyber-criminals are often breaking into security on many major websites and making the news. Information Security is turning into an important part in protect a business’s information.…

    • 1100 Words
    • 3 Pages
    Better Essays
  • Powerful Essays

    The information in this paper will investigate the elements involved in computer security. Protecting information today requires more than just locking a door or filing cabinet. With data being stored electronically, it is vital that important information be protected from prying eyes. There are many different methods for protecting information that is stored on computers. These methods include everything from password and usernames to biometric devices. There are also software solutions that are used, including antivirus and anti-malware software along with firewalls. All of this is to accomplish the desired…

    • 1544 Words
    • 7 Pages
    Powerful Essays
  • Powerful Essays

    In a global economy, businesses thrive with good Information technology infrastructures. Information technology plays vital roles in successful businesses. Although tools like online advertising, and e-commerce can help businesses thrive in today’s global economy. However, this paper will focus on the importance of Information security functions within Ecolab’s IT organization. Furthermore, the impacts of information security functions from a business perspective will be discussed.…

    • 1661 Words
    • 7 Pages
    Powerful Essays
  • Better Essays

    Securing and protecting information has become increasingly far more difficult and complex then what is has been in the past. As the amount of internet users and new devices that use the internet continue to become more common, new methods and users trying to steal information will continue to advance as well. Just this year we have seen large companies, corporations, and banking institutions which some were thought to be very secure have been broken into. Hackers continue to develop new ways to steal private information and develop these tools with increased simplicity. Hackers use different methods in breaching the security of the companies they target. These methods have increasingly become increasingly more complex and difficult to detect with tools and programs that are developed to detect attacks and intrusions. With the increasing amount of security threats, new ideas and methods continue to be developed to prevent further attacks. Among these methods is security authentication, protection and prevention.…

    • 1725 Words
    • 5 Pages
    Better Essays
  • Powerful Essays

    Manufacturing Audit Risk

    • 1585 Words
    • 7 Pages

    As Information Systems become more complex and business organizations become better prepared at protecting these systems so has the means in which attacks on these systems evolved. Many new issues have emerged and are changing the way in which or world views hackers and the chaos that these individuals can cause. The purpose of this section is to discuss some of the most visual and controversial of these issues. Finding solutions to avoid these attacks are what drives the need for security and security systems to constantly evolve and adapt to new threats and avoid being overrun and or shut down due to malicious actions of hackers who only wish…

    • 1585 Words
    • 7 Pages
    Powerful Essays
  • Good Essays

    Computer security is made up of digital forensic, network security, and preventing malware, and is a rapidly growing field that involves gathering and analyzing evidence from computers and networks. Because computers and the internet are the fastest growing technology used for criminal activity, the need for computer security managers will increase in years to come.…

    • 525 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    The diverse associations and understandings of the word security is confusing to the public as well as those who are public safety professionals such as law enforcement officers, firefighters, medics, emergency managers, et al. As an example, when a homeowner states they have “security” at their home, what they likely mean is they have installed a fire and burglary alarm system. However, the term security may just as well mean that the homeowner has installed high security locks on their doors and windows. Still to another homeowner, the installation of motion activated exterior lighting may mean that the homeowner has installed security at their…

    • 3449 Words
    • 14 Pages
    Powerful Essays
  • Better Essays

    There are many objectives to the computer security that protects the information from any theft and natural disaster which allows information into the computer network. The computer technologies have become unwanted computer behavior and security strategies behavior. The computer technology which has security went it comes to logic. The security primary goals are the computer designing, applications programs with the type of security which most have restrictions to different types of program behaviors. The computer software has to be trusted and be able to security the software and be trustworthy for the database to run.…

    • 1224 Words
    • 5 Pages
    Better Essays
  • Powerful Essays

    college algebra

    • 1862 Words
    • 11 Pages

    References: Wm. Arthur Conklin, G. W. (2012). Principles of Computer Security: CompTIA Security+™ and Beyond (Exam SY0-301), Third Edition. In G. W. Wm. Arthur Conklin, _Principles of Computer Security: CompTIA Security+™ and Beyond (Exam SY0-301), Third Edition_ (p. Chapter 20). McGraw-Hill Company.…

    • 1862 Words
    • 11 Pages
    Powerful Essays
  • Better Essays

    Hacker

    • 1123 Words
    • 5 Pages

    The advancement of information technology spans a lot of areas of our lives. Information technology has made a huge difference in industry, agriculture and services. This in turn boosts up the productivity of the society. However, the development of computer technology also leads to many security problems in our modern society. There has emerged a group of computer savvy people who seeks and exploits weaknesses in a computer system or computer network. Their motivation has put many questions on debating table. On the one hand, many people contend that a hacker is a dangerous person who will probably destroy the whole world’s computer system. On the other hand, others argue that hackers are not dangerous and not causing harm. This essay will discuss the two sides of the coin with regard to hackers with relevant examples.…

    • 1123 Words
    • 5 Pages
    Better Essays
  • Good Essays

    Protection – The protection of assets, property or people is one of the key responsibilities of a security operator and can be achieved again through electronic measures as deterrent or physical measures such as manned guards or door supervisors.…

    • 1031 Words
    • 4 Pages
    Good Essays