OtherPapers.com - Other Term Papers and Free Essays
Search

Computer Security

Essay by   •  March 27, 2012  •  Research Paper  •  2,416 Words (10 Pages)  •  1,637 Views

Essay Preview: Computer Security

Report this essay
Page 1 of 10

OUTLINE

1. INTRODUCTION

1.1 What is computer security?

1.2 Why buy security?

1.3 What are the threats to security?

1.4 What should users do?

2. SYSTEM SECURITY AND ACCESS CONTROLS

2.1 System Security

2.2 Logging in

3. VIRUSES

3.1 What is a virus?

3.2 Who writes viruses?

3.3 Worms and Trojans

4. ESTABLISHING A SECURITY POLICY

4.1 Administrative Security

4.2 Day to Day Administration

4.3 Separation of Duties

5. COMMUNICATIONS SECURITY

5.1 Encryption

5.1.1 History

5.1.2 What is encryption?

5.2 Network Security

6. PHYSICAL SECURITY AND BIOMETRICS

6.1 Physical Security

6.2 Biometrics

7. CONCLUSION

8. REFERENCES

ABSTRACT

Computer security is essential in any organization in order for information not to be disclosed to unauthorized persons. For example, in highly secure government systems, secrecy ensures that users access only information that they are allowed. In businesses computer security is essential through the protection of private information such as payroll data as well as sensitive corporate data (such as internal memos and competitive strategy documents). This paper will present an overview of Computer Security and its basics which can be applied at individual level or organizational level. It will cover the essentials of Computer Security as well as Network Security.

1. INTRODUCTION

1.1 What is computer security?

Computer security is the process of preventing and detecting unauthorized access of your computer.

According to Wikipedia, computer security is also defined as a branch of computer technology known as information security as applied to computers and networks.

Computer security deals with the technologies employed to maintain security within a computer system, says Golman Dieter.

The objective of computer security includes protection of information and property from theft, corruption, or natural disaster, while allowing the information and property to remain accessible and productive to its intended users.

Computer system security means the collective processes and mechanisms by which sensitive and valuable information and services are protected from publication, tampering or collapse by unauthorized activities or untrustworthy individuals and unplanned events respectively.

Computer and network security are built on the pillars, commonly referred to by the CIA acronym.

* Confidentiality

* Integrity

* Availability

Data is confidential if it stays obscure to all but those authorized to use it. Data has integrity as long as it remains identical to its state when the last authorized user finished with it. Data is available when it is accessible by authorized users in a convenient format and within a reasonable time.

Computer security and network security are part of a larger undertaking that protects your computer and everything associated with it. That's why computer security is often called information security.

1.2 Why buy security?

Computer security is vital for protecting the confidentiality, integrity, and availability of computer systems, resources, and data. Without confidentiality, trade secrets or personally identifying information can be lost. Without integrity, we can not be sure that the data we have is the same data that was initially sent (ie, altered data). Without availability, we may be denied access to computing resources (ie, a virus that disables your keyboard and mouse).

1.3 What are the threats to security?

They are grouped into three:

Vulnerabilities, threats and countermeasures

1) Vulnerability is a point where a system is susceptible to attack.

Types of vulnerabilities:

Physical Vulnerabilities:

Intruders can sabotage and vandalize your network equipment or they can steal backup media or obtain information that will allow them to more easily hack their way in at a later time.

Natural Vulnerabilities:

Disasters such as fire, floods, earthquakes, lightning, and power loss can wreck your computer and destroy your data. Dust, humidity and uneven temperature conditions can also do damage.

Human Vulnerabilities:

The people who administer and use your computer system represent the greatest vulnerability of all. If your administrator is poorly trained, or decides to take a life of crime, your network is in grave danger. Ordinary computer users, operators, and other people on your staff can also be bribed or coerced into giving away passwords, opening doors, or otherwise jeopardizing security in your system.

2) Threats

A threat is defined as a possible danger to the system. Threats fall into three main categories: natural, unintentional, and intentional.

Natural threats

They include fires, floods and other disasters. You can plan for a disaster by backing up critical data off-site and by arranging for the use of a backup system that can be used if an emergency does occur.

Unintentional threats

Ignorance creates danger. For example a system administrator who hasn't been trained properly may delete a file, or change a password on critical system software, therefore

...

...

Download as:   txt (16.9 Kb)   pdf (191 Kb)   docx (17.1 Kb)  
Continue for 9 more pages »
Only available on OtherPapers.com
Citation Generator

(2012, 03). Computer Security. OtherPapers.com. Retrieved 03, 2012, from https://www.otherpapers.com/essay/Computer-Security/25255.html

"Computer Security" OtherPapers.com. 03 2012. 2012. 03 2012 <https://www.otherpapers.com/essay/Computer-Security/25255.html>.

"Computer Security." OtherPapers.com. OtherPapers.com, 03 2012. Web. 03 2012. <https://www.otherpapers.com/essay/Computer-Security/25255.html>.

"Computer Security." OtherPapers.com. 03, 2012. Accessed 03, 2012. https://www.otherpapers.com/essay/Computer-Security/25255.html.