Thursday, January 9, 2020

Computer Security Essay - 3218 Words

Computer Security In the last few decades, the world saw a revolution in information and technology, and the main factor of this revolution was the computer. Computers made life easier for millions of people all over the world, especially in the United States, where the latest innovations in the field of computers take place. Information circulates with extreme speed, and a person with a computer and access to the Internet can follow what is happening on Wall Street, even if he is thousands of miles away from there. Any user of this network can buy, sell, and make money by staying in his bed. But in order to guarantee the stability of such a world where a lot of transactions occur, billions of dollars are at stake, there must be†¦show more content†¦The authenticity of the message is also important; a user has to verify that the information is received from the correct sender. Another aspect of computer security services is the integrity of a message; only authorized users can modify a messag e. Non-repudiation of the data is also fundamental; it â€Å"requires that neither the sender nor the receiver of a message be able to deny the transmission† (Stallings 5). It is also important that â€Å"the information resources be controlled by or for the target system† (Stallings 5); this corresponds to the idea of access control. In addition, the availability of the message is an important concept; only authorized users can access â€Å"the computer system assets† (Stallings 6). Different computer security techniques are used to guarantee these aspects. The main way to protect the data being transmitted is to hide the message. There are two fundamental techniques used in computer security: Stenography and Cryptography. Both techniques require a transformation in the information to be sent, an identification character included in the message to recognize the sender, and also some secret information to scramble the message when sent and to unscramble it when received (Stallings 12). When the method of Stenography is used, the very existence of the message is cancelled. For example, the resolution of a Kodak CD format is 2048 by 3072 pixels, and each pixel contains 24 bits. If one bit of each pixel is used toShow MoreRelatedThe Importance Of Computer Security2039 Words   |  9 PagesThe Importance of Computer Security Computer security, is the protection of information systems from theft or damage to the hardware, the software, and to the information on them, as well as from disruption or misdirection of the services they provide. It includes controlling physical access to the hardware, as well as protecting against harm that may come via network access, data and code injection,] and due to malpractice by operators, whether intentional, accidental, or due to them being trickedRead MoreComputer Security : Key Components Of Pc Security1099 Words   |  5 PagesComputer Security is an issue of critical significance for all associations, considering the way that data frameworks have turned into an essential piece of vital getting ready for all real organizations. Organizations need to find the key components of PC security while arranging their data frameworks technique. Computer security alludes to the assurance given to robotized data structures with a specific end goal to ensure their respectabili ty, accessibility, and secrecy. Computer security includesRead MoreComputer Security And Social Engineering Essay1810 Words   |  8 PagesComputer security is a very important topic in today’s world. One does not have to look far to read about data breaches, DDoS attacks, or other computer related crimes. When we think of cybercrime, we usually envision the Hollywood portrayal of technical hackers typing vigorously and wearing dark sunglasses. However, in reality, hacking tends to be much less glamorous. Actually, one critical element is often overlooked by the general public and movies alike; yet, every security professional knowsRead MoreWhat Is Computer Security?936 Words   |  4 PagesWHAT IS COMPUTER SECURITY? The process of preventing and detecting the use of data in the computer by any individuals without authorization is referred to as Computer Security. It is also known as cybersecurity or IT security. It involves the process of protecting computer resources from intruders for their own gains. Anti-virus, firewalls, data encryption, password protection are the main measures that encompass the computer security. It is mainly concerned with four main areas: 1. Confidentiality:Read MoreComputer Security : Computers And Networks870 Words   |  4 Pagesnot use the computer system to â€Å"snoop† or pry into the affairs of other users by unnecessarily reviewing their files and e-mail. Accessing other computers and networks: A User’s ability to connect to other computer systems through the network or by a modem does not imply a right to connect to those systems or to make use of those systems unless specifically authorized by the operators of those systems. Computer security: Each User is responsible for ensuring that use of outside computers and networksRead MoreChallenges Faced By Computer Network Security1501 Words   |  7 PagesAbstract- The rapid development in computer network technology leads to the security challenges faced by it at every step of its growth. Three main threats facing computer network security include: hackers, computer virus and denial of service attack. Safety factors of the network are mainly: resources sharing, data communication, computer virus and TCP/IP protocol security flaws. A safety network system should include at least three kinds of measures: legal measures, technical measures and reviewRead MoreComputer Security : An Intrusion Of Security1467 Words   |  6 Pagesintrusion of security What is computer security? Computer security is the procedure which guarantees that the information put away on a machine is not intelligible by other individual without the director s endorsement or approval. Case in point: if the secret key â€Å"class† in cisco switches is made secure then it will be put away to some degree like 5 e08hjn38tyb8 which is elusive out what the real watchword is on the grounds that it is scrambled. What is computer Privacy? Computer protection intendsRead MoreComputer Security Essay1039 Words   |  5 PagesComputer Security Would you be interested in a career where you could make fifty thousand dollars a year right out of college? Would you like to have an extremely secure job? Would you like to create a company as successful as Microsoft or Facebook? If so, a career in computer security may be the field for you. As a high school student, you might be wondering what it would be like to work in the field of networking or database security, as well as compare them to similar fields. Today I willRead MoreInformation Security And Computer Usage Essay1704 Words   |  7 PagesDirector of Information and Computer Technology SUBJECT: Information security and computer usage policies This memo presents the plans for the revision of information security and computer usage polices for Technocracy. The memo will outline discovered security issues and new policies including additional steps, goals and obstacles when implementing them. Previous security issues discovered Security compromises were discovered in information and computer security after the hack of MultiGame’sRead MoreThe Flaws Of The Ieee Computer Security1580 Words   |  7 Pagesusage bugs instead of distinguishing the configuration defects. The IEEE computer security, the main relationship for registering experts had been dispatched a digital security which is activity with the point of growing and raising its continuous association in the field of digital security. In the first venture for the activity was to dispatch the IEEE computer society designs to move happen to the concentrate in security structure discovering bugs to distinguishing basic outline blemishes with

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.