Issues In Computer Security

Read Complete Research Material

ISSUES IN COMPUTER SECURITY

Issues in Computer Security



Contents

CHAPTER 1: INTRODUCTION3

Outline of the Study3

Background of the research3

Problem Statement3

Aims and Objectives3

Significance4

Research Question4

CHAPTER 2: LITERATURE REVIEW6

Context6

Survey of Current Methods6

Information Security Model6

Public Key Cryptosystems8

Physical Security9

Personnel Security9

Administrative Security10

Computer Security10

Hardware Security Devices10

Software Security11

Data Communications Security12

Message Stream Modification13

CHAPTER 3: METHODOLOGY16

Research Design16

Literature Search16

Sample17

Instrument (Interview/Questionnaire)17

Data collection17

References18



CHAPTER 1: INTRODUCTION

Outline of the Study

The outline for this study is to identify the different issues concerning to computer security and its related issues.

Background of the research

Computer networks are proliferating rapidly for a number of reasons, where one is technology innovation. During this boom has placed relatively little attention to computer network security. This paper describes the problems caused by network security and computer questions and provides an overview of methods and technologies available today to increase computer network security. Current methods are discussed, such as information security strategy, computer security and its relation to network security, data communications security and data encryption.

Problem Statement

This study examines the problems related to computer security and its related issues that arise during the work. The problem that is faced by computer network analysts that relates to network utilities.

Aims and Objectives

The aim of the study is to initially evaluate the:

Problems associated to computer security,

Challenges faced by organizations when establishing computer security systems, and

Centralized systems implementation and to identify the issues in computer security systems

Significance

Advances in technology over the past decade have a major increase of computer networks, local area networks and intelligent work stations to be related. These advance significant challenges to create and maintain the security of these networks outside the security of the host organization. Networks have rapidly because they often offer important advantages over centralized systems increased. Network distributed computing power to user locations, thus promoting rapid access to data and enables localized decision-support functions.

Moreover, networks can promote flexibility in the development and expansion of business operations are held during centralized control. It is easy to Minis, Micros, or even the main frame to add nodes to an existing network, and it can be relatively inexpensive. Networks often lower the cost of computer hardware and a longer life for systems with flexibility, expandability, innate, and lower incremental cost of upgrading. Computer networking allows users to use the resources of all components in the vicinity of computers with networking to make ignorance of the mechanisms. This is done by linking individual locations or nodes through communication channels such as coaxial cable, telephone lines or fiber.

Research Question

The main research questions of the study are as follows:

What are the advances in technology in the last ten years that brought a proliferation of computer networks and its security?

How advances pose significant challenges to establish and maintain security of the networks, outside the security of the host facility?

What are the important centralized systems that can be implemented?



CHAPTER 2: LITERATURE REVIEW

Context

Computer networking allows users to use the resources of all components in the vicinity of computers with networking to make ignorance of the mechanisms. This is done by linking individual locations or nodes through communication ...
Related Ads