Computer Security

Read Complete Research Material



Computer Security

Computer Security

Introduction

A branch of technology commonly referred to as computer security or information security, it is widely applied in computer networks. Computer Security is aimed at property and information being stolen, in addition to protecting it from natural disasters and corruption. In addition, it also aims at keeping property and information accessible and productive for the users who are being targeted. As far as the security of the computer system is concerned, it means the collective processes and mechanisms through which protection of sensitive information and services is done, in addition to the value of publishing, and tampering with or collapse caused by unauthorized activities or individuals who are not trustworthy, and unplanned events, respectively (Vacca, 2009).

The information system is a key asset of the organization, which should be protected. Computer security is to ensure that hardware or software in an organization is only used in the planned manner.

Discussion

There are several types of issues which must be addressed when it comes to computer security, such as;

1.Integrity: Data must be such that as we expect it to be, and should not be altered accidentally or intentionally.

2.Confidentiality: Only authorized persons should have access to information intended for them. Unwanted access must be prevented.

3.Availability: The system must work flawlessly during the periods of intended use, ensure access to services and resources installed with the expected response time.

4.Non-repudiation and imputation: No user should be able to challenge the operations he has performed as part of its authorized shares, and no third party should be able to attribute the actions of another user.

5.Authentication: User identification is fundamental for managing access to workspaces relevant and maintains confidence in the exchange relations.

Unauthorized Access to Information

The features of the protection of personal computers (PCs) are due to the specifics of their use. Typically, the PC uses a limited number of users. PCs can operate in standalone mode and in the local area network (paired with other PCs) and can be connected to a remote PC or local area network using a modem telephone line. Standard architectural principles of construction, equipment and PC software, high mobility software and other features define relatively easy access to professional information in the PCs. If the PC uses a group of users, may be necessary to restrict access to information different consumers (Blotcky et al, 1986).

Rules of Access

There are three main areas of computer data protection from unauthorized access:

- ...
Related Ads