Pc Security

Read Complete Research Material

PC SECURITY

PC Security

[Instructor's Name]

[Course ID]

PC Security

Introduction

When we talk about home computer security what we are really concerned about is the information stored on our home computers, the information we access on the World Wide Web, or receive by way of emails or other messages. The purpose of PC Security is to apply counter-measures to effectively reduce the likelihood and impact of a compromise. Computer security attacks often make high-profile news stories. When we talk about home computer security what we are really concerned about is the information stored on our home computers, the information we access on the World Wide Web, or receive by way of emails or other messages. Computer security is usually called information security, to show that it is the information we are trying to secure, and not the physical computer itself.

Thesis Statement

Information has to be protected against attack from outsiders, attack from insiders, and innocent mistakes from users

Discussion

Computer security is usually called information security, to show that it is the information we are trying to secure, and not the physical computer itself. In computer security these are known as threats, or threat agents. Information is protected against threats using countermeasures. Our level of risk exposure is an important judgement call. Our understanding of the threats and vulnerabilities helps us make this decision (John, 2009). PC security is like any other form of security, but with a twist. We wish to protect something that we value: information. The difference is that information exists on our computers, in electronic form, as documents, photos, programs, pictures, emails and other files. This information is transported between computers, and is easily and quickly duplicated or broadcast (Bruce, 2010). Confidentiality means the information we wish to keep personal, private or secret is confidential. Confidentiality is a major problem in computer security because it is so easy to make electronic copies, and all too easy to move them around. (Ross, 2012)

Integrity means you can trust that the information that you receive is what was sent to you: that you can trust that the file you are reading does contain the text that appears on the screen. Authenticity denotes computer user may prove their authenticity (i.e. who they say they are) by means of a PIN or password. An example of where authenticity is important is if you are buying something from a website. You need to be confident that the site is a bona fide (authentic) business that will fulfil its side of the transaction (Meyers, 2010). No computer is 100 per cent reliable. Lack of availability is also extremely important in the world of e-commerce. Websites are often hit with what are called 'Denial of Service' attacks.

Timeliness is also very important. If information reaches you late it can have fateful consequences. To track stock market prices, for example, up to the minute information is critical. Information has to be suitable for its audience. A TV programme, a newspaper, a magazine article or a lecture is usually designed to be of ...
Related Ads