Your SlideShare is downloading. ×
Computer Security and Privacy
Computer Security and Privacy
Computer Security and Privacy
Computer Security and Privacy
Upcoming SlideShare
Loading in...5
×

Thanks for flagging this SlideShare!

Oops! An error has occurred.

×
Saving this for later? Get the SlideShare app to save on your phone or tablet. Read anywhere, anytime – even offline.
Text the download link to your phone
Standard text messaging rates apply

Computer Security and Privacy

278

Published on

Free Essay Samples on the most popular topics uploaded every week on EssayShark.com Blog.

Free Essay Samples on the most popular topics uploaded every week on EssayShark.com Blog.

Published in: Education
0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total Views
278
On Slideshare
0
From Embeds
0
Number of Embeds
0
Actions
Shares
0
Downloads
2
Comments
0
Likes
0
Embeds 0
No embeds

Report content
Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
No notes for slide

Transcript

  • 1. v See more essay samples onESSAYSHARK.COM Five-Paragraph Essay Sample COMPUTER SECURITY AND PRIVACY EssayShark.com - Online Academic Assistance
  • 2. v See more essay samples onESSAYSHARK.COMIn the book Web Security, Privacy & Commerce, S. Garfinkel (2002) observes that “Acomputer is secure if you can depend on it and its software to behave as you expect”. This isheld as true by most computer users, whether they sit in the privacy of their own homes orwork in any size undertaking or corporation (Garfinkel 3). All users understand that they takerisks when they use computers, which they attempt to mitigate by putting safety measuresinto place. These measures are becoming increasingly complex and intricate, because makinga server and the data on it secure is neither simple nor straightforward. One hopes to stay astep ahead of the ingenious people who find it a challenge to breach security, no matter howcomplex (Pfleeger, 4). Countermeasures and controls are put into place by those who want toprotect their data, and the predictable ways in which their computers work. Protection ofpersonal and business data is essential, and is made possible by methods such as installationof firewalls and use of encryption.“Few controls are permanently effective” is a realistic but frightening sentence found early inthe book Security in Computing by C.P Pfleeger (2006), who advises frequent checks andmeasures, and regular updating of computer security, to stay ahead of the geniuses who takepleasure in seeking out the exposed and defenceless. One can be forgiven for thinking that themost stringent of measures are the best. Many users adopt a “belt and suspenders” mentalitythat has them putting more than one firewall into place, or installing more than one kind ofvirus protection. There is, however, such as thing as too much defence. It is possible to runthe risk of programs overlapping and disabling each other, or software malfunctioning andleaving the user with no protection at all (Bailey 17).When security settings are too high, the user is practically paralysed, with access limited tovery few choices. Searches are reduced to a few options, and less and less is visible the morestringent the settings become. The point of internet connectivity or belonging to a corporatenetwork is suddenly defeated (Garfinkel 88). While defending personal information fromidentity theft, protecting juveniles from corruption, or insulating business data or assets fromtheft, one must also safeguard and guarantee one’s ability to freely seek and exchangeinformation.The cryptographic foundation of e-commerce is very complicated (Garfinkel 104), becausewhat it protects is of a highly complex and important nature. The sensitive data includesinformation on banking, medical records, and national security data whose violation,
  • 3. v See more essay samples onESSAYSHARK.COMinterruption, or interception could do widespread or irreparable damage. In addition,“America’s electricity grids, water supplies, computer and cell phone networks and otherinfrastructure are coming under attack” according to General Alexander, the leader of theNational Security Agency (New York Times, 2012) . The managers of this kind of material,and especially essential services, which are not limited to facts and figures, are duty-bound tosafeguard it from theft, interference and digital snooping. Being too lax or blasé can lead todown time at best, or exposure to terrorism and permanent damage in the worst case. Ifsecurity managers take their responsibility too far, on the other hand, it can lead to slow orimperfect operations with reduced access to essential services (Pfleeger 69). Maliciousbehaviour must be balanced by ethical and judicious control.
  • 4. v See more essay samples onESSAYSHARK.COMReferencesBailey, M. The Complete Guide to Internet Privacy, Anonymity and SecurityNerel Online Publishing, 2011Garfinkel, S. Web Security, Privacy & Commerce (Second Edition) O’Reilly Media, 2002Pfleeger, C. P. Security in Computing (Fourth Edition) Prentice Hall, 2006New York Times Computer Security (Cybersecurity) Times Topics August 2, 2012 http://topics.nytimes.com/top/reference/timestopics/subjects/c/computer_security/index. html Retrieved August 16, 2012.

×