SlideShare a Scribd company logo
1 of 1
Download to read offline
Essay on It Security
Computer security and Network Security is the means by which business and governments are
protecting against computer intrusions and attack to prevent loss of data, information and provided
services. Everything is now on computers, peoples whole lives are documented on computers. Big
business and the government rely on technologies that use computers, whether it is used for storage,
a medium between the customers and themselves or actual work. With all this information and data
being stored, transferred and used it needs to be secured. A bank is open to the public; you would
not have this bank unsecured would you? There would be security guards, cameras, and a vault. The
same mentality to secure your data should be implied if you have...show more content...
Those who are usually more familiar with the physical attributes of security like field staff, will
need a good comprehension of how the cyber network runs and with that understanding be able to
correctly protect the network. More input will be needed from utility managers, they will need to
be comfortable with their own IT departments instead of letting them do their own thing. To point it
simply, employees need to be briefed and have an understanding of how the new CIP procedures
and other areas of the entire organization tie into their enterprise network(Travers & Black
& Veatch , 2008). Global cyber crimes biggest target are American consumers and businesses.
Reports from the FBI and Computer Security Institute say that that cyber attacks have become a
huge reason of financial loss by US companies, the average businesses reporting $160,000 in loss
and damages for each security breach. Internet Crime Complaint Center reported the total loss from
all reports of Internet fraud known and tracked by US law agencies in 2007 was $239 million
(Jameson , 2008). According to Dunn (2005), " Strengthening the trust framework, including
information security and network security, authentication, privacy and consumer protection, is a
prerequisite for the development of the Information Society and for building confidence among
users of ICTs. A global culture of cyber security needs to be promoted,
Get more content on HelpWriting.net

More Related Content

Similar to Essay On It Security

5 network-security-threats
5 network-security-threats5 network-security-threats
5 network-security-threats
ReadWrite
Β 
Five Network Security Threats And How To Protect Your Business Wp101112
Five Network Security Threats And How To Protect Your Business Wp101112Five Network Security Threats And How To Protect Your Business Wp101112
Five Network Security Threats And How To Protect Your Business Wp101112
Erik Ginalick
Β 

Similar to Essay On It Security (11)

Ecommerce security
Ecommerce securityEcommerce security
Ecommerce security
Β 
IBM Security Services
IBM Security ServicesIBM Security Services
IBM Security Services
Β 
Team 3_Final Project.docx
Team 3_Final Project.docxTeam 3_Final Project.docx
Team 3_Final Project.docx
Β 
Ethical and security issues on MIS inte 322 assignment.docx
Ethical and security issues on MIS inte 322 assignment.docxEthical and security issues on MIS inte 322 assignment.docx
Ethical and security issues on MIS inte 322 assignment.docx
Β 
5 network-security-threats
5 network-security-threats5 network-security-threats
5 network-security-threats
Β 
Five Network Security Threats And How To Protect Your Business Wp101112
Five Network Security Threats And How To Protect Your Business Wp101112Five Network Security Threats And How To Protect Your Business Wp101112
Five Network Security Threats And How To Protect Your Business Wp101112
Β 
SecuritΓ© : Le rapport 2Q de la X-Force
SecuritΓ© : Le rapport 2Q de la X-ForceSecuritΓ© : Le rapport 2Q de la X-Force
SecuritΓ© : Le rapport 2Q de la X-Force
Β 
IBM X-Force.PDF
IBM X-Force.PDFIBM X-Force.PDF
IBM X-Force.PDF
Β 
The 10 Fastest Growing Cyber Security Companies of 2017
The 10 Fastest Growing Cyber Security Companies of 2017The 10 Fastest Growing Cyber Security Companies of 2017
The 10 Fastest Growing Cyber Security Companies of 2017
Β 
Top 3 security concerns for enterprises
Top 3 security concerns for enterprisesTop 3 security concerns for enterprises
Top 3 security concerns for enterprises
Β 
A Comprehensive Review of Cyber Security, Threats and Cyber Attacks
A Comprehensive Review of Cyber Security, Threats and Cyber AttacksA Comprehensive Review of Cyber Security, Threats and Cyber Attacks
A Comprehensive Review of Cyber Security, Threats and Cyber Attacks
Β 

More from Can Someone Write My Paper For Me University of Southern Mississippi

The Music Of Duke Ellington
The Music Of Duke EllingtonThe Music Of Duke Ellington
Defining Modernism Essay
Defining Modernism EssayDefining Modernism Essay
Anatomy And Physiology Essay
Anatomy And Physiology EssayAnatomy And Physiology Essay
Articles Of Confederation
Articles Of ConfederationArticles Of Confederation
Determination Research Paper
Determination Research PaperDetermination Research Paper
Tuskegee Airmen Accomplishments
Tuskegee Airmen AccomplishmentsTuskegee Airmen Accomplishments
The Sixth Sense
The Sixth SenseThe Sixth Sense
Essay Assessment And Learner
Essay Assessment And LearnerEssay Assessment And Learner

More from Can Someone Write My Paper For Me University of Southern Mississippi (11)

Definition Of Respect
Definition Of RespectDefinition Of Respect
Definition Of Respect
Β 
Assessment And Learner Essay
Assessment And Learner EssayAssessment And Learner Essay
Assessment And Learner Essay
Β 
Aspects Of Mother Nature
Aspects Of Mother NatureAspects Of Mother Nature
Aspects Of Mother Nature
Β 
The Music Of Duke Ellington
The Music Of Duke EllingtonThe Music Of Duke Ellington
The Music Of Duke Ellington
Β 
Defining Modernism Essay
Defining Modernism EssayDefining Modernism Essay
Defining Modernism Essay
Β 
Anatomy And Physiology Essay
Anatomy And Physiology EssayAnatomy And Physiology Essay
Anatomy And Physiology Essay
Β 
Articles Of Confederation
Articles Of ConfederationArticles Of Confederation
Articles Of Confederation
Β 
Determination Research Paper
Determination Research PaperDetermination Research Paper
Determination Research Paper
Β 
Tuskegee Airmen Accomplishments
Tuskegee Airmen AccomplishmentsTuskegee Airmen Accomplishments
Tuskegee Airmen Accomplishments
Β 
The Sixth Sense
The Sixth SenseThe Sixth Sense
The Sixth Sense
Β 
Essay Assessment And Learner
Essay Assessment And LearnerEssay Assessment And Learner
Essay Assessment And Learner
Β 

Recently uploaded

Seal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptxSeal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptx
negromaestrong
Β 
An Overview of Mutual Funds Bcom Project.pdf
An Overview of Mutual Funds Bcom Project.pdfAn Overview of Mutual Funds Bcom Project.pdf
An Overview of Mutual Funds Bcom Project.pdf
SanaAli374401
Β 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
kauryashika82
Β 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
heathfieldcps1
Β 

Recently uploaded (20)

Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activity
Β 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
Β 
Seal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptxSeal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptx
Β 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdf
Β 
An Overview of Mutual Funds Bcom Project.pdf
An Overview of Mutual Funds Bcom Project.pdfAn Overview of Mutual Funds Bcom Project.pdf
An Overview of Mutual Funds Bcom Project.pdf
Β 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The Basics
Β 
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Β 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Β 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdf
Β 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17
Β 
CΓ³digo Creativo y Arte de Software | Unidad 1
CΓ³digo Creativo y Arte de Software | Unidad 1CΓ³digo Creativo y Arte de Software | Unidad 1
CΓ³digo Creativo y Arte de Software | Unidad 1
Β 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across Sectors
Β 
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Β 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdf
Β 
Measures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDMeasures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SD
Β 
Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..
Β 
Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024
Β 
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Β 
Unit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptxUnit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptx
Β 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
Β 

Essay On It Security

  • 1. Essay on It Security Computer security and Network Security is the means by which business and governments are protecting against computer intrusions and attack to prevent loss of data, information and provided services. Everything is now on computers, peoples whole lives are documented on computers. Big business and the government rely on technologies that use computers, whether it is used for storage, a medium between the customers and themselves or actual work. With all this information and data being stored, transferred and used it needs to be secured. A bank is open to the public; you would not have this bank unsecured would you? There would be security guards, cameras, and a vault. The same mentality to secure your data should be implied if you have...show more content... Those who are usually more familiar with the physical attributes of security like field staff, will need a good comprehension of how the cyber network runs and with that understanding be able to correctly protect the network. More input will be needed from utility managers, they will need to be comfortable with their own IT departments instead of letting them do their own thing. To point it simply, employees need to be briefed and have an understanding of how the new CIP procedures and other areas of the entire organization tie into their enterprise network(Travers & Black & Veatch , 2008). Global cyber crimes biggest target are American consumers and businesses. Reports from the FBI and Computer Security Institute say that that cyber attacks have become a huge reason of financial loss by US companies, the average businesses reporting $160,000 in loss and damages for each security breach. Internet Crime Complaint Center reported the total loss from all reports of Internet fraud known and tracked by US law agencies in 2007 was $239 million (Jameson , 2008). According to Dunn (2005), " Strengthening the trust framework, including information security and network security, authentication, privacy and consumer protection, is a prerequisite for the development of the Information Society and for building confidence among users of ICTs. A global culture of cyber security needs to be promoted, Get more content on HelpWriting.net