Security In The Computer World Essay

1434 words - 6 pages

INTRODUCTION

The main purpose of security is to protect assets. Looking back into history, the big walls acted as a safeguard to a fortress or a kingdom. There were massive and strong doors which stopped any perpetuator from entering without permission. The same thing applies in the computer world, with the only difference being that it's virtual.

There are closed networks and open networks. The closed networks are available for a person who belongs to that entity. On the other hand, open networks are available for the rest of the people. Previously, networks were designed as closed for a set of people and sites which do not connect to other people. With the advent of personal computers, LANs, and the wide-open world of the Internet, the networks of today are more openAs e-business and Internet applications continue to grow, the key to network security lies in defining the balance between a closed and open network and differentiating the good guys from the bad guys .
There has been a drastic change in the economy in the last decade. Everything shifted from paper to computers and from manual to automatic, thus giving rise to computers and increasing reliability on them. Consequently, this gave rise to breaches in information system in companies as everything was computerized. All of the works were carried out through networking. Thousands of servers were being used to run a company. The financial transaction became more online.

According to a survey held by Princeton Survey Research Associates International (PSRAI) in 2010, 46% of U.S adults or 58% of internet users said they bank online. In 2011, 18% of cellphone owners said they have used their phone to check their balance or transaction business with a bank.

With the evolution of the new age, threats are evolving much faster than we can even imagine, and businesses are falling behind in order to cope with it. The companies do not have the right security measures to protect their system against security breach. The threats possessed by attackers are very much severe. Thus businesses cannot take the risk of avoiding security measures and they must also consider some important threats that can harm their system to a great extent. Evolution of these social networking websites opened more doors to information breach. According to a survey held by Global information security survey (GISS), 60% of enterprise found their level of increased risk due to use of social networking, cloud computing and personal devices in the enterprise which resulted in an increase of 46% in their annual investment of information security.

Generally, attackers try to target small businesses for financial crimes. Small businesses are not prepared for such security breaches and end up losing millions of dollars to cope with their losses. According to FBI data cited in U.S. Senate testimony, annual cybercrime profits and damages have hit a trillion dollars. That's an incredible number and is impossible to itemize,...

Find Another Essay On Security in the Computer World

Is computer security the only option to combat the misuse of e-mail?

517 words - 2 pages In today's age of technology, internet security options are infinite. Email scams, hoaxes, spam, advertising and viruses are growing at a phenomenal rate. The technologies to prevent malicious emails are not far behind. Whilst computer security is not the only option when combating the misuse of e-mail, it is the most sensible option, and provides an ease of use to the home and commercial user.Spam e-mail's and 'hoax' e-mail's are growing more

HIPAA: Privacy and Security Rules The Computer, the Nurse and You

1545 words - 6 pages HIPAA: Privacy and Security Rules The Computer, the Nurse and You Introduction How would you like to keep track of your personal health information record in your computer at home? The electronic data exchange was one of the goals of the government to improve the delivery and competence of the U.S. healthcare system. To achieve this plan, the U.S. Congress passed a regulation that will direct its implementation. The Department of Health and

Computer crimes need to be prevented and halted through increased computer network security measures as well as tougher laws and enforcement of those laws in cyberspace

3335 words - 13 pages and assets back and forth over the phone lines every day. The money transferred from bank to bank or account to account, is used by sending telephone messages between computers. In the old days, B. [efore] C. [omputers], transferring money usually involved armored cars and security guards. Today, the computer operators simply type in the appropriate instructions and funds are zipped across telephone lines from bank A to bank B. These codes can

The Impact of Computer Technology in our Social World

1101 words - 5 pages will computers affect people and environment in the future? We have seen a lot of changes already. What is next? Introduction Computers technology has a huge impact throughout our social world and economy. A computer is an electronic device that is used for storing and processing data for purposes of work (Forester, 1988). It helps operate work automatically for people. Multiple modifications and new build- INS in this technology have affected

Food Security in the Developed and the Developing World

1661 words - 7 pages In 2020, a massive problem known as food shortage will show up, this will in turn affect food security (Metro, 2011). Food security defined as “Everybody having a sufficient access to food for a healthy diet and efficiently not having anxiety about where their next meal is coming from.” (Global Food Security A, ND). Over the last decade, food crisis has become a real issue facing the world. In fact, world population is expected to rise by 15% by

Computer will rule the world

1187 words - 5 pages the products, such as cars, trains ships, weapons, cash registers or machine tools.Computers are also using in medicine. They are very helpful in medical diagnosis, patient monitoring and general hospital administration. In the banking and finance systems they have replaced paper for nearly all accounting. Such areas as architecture, engineering or machinery are also dependent on computer design. Moreover, computers are revolutionizing such

Security in a Post September 11th World

2628 words - 11 pages the post 9/11 world. The United Kingdom also followed in the footsteps of the United States and Canada in the process of increasing security. In the United Kingdom, external and domestic intelligence and police services improved their ability to work as a single counter¬terrorist unit. Now, The United Kingdom also works with allies and partners overseas to develop the use of modern technology to track individuals, their identities, movements

Computer in the society

851 words - 3 pages typewriters.The most growing part of the computer-oriented world is the Internet. It allows users to send electronic mail (E-mail), faster and more conveniently than conventional mail. In addition to text sent, the user may choose to send a program or picture attached to the letter. In addition to electronic mail, the Internet is also used to give information on almost any topics. It is a tool now common in college research because it offers

Liberty Versus Security in Today’s World

748 words - 3 pages Inscribed in the stairwell of the Statue of Liberty is Benjamin Franklin’s quote, “They that can give up essential liberty to obtain a little safety deserve neither liberty nor safety.” Recent reactions to terrorist attacks provide examples of our country beginning to mortgage freedom, and privacy under the mask of protection in times of crisis. Warrantless searches and seizures performed in the interest of national security are becoming

Information Security in the Context of Digital Divide in Arab World

1239 words - 5 pages "have-nots", taking into account the technological level, the rate of being connected, the number of machines, ICT budgets etc. It reflects also differences in economic development (GDP per capita, costs of computer equipment), technology (bandwidth) energy (electricity), industrial (low development software production) or language. This is the reason for which technological development and the improvement of connectivity alone cannot suffice to

Security in The Cloud

1724 words - 7 pages article that was written by Computer Weekly David Binning states serious cases that have made cloud computing questionable. There were two cases in this article that demonstrated the failure to secure the cloud. First article stated “ Google was forced to make an embarrassing apology in February when its Gmail service collapsed in Europe “ (Binning 2009). The second article stated that “salesforce.com is still trying to improve there security measure

Similar Essays

Computer Security In Business Essay

665 words - 3 pages total losses in global bank card fraud.Table 1. Global bank card fraud (losses per US$ 100 Volume).YearLosses (billions)1998$2.01999$2.32000$2.72001$3.32002$3.8Source: The Nilson Report, June 2003These industries try to strengthen computer security in many ways. The most common method is the use of modern data protection software programs such as anti-virus software, firewall, and encryption software.In most banks, private data is usually encrypted

The Use Of Hacking To Identify Weaknesses In Computer Security

1740 words - 7 pages tangible to a hacker as they are somewhat disconnected from the ‘real world’ when sitting behind their computer. Can White Hats be trusted? Many of those who claim to be ‘ethical hackers’ obtained their skills through former activities as Black or Grey Hats. Can companies employing White Hats really trust the claim that they are reformed; and are their skills really that useful to the information security industry? In an interview in 2006 the Chief

The Necessity Of Computer Security Essay

1743 words - 7 pages application of cryptography for civilian purposes is not just a right, but is also a necessity. Increasingly in today's era of computer technology, not only banks but also businesses and government agencies are turning to encryption. Computer security experts consider it best and most practical way to protect computer data from unauthorized disclosure when transmitted and even when stored on a disk, tape, of the magnetic strip of a credit card. Two

Hacking As A Means Of Identifying Weaknesses In Computer Security

1651 words - 7 pages The use of hacking can be very beneficial as a means of identifying weaknesses in computer security. Nowadays, numerous companies and governments use this technique to assess the level of security of their systems and determine if any valuable information is at risk of being accessed unlawfully. Ethical hackers are employed to identify potential threats on a single computer or a whole network of computers. The found potential exploits are later