computer security and privacy
Post on 24-Jun-2015
278 Views
Preview:
DESCRIPTION
TRANSCRIPT
See more essay samples on ESSAYSHARK.COMv
Five-Paragraph Essay Sample
COMPUTER SECURITY AND PRIVACY
EssayShark.com - Online Academic Assistance
See more essay samples on ESSAYSHARK.COMv
In the book Web Security, Privacy & Commerce, S. Garfinkel (2002) observes that “A
computer is secure if you can depend on it and its software to behave as you expect”. This is
held as true by most computer users, whether they sit in the privacy of their own homes or
work in any size undertaking or corporation (Garfinkel 3). All users understand that they take
risks when they use computers, which they attempt to mitigate by putting safety measures
into place. These measures are becoming increasingly complex and intricate, because making
a server and the data on it secure is neither simple nor straightforward. One hopes to stay a
step ahead of the ingenious people who find it a challenge to breach security, no matter how
complex (Pfleeger, 4). Countermeasures and controls are put into place by those who want to
protect their data, and the predictable ways in which their computers work. Protection of
personal and business data is essential, and is made possible by methods such as installation
of firewalls and use of encryption.
“Few controls are permanently effective” is a realistic but frightening sentence found early in
the book Security in Computing by C.P Pfleeger (2006), who advises frequent checks and
measures, and regular updating of computer security, to stay ahead of the geniuses who take
pleasure in seeking out the exposed and defenceless. One can be forgiven for thinking that the
most stringent of measures are the best. Many users adopt a “belt and suspenders” mentality
that has them putting more than one firewall into place, or installing more than one kind of
virus protection. There is, however, such as thing as too much defence. It is possible to run
the risk of programs overlapping and disabling each other, or software malfunctioning and
leaving the user with no protection at all (Bailey 17).
When security settings are too high, the user is practically paralysed, with access limited to
very few choices. Searches are reduced to a few options, and less and less is visible the more
stringent the settings become. The point of internet connectivity or belonging to a corporate
network is suddenly defeated (Garfinkel 88). While defending personal information from
identity theft, protecting juveniles from corruption, or insulating business data or assets from
theft, one must also safeguard and guarantee one’s ability to freely seek and exchange
information.
The cryptographic foundation of e-commerce is very complicated (Garfinkel 104), because
what it protects is of a highly complex and important nature. The sensitive data includes
information on banking, medical records, and national security data whose violation,
See more essay samples on ESSAYSHARK.COMv
interruption, or interception could do widespread or irreparable damage. In addition,
“America’s electricity grids, water supplies, computer and cell phone networks and other
infrastructure are coming under attack” according to General Alexander, the leader of the
National Security Agency (New York Times, 2012) . The managers of this kind of material,
and especially essential services, which are not limited to facts and figures, are duty-bound to
safeguard it from theft, interference and digital snooping. Being too lax or blasé can lead to
down time at best, or exposure to terrorism and permanent damage in the worst case. If
security managers take their responsibility too far, on the other hand, it can lead to slow or
imperfect operations with reduced access to essential services (Pfleeger 69). Malicious
behaviour must be balanced by ethical and judicious control.
See more essay samples on ESSAYSHARK.COMv
References
Bailey, M. The Complete Guide to Internet Privacy, Anonymity and Security Nerel Online
Publishing, 2011
Garfinkel, S. Web Security, Privacy & Commerce (Second Edition) O’Reilly Media, 2002
Pfleeger, C. P. Security in Computing (Fourth Edition) Prentice Hall, 2006
New York Times Computer Security (Cybersecurity) Times Topics August 2, 2012
http://topics.nytimes.com/top/reference/timestopics/subjects/c/computer_security/
index.html Retrieved August 16, 2012.
top related