Computer Security In Business Essay

665 words - 3 pages

Computer Security Legislation in Major IndustriesComputer security refers to a method of protecting data from being accessed, modified, used, revealed, or disrupted by unauthorized persons or organizations. There are three core principles of information security namely, confidentiality, integrity, and availability.Breach of information is what happens whenever certain information is captured by unauthorized party. This may occur accidentally or intentionally. These are:•interception of messages•theft of stored data•information sabotage•spoofing; and,•denial of service.Any breach of information in business industries could mean financial loss for NHG. The data stolen have many uses in the hands of a hacker. The data can be sold to rival companies to earn money. Others that hack bank and credit card systems steal money from private accounts. Table 1 shows the total losses in global bank card fraud.Table 1. Global bank card fraud (losses per US$ 100 Volume).YearLosses (billions)1998$2.01999$2.32000$2.72001$3.32002$3.8Source: The Nilson Report, June 2003These industries try to strengthen computer security in many ways. The most common method is the use of modern data protection software programs such as anti-virus software, firewall, and encryption software.In most banks, private data is usually encrypted so that the hacker will not be easily stolen. This method of data protection uses codes to prevent data from being read by unauthorized parties. This is commonly used in large on-line stores such as eBay and Amazon.com.Computer Security Standards in Healthcare IndustryAccording to the World Health Organization healthcare is goods and services that is intended to promote health, including prevention, cure, and analgesic relief.Healthcare systems put the use of computer systems to the limit. There are three main uses of computers in healthcare institutions: (a) collect data faster, (b) store data for future use, and (c) share data to parties other than the institution and the patient.Protection of health information in healthcare industry needs a combination of policies and security programs.Policies are used as to determine the people who can access data under specified situations. The US Computer Fraud and Abuse...

Find Another Essay On Computer Security in business

Security in the Business Environment Essay

1919 words - 8 pages advise IT personnel on the information requirements of the business, these managers must understand the role that security plays in protecting information assets. Business managers must: • Understand the issues surrounding the securing of business information. • Help identify the importance of information assets to their divisions or departments. • Take an active role in the development of an effective security framework to improve

The Security Industry in South Africa: A history on the business enterprise

1345 words - 5 pages Security in South Africa started when the 1820 settlers arrived, they had people in charge of watching orguarding the ships and the contents of the ships while the rest of the crew were out searching for the benefits of the lands. My father started our business Q Security Services in the early 1980's at the age of 24, starting of only in Durban with just 7 guards in his employment. Our company has grown over the years and to date we have exactly

COMPUTER SECURITY

540 words - 2 pages is like a mechanical human brain and if one has a real human brain they can operate it. In other words if one knows how a computer works they can make it work. If they do not then they cannot do anything at all. This is what computer security is meant to do. It is done by making it only possible for someone to access a computer by using a password or by locking it up.Computer security works by many ways of password use or by locking it up. The

Computer Security

1948 words - 8 pages information and create security plans that will meet this new challenge. Computer security controls work with a different set of variables than those used for mainframes and LANs. For example, control over program changes, data security, system documentation, backup, recovery plans, and system testing are inherent in most mainframe (LAN) environments. However, desktops, laptop, and handheld computer systems seldom have this protection. One of the most

Computer Security

3255 words - 13 pages Computer Security In the last few decades, the world saw a revolution in information and technology, and the main factor of this revolution was the computer. Computers made life easier for millions of people all over the world, especially in the United States, where the latest innovations in the field of computers take place. Information circulates with extreme speed, and a person with a computer and access to the Internet can follow what

computer security

546 words - 2 pages Define computer security (2mks)Computer security refers to techniques for ensuring that data stored in a computer cannot be read or compromised by any individuals without authorization. The ability of a system to protect information and system resources with respect to confidentiality and integrityOutline the goals of computer security (5mks)- Confidentiality: verifying that information is private and therefore seen and accessed only by intended

Computer security

2637 words - 11 pages entrants might imply. Actually, post-September 11 expenditures for security have augmented by a sheer 4 percent (Most, 2003). Therefore, it is fair to say that the applications of lessons learned from preceding technology implementations imply that to be successful, the use of technology must assist in solving real problems, either from a governmental or business standpoint.From the viewpoint of vendor marketing strategy, acknowledging that

The essay is entitled 'Dell's Supply Chain'. It's a descriptive business case about the uniqueness and strength in Dell Computer Corporation Supply Chain

1409 words - 6 pages Dell. In addition, the measurability of the performances of these supply chain design will also be addressed.DELL'S PRODUCTS AND THE BUSINESS ORIENTATIONHaving positioned itself as one of the leading world-class computer corporation over a relatively short period, Dell's main product categories are typically:· servers, storage and networking· notebooks and desktops· printers· handheld products· software and

National Security/Computer Security

1057 words - 5 pages The government is using programs like Project Prism, which many have probably never heard of, in order to “protect” its national security. The program was created in 2007 by the Bush administration as a means to uphold national security against terroristic activities. The program uses social media as well as phone records in order to keep tabs on those they feel are involved in terroristic or criminal activity, but has since become a means for

Computer Security Since 2001

2099 words - 8 pages INTRODUCTION Computer security is now an important area for any network administrator, systems analyst, information technology technician, databases administrator to the computer scientist. Although this list shows the professionals dabbling in Information Technology, it should not be misconstrued that the average computer user at home should not be concerned about computer security. A computer, be it a personal computer, a laptop or a simple

Computer Networking Security

933 words - 4 pages issues. All of these are, more than likely, caused by lack of knowledge of basic network setup, lack of security training, or careless keyboard frenzy. Data loss usually is rare because what most users do not realize is that the deleted files are stored in the computer systems RAM (random access memory) until it is overwritten by new files. Most users will get hysterical when they accidentally delete files, or are working on a document when the

Similar Essays

Security In The Computer World Essay

1434 words - 6 pages INTRODUCTION The main purpose of security is to protect assets. Looking back into history, the big walls acted as a safeguard to a fortress or a kingdom. There were massive and strong doors which stopped any perpetuator from entering without permission. The same thing applies in the computer world, with the only difference being that it's virtual. There are closed networks and open networks. The closed networks are available for a person who

Hacking As A Means Of Identifying Weaknesses In Computer Security

1651 words - 7 pages The use of hacking can be very beneficial as a means of identifying weaknesses in computer security. Nowadays, numerous companies and governments use this technique to assess the level of security of their systems and determine if any valuable information is at risk of being accessed unlawfully. Ethical hackers are employed to identify potential threats on a single computer or a whole network of computers. The found potential exploits are later

The Use Of Hacking To Identify Weaknesses In Computer Security

1740 words - 7 pages Introduction The use of hacking to identify weaknesses in computer security has become an increasingly controversial issue in recent years. Awareness of this issue is important, because our ever increasing reliance on technology means that breaches in computer security have the potential to have wide-ranging and devastating consequences to society, worldwide. This essay will begin by clearly defining the term ‘hacking’ and will examine the type

Computer Crimes Need To Be Prevented And Halted Through Increased Computer Network Security Measures As Well As Tougher Laws And Enforcement Of Those Laws In Cyberspace

3335 words - 13 pages and assets back and forth over the phone lines every day. The money transferred from bank to bank or account to account, is used by sending telephone messages between computers. In the old days, B. [efore] C. [omputers], transferring money usually involved armored cars and security guards. Today, the computer operators simply type in the appropriate instructions and funds are zipped across telephone lines from bank A to bank B. These codes can