Tuesday, May 14, 2019

Computer Security Information Risk Assessment & Security Management Essay

Computer Security Information Risk Assessment & Security Management - test ExampleBefore computers became ubiquitous, confidential information was stored in documents, photographs, audio or video tapes, etc. The confidentiality was ensured by keeping these items in locked safes, bank vaults, dual control safes, etc. This is prevalent to some extent scour today. With Computers becoming ubiquitous, documents are now largely electronic. To preserve their integrity and confidentiality, recourse is made to password protection, info encoding, firew all tolds, intrusion detection software, etc. (Parker. B, Donn. Microsoft Encarta, n. d.)This is the age of the World Wide Web. Nowadays, some every person having a vehicle loan, a housing loan, a credit or debit card, and automated teller weapon card, a social security number, a passport, a driving license, a telephone connection, etc, has to provide minute personal information to the agency or authority, which provides that particular f acility or service. Most if not all such information is in electronic form and stored in some centralized Computers Database. The crux of the line of work is this electronic form of personal information. If a hacker succeeds in his hacking attempt then all such confidential data can be viewed, changed or destroyed by the hacker.There exist a vast number of such co... software such as automatic computer virus generators, network eavesdropping sniffers, password guessers, vulnerability testers and computer service saturators to further their criminal ends. Adoption of such methods makes identity theft, double-dealing withdrawals from a bank account, fraudulent electronic funds transfer, etc, possible.A vast amount of confidential data is first-stringly exchanged between governmental agencies and financial institutions like banks and other corporations. This transfer of information commonly takes place between computers located in different and far off places. In the 1970s Horst Fiestel of IBM, developed an encryption system know as Lucifer. In 1977, the U.S National Bureau of Standards developed an encryption standard known as the Data Encryption Standard. In 1997, the NIST developed the Advanced Encryption Standard. The use of these methods makes the encrypted message almost impossible to decipher. Unfortunately, this is used by terrorists and international criminals to plan and execute their nefarious activities. (Sutton. G, William, Rubin .D, Aviel, Microsoft Encarta, n. d.)The world is becoming increasingly networked. In this scenario, data encryption algorithms of increasing complexity are ensuring the secure transmission of information across Computer Networks. Password protected logins, firewalls, anti - spy ware like intrusion detection systems, anti - virus, application safeguards like generation of checksums, use of maker checker concept in financial transactions, enfranchisement message source, use of roles and privileges, limit on transactio n amount, redundancy of backups, parallel databases and the physical security of hardware. In addition to this, a mock disaster recovery drill should be conducted on a regular

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.