StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Computer Security or Ethical Issue - Research Paper Example

Cite this document
Summary
This research paper "Computer Security or Ethical Issue" shows that due to the amazing efficiency of a computer system, every business feels the need to utilize computer technology inside the business infrastructure to enhance its operational performance…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER96.2% of users find it useful
Computer Security or Ethical Issue
Read Text Preview

Extract of sample "Computer Security or Ethical Issue"

?COMPUTER SECURITY Computer Security Affiliation Executive Summary Due to the amazing efficiency of computer system, every business feels the need to utilize computer technology inside the business infrastructure to enhance its operational performance. Additionally, corporations utilize computer technologies in various disciplines such as for communication with other people through e-mail or chatting. However, due to the negative impacts of technology, information is not considered as private and secret. In this scenario, corporations don’t like their business information such as customers’ data and economic statements to be exposed to the public. Therefore, computer system security is considered to be the vital aspect in any organization (Armor2net Software Ltd., 2011; Laudon & Laudon, 2010). In addition, intruders or hackers usually try to break into business information. Frequently these hackers like to get control over company’s computer system in order to initiate devastating attacks over further computers. In this scenario, if a business has a system linked to the web based technology just to send communication messages, so business system can definitely be the target. Moreover, these hackers have the power to change or delete sensitive business or personal data and information. Furthermore, web based technology and digital companies make it simple to collect, incorporate, and share business information, offering new fears regarding the suitable usage of customer details, the safety of individual confidentiality, as well as the security of intellectual property of the organization (Armor2net Software Ltd., 2011; Laudon & Laudon, 2010). This paper presents a detailed overview of computer security. This paper discusses how computer security has become an important issue for the companies. This paper outlines various security issues along with their solutions. Introduction Computer security can be perceived as the procedure of averting as well as identifying illegal exploitation of a company computer system. For a large number of companies averting actions facilitate them to prevent illegal users/impostors from seeing and understanding the data lying onto a company system. In this scenario, the procedure of identification or detection assists businesses to decide if anybody tries to force an entry into our system, so if they get the access and what would happen with our system consequently. In view of the fact that the word computer security is employed regularly; however the framework of a computer system is defenseless to a number of threats except the system is linked with more computer systems using some sort of network arrangement. Additionally, with the utilization of computer and communication networks, particularly the web based technology like internet the idea of computer security has extended to indicate problems regarding the exploitation of computer systems inside the network (Armor2net Software Ltd., 2011; Kinkus, 2002; Laudon & Laudon, 2010). However, for most of the businesses, the imperative technological domains of computer security are typically characterized through the word known as CIA which means confidentiality, integrity, and authentication. In general terms the word confidentiality denotes that the business data and vital information is not able to be used by illegal users. Confidentiality is as well acknowledged as concealment or privacy. However, the integrity implies that business information is secured beside illegal access that is not obvious to authoritative computer system users. Additionally, lots of attacks to computer security occurrences of hacking usually negotiate the integrity of system database as well as additional contrivances and services. In this scenario, the computer security is concerned with various fields like ethics, risk assessment, computer system offense, the preclusion, recognition, and measures against various computer attacks; as well as individuality and secrecy inside cyberspace world (Armor2net Software Ltd., 2011; Kinkus, 2002; Laudon & Laudon, 2010). The paper will outline the importance of computer security. This paper will present a detailed analysis of some of the major computer security issues. Evolving issues of Computer Security In this information technology based age business executives have begun to realize the significance of computer security. Businesses have started to spend huge money on computer security issue and for employees to supervise security actions. During the past few decades one of the most dangerous security issues was the denial of service (DOS) attack that just overloads into a network arrangement until it collapses. Such as an internet seller monster eBay was attacked by DOS attack during the 2nd month of 2000, which was about transferring the website a stream of false requests for company websites pages and resultantly eBay’s network collapsed. Another problems found in mail bombs perform in the similar way. Conversely, they try to crash mail server with the purpose of closing an email service through network congestion. Illegal users or intruders are as well attempting to acquire access to sensitive details and domains comprising insightful data, for instance credit card numbers of individuals (HostIP, 2011). In addition, a well-known department FBI reported that yearly victims to United States businesses amount to be $63 billion from stealing of computer system intellectual property. In the same way, the Computer Security Institute (CIA) currently surveyed five hundred corporations who stated fatalities counting to be $236 million to saboteurs, computer viruses, laptop robbery, monetary scam, telecommunications scam and theft of business sensitive information. According to a senior analyst named “Patrick Bihammar”, the companies have started to understand the importance of data outflow as well as in-house risks. During the year 2008 another survey conducted and it revealed that data outflow is measured an extremely severe risk that was graded as an awfully severe risk to businesses after malware programs for example spyware, computer viruses, destructive worms, and spamming codes (Salek, 2008; Entrust Technologies, 2010). Moreover, in the computer security world, the concept of information systems has formed latest ethical problems wherein individual group of benefit is eroded beside another. Such as, several of the large worldwide businesses inside the US are exploiting IT to decrease number of employees hired. Additionally, the massive utilization of technology and voice recognition application suite minimizes the necessity for human workers by making computer systems to distinguish a client’s reaction to a sequence of automated queries. So in this scenario a lot of organizations feel that how the staff is using internet to stop them from using and thus killing business imperative resources on trivial actions (Laudon & Laudon, 2010). Company’s response to computer security issue Current Security Solutions Considering the important aspects of computer security many organizations have realized that how important it is to keep business data secure and confidential from illegal access. In this scenario, latest security solutions usually comprise numerous useful means or products. These security enhancing products have to be acquired, established, set up, administered, and simplified in an efficient manner. By using this method, IT executives have to tackle issues associated with the shortage of interoperability among all the products. Additionally, the security is typically not inclusive since manufacturer’s capability to work jointly problems generally permits computer security risks to violate the boundaries, which results in breaking the computer security. In this scenario the dilemma would yet continue though the same retailers were utilized for numerous security mechanisms and products, since those emerging technologies are not planned to incorporate and work jointly. When a security breach happens, the "fixes" which every retailer offers must be experienced as well as confirmed with the help of a variety of technologies. Thus, this thing has the potential to lessen attack rates, strongly augmenting the costs that are acquired (Technology Evaluation Centers inc. , 2011; Laudon & Laudon, 2010). Moreover, the inferences of latest security solutions comprise ineptitudes; unsatisfactory outcomes such as lesser than expected threat alleviation and loss of consumer and marketplace conviction, in addition to an elevated outlay of rights. Also offering insufficient security existing security products seems to have manual execution and arrangement. In addition, these computer security products are fraction of a corporate security position which may perhaps be hard to recognize and that offer less perception into security preparation plus implementation (Technology Evaluation Centers inc. , 2011; Laudon & Laudon, 2010). The Consistent Solution: incorporated security Incorporated computer security mechanism offers an inclusive; entirety secure arrangement which deals with confronts and prospects of current businesses through networked environment. Additionally, considering the computer security issues, most of the company’s security systems incorporate several protection technologies as well as merge them with policy conformity, administration, consumer service and help desk, and sophisticated study, for additional absolute security. So businesses implement the standards of security thoroughly and utilize matching security activities at various levels inside the information technology framework. In this scenario, some of the vital security mechanisms and technologies which can be incorporated comprise: Virtual Private Networks (VPNs). A VPN secures communication beyond the boundary, facilitating businesses to securely correspond through additional networks over the web based technology. Implementation of Firewalls: This computer security technology controls the entire network and communication passage by viewing the data packets coming inward and going outward the network or some segment of network to facilitate guarantee that no illegal access is made to the computers and/or the network. Exposure Evaluation: It facilitates evaluation of a network as well as communication security situation by detecting security holes and thereafter signifying possible solutions Intrusion Detection System: It discovers illegal access as well as offers notices and information which are able to be evaluated for planning purposes. Virus Safety: It facilitates in protecting beside various types of computer viruses, spyware, worms, as well as Trojan Horses Content Filtering: This mechanism eradicates discarded network packets, whether they appear in message headers, messages itself, downloadable attachments, and additional means. Considering the above mentioned technologies, the implementation of these protection technologies could be a protracted task to establish and autonomously would typically be hard and costly to administer and keep their setting up-to-date with the requirements. However, once incorporated into a particular solution, they provide much inclusive security by minimizing the cost and complication. In addition, within the frameworks of many organizations, various security mechanisms and products from diverse retailers have perhaps been installed since network security has developed. So companies are incorporating security solutions to enhance their performance and confidentiality of business activities (Technology Evaluation Centers inc. , 2011; Laudon & Laudon, 2010). Advantages of Incorporated Security Enhanced Security Position Security technologies which are incorporated with the corporate will eventually work jointly, offering an improved security mechanism over their separate complements. IDS (intrusion detection system) technology can recognize a possible risk as well as support an advanced firewall position. In this scenario, the Firewall has the power to start a virus-scan of a mistrustful communication. This reduces the risk of a technology as well as augments the possibility for analyzing and minimizing computer security related risks (Technology Evaluation Centers inc. , 2011). Working Effectiveness of Security Tasks Incorporated computer security mechanisms inside the organizations lessen the necessity to buy, establish, modernize, and administer numerous security procedures otherwise tackle rising problems. Such computer security technology enables re-distribution of Information Technology employees to additional strategic activities as enhancing the efficiency of the frequently overloaded IT sector, developing security methodologies with great competence (Technology Evaluation Centers inc. , 2011). Reduced Influence of Attacks over Company Because an incorporated computer security solution could be applied across various frameworks, it provides elevated security of various resources or assets of the company. In addition, incorporated security mechanism effectively permits for continuous business activities, enhances worker efficiency, augments returns, and lessens the chance of any form of proceedings (Technology Evaluation Centers inc. , 2011). Recommendations about computer security A computer security professional (or an IT professional) is the person who is responsible to defend computer systems and offers protection from a diversity of intimidations. These security related threats may occur from inside as well as outside sources. The computer security professional usually offers services to management departments, learning businesses and enterprise level domains. Additionally, every movement inside the business is usually exposed to fresh types of threats. This usually needs a computer security professional to continually improve his/her level of awareness and augment his/her cache of confrontational tools as well as systems (Damewood, 2011; Brenner, 2011). Another security measure I will recommend is to make use of full control over passwords or secret codes. In this scenario clients are required to often change their passwords; this lessens the prospects of illegal admittance to controlled or secret applications, database arrangements or network communication. This implementation has the potential to provide fundamental computer security inside the business (Damewood, 2011; Brenner, 2011). In addition, the most dangerous risks to computer security often come from outside sources. In this scenario, the security professionals usually set up firewalls to discourage illegal users. Thus, they regularly deploy programs those offer warnings once any effort to penetrate the system is carried out. Moreover, a number of extremely complicated computer programs are able to trace the origin of network intruder or hacker by recognizing the IP address of the source (Damewood, 2011; Brenner, 2011). Moreover, in some scenarios deletion of infected file simply will not remove the viruses since the viruses frequently make multiple files so as to avoid deletion. In this scenario, it is extremely significant not to transfer e-mail messages yet a virus code has been removed, since this will just transfer from individual system to the other. Thus, it is incredibly vital to confirm that businesses totally delete the virus from the computer in order to maintain maximum security and optimal performance (Damewood, 2011; Brenner, 2011). Another major recommendation is to offer safety and protection to a business’s computer system and communication network, in this respect the computer security professional is usually responsible to obviously convey business and security policies along with actions to all the personnel, related human resources and business executives. In addition, the computer security actions professional deploys will only be efficient if the computer’s users recognize the significance of security procedures as well as use the technology to keep the communication protocol advanced and practical. In this scenario if the computer security professional expects inside security violation, then he/she should have to report the incident to the top management (Damewood, 2011; Brenner, 2011). Bibliography Armor2net Software Ltd. (2011). Why is the computer security important? Retrieved May 07, 2011, from http://www.armor2net.com/knowledge/computer_security.htm Brenner, K. (2011). Few Tips On How To Maintain Computer Security And Preventing Viruses . Retrieved May 09, 2011, from http://www.thecomputerspot.net/few-tips-on-how-to-maintain-computer-security-and-preventing-viruses-2/ Damewood, C. L. (2011). What Does a Computer Security Specialist Do? . Retrieved May 08, 2011, from WiseGeek.com: http://www.wisegeek.com/what-does-a-computer-security-specialist-do.htm Entrust Technologies. (2010). COMPUTER SECURITY FACT SHEET. Retrieved May 08, 2011, from http://www.firstnetsecurity.com/library/entrust/compsecu.pdf HostIP. (2011). Computer Security - Types Of Computer Security Problems. Retrieved May 07, 2011, from http://ecommerce.hostip.info/pages/250/Computer-Security-TYPES-COMPUTER-SECURITY-PROBLEMS.html Kinkus, J. F. (2002). Science and Technology Resources on the Internet Computer Security. Retrieved May 08, 2011, from http://www.library.ucsb.edu/istl/02-fall/internet.html Laudon, K. C., & Laudon, J. P. (2010). Essentials of Management Information Systems. Upper Saddle River, NJ: Prentice Hall. Salek, N. (2008, March 19). Australian companies praised for implementing data security. Retrieved May 06, 2011, from SC Magazine : http://www.scmagazine.com.au/News/106101,australian-companies-praised-for-implementing-data-security.aspx Technology Evaluation Centers inc. . (2011). Integrated Security: A New Network Approach . Retrieved May 10, 2011, from http://security.technologyevaluation.com/articles/integrated-security-a-new-network-approach-part-two-the-shift-toward-integration-8-1749.html Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Computer Security or Ethical Issue (see Laudon & Laudon text below) Research Paper”, n.d.)
Retrieved from https://studentshare.org/family-consumer-science/1421460-computer-security-or-ethical-issue-see-laudon
(Computer Security or Ethical Issue (see Laudon & Laudon Text Below) Research Paper)
https://studentshare.org/family-consumer-science/1421460-computer-security-or-ethical-issue-see-laudon.
“Computer Security or Ethical Issue (see Laudon & Laudon Text Below) Research Paper”, n.d. https://studentshare.org/family-consumer-science/1421460-computer-security-or-ethical-issue-see-laudon.
  • Cited: 0 times

CHECK THESE SAMPLES OF Computer Security or Ethical Issue

Importamce of the eticks for the IT professionals

The IT professionals should have strong ethical mindsets to overcome the unjust temptations and continue to use their tools and platforms for the betterment of mankind.... Some conflicts of interest might rise among these entities; it is the responsibility of the IT professional to tackle the conflicts with ethical considerations.... Keil (2008) categorized the ethical concerns of IT professionals as following: data protection, privacy and security, intellectual property and honesty....
6 Pages (1500 words) Essay

Professional Ethics and Responsibilities in Computer Technology

hellip; Due to quickly changing environment of information technology, new and complex ethical concerns are emerging that bring into question the capability of society to tackle, and self-confidently resolve them.... The basic concerns essential to the world of IT are the end user's anticipations of privacy and the provider's ethical responsibility to utilize email or applications (Katers, 2012).... Due to quickly changing environment of information technology, new and complex ethical concerns are emerging that bring into question the capability of society to tackle, and self-confidently resolve them....
6 Pages (1500 words) Literature review

Ethics in Cyberspace

This essay discusses ethics in a modern cyberspace and issue of cybercrime, that is among the ethical concerns that have created a dilemma in the contemporary world.... hellip; The researcher discusses the topic from an ethical perspective.... ethical hacking is help because it enables ethical hackers to create vital programs that are useful.... Essay focuses mostly on ethics in cyberspace and understanding modern technologies used in the computer networking....
5 Pages (1250 words) Essay

Computer Ethics Is a Fundamental Issue

Computer ethics have been a fundamental issue since the emergence of computers.... Computer Ethics Introduction Computer ethics have been a fundamental issue since the emergence of computers.... Standardization of a sensitive issue like ethics will be a great advantage to all involved.... This will provide guidelines on the mode of operation regarding the issue, and it will provide a structure (Johnson, 2000).... The ethical issues related to information technology are very many and they have been described in detail in many sources, with scholars taking different opinions on the privacy of data....
4 Pages (1000 words) Essay

Communications Surveillance, Privacy and Its Ethical Implications

This paper ''Communications Surveillance, Privacy and Its ethical Implications'' presents an overview of ethical and moral concerns in communications surveillance.... nbsp;This paper also discusses the ethical validity of communications surveillance in light of Kant's ethical theory.... So in order to deal with serious issues communications surveillance becomes essential but it is not ethical.... This paper also discusses the ethical validity of communications surveillance in light of Kant's ethical theory....
8 Pages (2000 words) Literature review

Issues in Email Hacking

This paper discusses several ways in which email accounts can be hacked and the ethical and legal implications of hacking.... Issues in Email Hacking ethical issues According to the Hacker Manifesto, a hacker commits only one crime which is the crime of curiosity (Trodick, 2011).... It implies that hackers assume the ethical responsibility to share the expertise they have by enhancing access to information, writing open-source, and computing all possible resources....
9 Pages (2250 words) Essay

Ethics and Morality in Software Development

According to findings, it is found that, ethical and moral decisions reached upon by software developers during software development, has an influence on how things and businesses in particular, are done and how people's lifestyles adapt to this technological development (Salehnia, 2006).... Studies concerning the ethical standards in view of the use of computers and its software, centers on critical issues such as; hacking, privacy, copyright protection, and piracy among other issues related to compute use and software....
8 Pages (2000 words) Literature review

Professional Ethics

thical Discussion:The major ethical issue in this case is unethical access to computers with the aim of blackmailing young girls into submission.... It is important ethical use of Internet is promoted and increased use is regulated.... Royal Canadian Police tracked down Ringland, 36, a resident of UK, when a young girl reported him for serious computer misuse.... With more people gaining access to cyberspace, it is important that online activities are carefully monitored and regulated with the help of strict anti-hacking laws and computer misuse laws....
5 Pages (1250 words) Essay
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us