Technology Advance and Networks Security – Coursework Example

Download full paperFile format: .doc, available for editing

The paper “ Technology Advance and Networks Security” is a persuasive variant of coursework on information technology. Organizations nowadays are faced with the serious issue of data and assets security in as far as network security is concerned. There is always the possibility of an attack, intrusion or theft of vital assets or information from an organizations database and thus the need to be concerned about network security and look for a possible solutions to this real danger. Technology helps create new crimes and new methods of committing crimes (Bishop, 2003). According to Harrington (2005), computer crime or cybercrime is a relatively new phenomenon in the world today.

It is caused by intentional or irresponsible actions of individuals who take advantage of the universality and vulnerability of computers and computer networks. In light of this understanding, many organizations are aware of the dangers of computer-related crime and are taking measures to ensure network security in an effort to safeguard their valuable data and that of their clients. It is also a measure to protect the theft of intellectual property and other network resources from being destroyed.

This paper will provide an in-depth view of security threats. In essence, computer security deals with computer-related assets that are subject to a variety of threats and for which various measures are taken to protect those assets. The remainder delves into two broad categories of computer and network security threats: intruders and malicious software (Stallings, 2013).   Computer securityAs institutions move towards embracing information technology, it means that a lot of personal information is being stored and disseminated for use by companies and governments all over the world. Computer networks have various information and assets belonging to organizations and individuals.

This information and assets are exposed by the vulnerability of computer and computer networks leading to computer crime (Skoularidou & Spinelli's 2003, Forcht & Tsai, 1994). Some of the key security requirements are: Confidentiality: In the concept of data privacy, confidentiality is the act of limiting data just to the authorized users. This is achieved through the use of user-IDs and passwords. Confidentiality helps protect against malicious software, spyware, and phishing (Foltz, 2004). Integrity: Data integrity refers to the trustworthiness of information resources including the network system.

This means data should be received in its original form without interference or without it coming from an imposter. Data should also be valid even if it came from the right person. The integrity of a system means that whatever was entered is not altered in any way (Foltz, 2004). AvailabilityInformation resources should be available whenever an authorized person wants to access them. Although it may be affected by technical problems, availability may also be as a result of deliberate human actions (Foltz, 2004). If there are privacy laws enacted in a country, then all these issues may be addressed to a substantial extent to safeguard the privacy and integrity of individuals within computer networks.

Privacy laws give a guide on how personal data should be handled in terms of authority to access the data and who should and who should not access the data (Kaufman & Speciner, 2002). Security of confidential information such as bank details and credit card information is also a major concern within networks. E-commerce transactions are made possible through payments made using credit cards. Criminals may steal the card and owner identification and security details for malicious use such as accessing the accounts to withdraw money.

References

Birch, d. (2011). The role of intrusion detection systems in electronic information security: from the activity theory perspective, Journal of Engineering, Design, and technology, vol 9, #3, pp. 9-25

Bishop, M.,2003. Computer security: art and science, Addison-Wesley Professional

Foltz, B. (2004). Cyberterrorism, computer crime, and reality, Information management & computer security, Vol 12, #2, pp. 12-23

Forcht, K., & Tsai, Y. (1994). Security and network management: changes in the way we work, Information management & computer security journal, Vol 2, #4. Pp 6-12

Harrington. J. Ed., 2005. Network security: A practical approach, Academic Press

Huang, S., & MacCallum, D., 2010. Network security, Springer

Kaufman, C., & Speciner, M., 2002. Network security: private communication in a public world. Prentice-Hall

Mouratidis, H., & Jahankhani, H. (2008). Management versus security specialists: an empirical study on security-related perceptions, Information Management & computer security, vol 16, #2, pp. 1-9

O’Beirne, R. (2002). Computer network security and cyber ethics, Library Review, Vol 51, #9, pp. 1-9

Puuronen, S., & Seleznyov, A. (2003). Using continuous user authentication to detect masqueraders, Information Management & Computer security, Vol 11, #3, pp.7-15

Skoularidou, V., & Spinellis.D. (2003). Security architecture for network clients, Information management & computer security journal, Vol 22, #2, pp. 23-45

White, G., & Pearson, S. (2001). Controlling corporate e-mail, PC use and computer security, Information management and computer security journal, vol 9, #2, pp. 23-32

Download full paperFile format: .doc, available for editing
Contact Us