5

Click here to load reader

Computer Security and Privacy

Embed Size (px)

DESCRIPTION

Free Essay Samples on the most popular topics uploaded every week on EssayShark.com Blog.

Citation preview

Page 1: Computer Security and Privacy

See more essay samples on ESSAYSHARK.COMv

Five-Paragraph Essay Sample

COMPUTER SECURITY AND PRIVACY

EssayShark.com - Online Academic Assistance

Page 2: Computer Security and Privacy

See more essay samples on ESSAYSHARK.COMv

In the book Web Security, Privacy & Commerce, S. Garfinkel (2002) observes that “A

computer is secure if you can depend on it and its software to behave as you expect”. This is

held as true by most computer users, whether they sit in the privacy of their own homes or

work in any size undertaking or corporation (Garfinkel 3). All users understand that they take

risks when they use computers, which they attempt to mitigate by putting safety measures

into place. These measures are becoming increasingly complex and intricate, because making

a server and the data on it secure is neither simple nor straightforward. One hopes to stay a

step ahead of the ingenious people who find it a challenge to breach security, no matter how

complex (Pfleeger, 4). Countermeasures and controls are put into place by those who want to

protect their data, and the predictable ways in which their computers work. Protection of

personal and business data is essential, and is made possible by methods such as installation

of firewalls and use of encryption.

“Few controls are permanently effective” is a realistic but frightening sentence found early in

the book Security in Computing by C.P Pfleeger (2006), who advises frequent checks and

measures, and regular updating of computer security, to stay ahead of the geniuses who take

pleasure in seeking out the exposed and defenceless. One can be forgiven for thinking that the

most stringent of measures are the best. Many users adopt a “belt and suspenders” mentality

that has them putting more than one firewall into place, or installing more than one kind of

virus protection. There is, however, such as thing as too much defence. It is possible to run

the risk of programs overlapping and disabling each other, or software malfunctioning and

leaving the user with no protection at all (Bailey 17).

When security settings are too high, the user is practically paralysed, with access limited to

very few choices. Searches are reduced to a few options, and less and less is visible the more

stringent the settings become. The point of internet connectivity or belonging to a corporate

network is suddenly defeated (Garfinkel 88). While defending personal information from

identity theft, protecting juveniles from corruption, or insulating business data or assets from

theft, one must also safeguard and guarantee one’s ability to freely seek and exchange

information.

The cryptographic foundation of e-commerce is very complicated (Garfinkel 104), because

what it protects is of a highly complex and important nature. The sensitive data includes

information on banking, medical records, and national security data whose violation,

Page 3: Computer Security and Privacy

See more essay samples on ESSAYSHARK.COMv

interruption, or interception could do widespread or irreparable damage. In addition,

“America’s electricity grids, water supplies, computer and cell phone networks and other

infrastructure are coming under attack” according to General Alexander, the leader of the

National Security Agency (New York Times, 2012) . The managers of this kind of material,

and especially essential services, which are not limited to facts and figures, are duty-bound to

safeguard it from theft, interference and digital snooping. Being too lax or blasé can lead to

down time at best, or exposure to terrorism and permanent damage in the worst case. If

security managers take their responsibility too far, on the other hand, it can lead to slow or

imperfect operations with reduced access to essential services (Pfleeger 69). Malicious

behaviour must be balanced by ethical and judicious control.

Page 4: Computer Security and Privacy

See more essay samples on ESSAYSHARK.COMv

References

Bailey, M. The Complete Guide to Internet Privacy, Anonymity and Security Nerel Online

Publishing, 2011

Garfinkel, S. Web Security, Privacy & Commerce (Second Edition) O’Reilly Media, 2002

Pfleeger, C. P. Security in Computing (Fourth Edition) Prentice Hall, 2006

New York Times Computer Security (Cybersecurity) Times Topics August 2, 2012

http://topics.nytimes.com/top/reference/timestopics/subjects/c/computer_security/

index.html Retrieved August 16, 2012.