Edudorm Facebook

Elements of Computer Security

Elements of Computer Security

 

 Computer security defines the significance of embracing strategic means of protecting computing systems particularly for the safety of stored data in organizations. Computer security involves protection of a broad system which signify distinctive classifications such as physical and network protection. Specifically, computer security is made up of unified security services that detect and protect potential threats that may interfere with system security. Nevertheless, computer security encompasses a series of policies that are responsible of identifying possible threats and at the same time provide equitable requirements of enhancing secure system in an organization. Computer security is an essential element in any organization since a secure computing system avoids operational contradictions, enhances business processes and importantly, ensures safe and reliable storage of organizational information (University of California, 2017).

Secure computing systems are characterized by elements of concealment, reliability and its availability. Confidentiality is a crucial element of computer security since it determines which information is accessible by outside sources and sensitive information that should be restricted from public review. Computer systems depend on access control for confidentiality since it is a key mechanism of computing security. For instance, access control is usually the central mechanism which examines and decides access viability. Access control may base its authorization decision from various evaluations. For instance, the mechanism may evaluate relevant information from “Access Control Matrix” within an organization’s computing systems in order to verify whether the user name provided links to specific operation requested. Importantly, control matrix may be integrated on the basis of either Access Control Lists (ACLs) usually to connected objects of security objects in an organization or rather the matrix may be based on capabilities entailed by organizational principals. Nevertheless, confidentiality of computing security is as well linked to the responsibility of data existence. Therefore, it is the responsibility of access control to conceal data to facilitate its mere existence in instances necessitating data protection (Gupta et al 2016).

Computer security specify on data trustworthiness usually meant to border organizational data from unresponsive alterations. Data integrity involves sustenance of data content and its origin in order to control data authentication. Computer security is thus oriented at regulating data accuracy by evaluating credibility of the source from which data was extracted.  Computer security plays a major role of ensuring functionality of the element of integrity in order to undermine possible threats of data distortion. This element of integrity in computer security includes two mechanisms classified into prevention and detection mechanisms objected to enhance data integrity in differing ways. For instance, prevention mechanisms actually blocks unauthorized access whereas detection mechanism is set to report instances when data is untrustworthy. Detection mechanisms bases its report of data credibility on either event exploration or it may study availed data to examine unauthorized changes (Wolff, 2016).

Availability is also a major element of computer security. Element of availability provides a perception that every organizational information must be accessible at any given time. Availability can be regarded as a reflection of system reliability meaning integrated system can be trusted with an organization’s resources. Additionally, element of availability classifies the need to integrate a system design that can be accessed with less ambiguity. Availability of a secure computing system defines capabilities to resist on purpose utterances intended to hinder data accessibility. For that reason, computer security emphasizes integration modified system designs whose network is less prone to illicit changes  in order to facilitate reliability of resources when need be.

References

Gupta, B., IGI, G., Agrawal, D. P., & Yamaguchi, S. (2016). Handbook of Research on Modern             Cryptographic Solutions for Computer and Cyber Security. Hershey, Pennsylvania [701   E. Chocolate Avenue, Hershey, PA 17033, USA]: Information Science Reference.

https://its.ucsc.edu/security/training/docs/its-training2016-17.pdf

University of California. (2017). Introduction to Computer Security. UC SANTA CRUZ –           Retrieved from http://its.ucsc.edu/security/training/intro.html

Wolff, J. (2016). Perverse Effects in Defense of Computer Systems: When More Is Less. Journal             Of Management Information Systems, 33(2), 597-620. doi:10.1080/07421222.2016.1205934

659 Words  2 Pages
Get in Touch

If you have any questions or suggestions, please feel free to inform us and we will gladly take care of it.

Email us at support@edudorm.com Discounts

LOGIN
Busy loading action
  Working. Please Wait...