28 Apr 2022

350

Elements of Computer Security

Format: APA

Academic level: Master’s

Paper type: Essay (Any Type)

Words: 1108

Pages: 4

Downloads: 0

Introduction

The digital world has proved to have immensely impacted every operation in various industries hence the growth of urbanization. Besides the success in businesses and institutes which have adopted the use of electronic devices, efficiency, productivity, and speed has been inevitable. In the current world, the implication of technology use within the workplaces has become a necessity as compared to luxury in the ancient days. Contrary to the benefits that computer use has provided, security is a critical issue that most companies face today. From privacy invasion to malware and hacking, technology crime has exposed computer users to the vulnerability of attacks. Computer insecurity has facilitated the need to control and stop cyber-attacks purposely to protect users, critical information and data from breaching. In the quest to enhance computer security, various elements have been implemented to ensure that cyber-attacks are under control. 

The significance of computer security is the ability for devices to detect attacks and prevent them from interfering with the data and privacy of the targeted institute. On the other hand, applied security measures may ensure that the cyber breaches are minimized and easily handled. According to David Salomon (2010), the critical elements of computer security include confidentiality, availability, and integrity. Experts have identified crucial additional security elements that include non-repudiation, authenticity, and utility. A full package of the security framework promotes the application of a comprehensive measure that is required to enhance improvement and analytical approaches in the protection of data and computer devices. As highlighted by the author of the ‘Elements of Computer Security’ book, the discipline of applying computer security is not only based on the focus of viruses, identity theft, data manipulation and privacy loss among other cyber-attacks (Udrea, 2017) . Contrary to this perception that most computer users have regarding security, other critical aspects that are rarely put into consideration is the physical protection of the electronic devices and technology, the diligence required and individual measures that must be applied to boost cyber-security. 

It’s time to jumpstart your paper!

Delegate your assignment to our experts and they will do the rest.

Get custom essay

Confidentiality

Privacy is an essential aspect of computer security purposely for the information and data shared among two or more identified parties. As an element of computer security, confidentiality is mainly the protection of the data intended to be accessed and observed by authorized individuals from unsanctioned persons who may have an intention of invading available and shared data. Adopted from fields like the military and the government, concealment of information was purposed to restrict civilians and industrial competitors from having access to the information stored in the databases. To facilitate confidentiality as an element of computer security, most institutes have implemented mechanisms that control information accessibility for purposes of supporting data concealment. Significant forms of access control include the use of encryption and decryption keys among authorized parties. The technique of making use of encryption and decryption keys is referred to as cryptography. 

Another essential aspect of confidentiality that most industries have put into practice is the hiding of resources. Resource hiding is the concealment of mostly the systems in which companies operate on, or the configurations applied. Accessibility of company configurations and systems jeopardizes the security of the company making it vulnerable to manipulation of its data contents and hacking among other cyber – attacks. On more straightforward grounds, confidentiality as an element of computer security is the ability for a user to provide clearance details to be in a position to access the systems, data, and information in question. Furthermore, the use of confidentiality as a security measure has ensured that each authorized audiences understand their roles regarding the need to view only or edit the contents of a particular document shared (Bishop, 2003)

Integrity

Observed as a vital element in various fields, honesty is the requirement to apply trust, implementation of accuracy and consistency in handling data within an institute. Application of integrity is geared to prevent unauthorized users from accessing data and ensuring that approved users do not make any changes that have not been agreed upon. Critical sub-elements of this security item include data and origin integrity also referred to as authentication. Data integrity mostly handles the content of the associated information whereas authentication deals with the source which is the basis of credibility and accuracy that enhances trust amongst users. The mechanisms implemented to facilitate integrity in computer security are prevention and detection. Just like the name, the arrangement of prevention controls the accessibility of data especially from unapproved audiences who may attempt to make specific changes to the information at hand. As for the detection mechanism, the security measure is allocated to oversee any changes or corruption of data by an authorized user through the comparison of the original information with the edited one. Unlike confidentiality, integrity ensures that information is both protected from unsanctioned users and that it the original data is not corrupted or changed for personal gain or interest by approved audiences.

Availability

Denial of service is currently the most commonly observed attacks in the technological world. Authorized users have the right to access the data and resources allocated to them at any desired time, hence the reference of availability. Conventional techniques used to make resources unavailable to authorized users include the manipulation of control parameters that make data invalid to the audiences. Moreover, hackers may pull down the systems by compromising the server hence deliberately controls the use of the systems by authenticated persons is made difficult and impossible. Availability is an element of computer security that has to be applied by most industries which contain vital information of its staff, clients and other stakeholders in the database making it possible for every user to operate and run designated roles as required. Proper functionality of the system is a critical requirement of ensuring availability is secured (John D. Howard, & Thomas A Longstaff, 1998). For instance, if the systems of a particular company are ever facing breakdown then a compromise of functionality promotes the availability of data. Moreover, time and storage have been identified as other vital aspects that tamper with the availability of resources, information, and data. Poor storage may promote loss of information hence the need to have back up for every resource needed by all approved audiences. Some systems have been allocated the mechanisms of protecting specific information by availing them within a specified period. Therefore, time determines the availability of such resources which dictates user accessibility. 

Conclusion

Computer security is a necessity considering the increase in cybercrime and attacks that have exposed technology users to extreme vulnerability. Besides the usual insecurities known to users which include malware, identity theft, and loss of privacy among others, physical protection and application of the proper use of technology devices are as important. As observed, the significant elements of computer security are confidentiality, integrity, and availability. Currently, more features have been added to promote security measures, and they include utility, nonrepudiation, and authenticity. Protection of the data and information within the systems are the significant aspects as to the allocation of computer security elements. Moreover, the enhancement of originality and avoidance of corruption of data through detection is promoted. Users, on the other hand, are encouraged to practice trustworthiness, accuracy, and efficiency while handling vital information and during communication. 

References

Bishop, M. (2003, January 31). An Overview of Computer Security . Retrieved February 17, 2018, from Informit: http://www.informit.com/articles/article.aspx?p=30710

John D. Howard, & Thomas A Longstaff. (1998). A common language for computer security incidents. http://dx.doi.org/10.2172/751004

Salomon, D. (2010). Elements of Computer Security. Springer Publishing Company.

Udrea, C. (2017, August 17). Six essential elements of an application security framework . Retrieved February 17, 2018, from Paymill: https://blog.paymill.com/en/six-essential-elements-of-an-application-security-framework/

Illustration
Cite this page

Select style:

Reference

StudyBounty. (2023, September 15). Elements of Computer Security.
https://studybounty.com/elements-of-computer-security-essay

illustration

Related essays

We post free essay examples for college on a regular basis. Stay in the know!

How AI Can Help Retailers Solve Business Problems

The global marketplace is currently more integrated than ever before. This situation presents a never-before experienced opportunity for retailers. Multinational organizations whose sole basis is the internet have...

Words: 2700

Pages: 5

Views: 139

The Natural Organizational Model and the Informal Groups

The nature of an organization is based on different factors such as the environment it is set up in. also, the type of activity it undertakes. This paper will examine the natural organizational model, the informal...

Words: 3009

Pages: 10

Views: 240

Why Pinkberry should focus on making orange and yellow the two prevailing colours

The fact that Pinkberry has evolved from a storefront to a nationally recognized brand makes this franchise of frozen dessert yogurt shops an example to be followed. Yes, the personality of a brand created a platform...

Words: 582

Pages: 2

Views: 94

Ford Motors: Board Presentation For Electric and Hybrid cars Production

Executive Summary The motor vehicle industry in America and worldwide is highly competitive with major players no longer enjoying the dominance that they had had before. Innovation and identification of trends...

Words: 1088

Pages: 4

Views: 130

Home Remodel Project Plan

Project Overview Home remodeling is one of the notable key projects undertake through project management, as a project manager is expected to come up with a clear plan that would help in meeting the expected...

Words: 2152

Pages: 8

Views: 69

How Airbnb Achieved Success

Hospitality industry includes firms that provide lodging and dining services for customers. Many of the businesses in the travel and hospitality industry offer customers with prepared meals, accommodation, snacks,...

Words: 906

Pages: 3

Views: 64

illustration

Running out of time?

Entrust your assignment to proficient writers and receive TOP-quality paper before the deadline is over.

Illustration