Introduction
The digital world has proved to have immensely impacted every operation in various industries hence the growth of urbanization. Besides the success in businesses and institutes which have adopted the use of electronic devices, efficiency, productivity, and speed has been inevitable. In the current world, the implication of technology use within the workplaces has become a necessity as compared to luxury in the ancient days. Contrary to the benefits that computer use has provided, security is a critical issue that most companies face today. From privacy invasion to malware and hacking, technology crime has exposed computer users to the vulnerability of attacks. Computer insecurity has facilitated the need to control and stop cyber-attacks purposely to protect users, critical information and data from breaching. In the quest to enhance computer security, various elements have been implemented to ensure that cyber-attacks are under control.
The significance of computer security is the ability for devices to detect attacks and prevent them from interfering with the data and privacy of the targeted institute. On the other hand, applied security measures may ensure that the cyber breaches are minimized and easily handled. According to David Salomon (2010), the critical elements of computer security include confidentiality, availability, and integrity. Experts have identified crucial additional security elements that include non-repudiation, authenticity, and utility. A full package of the security framework promotes the application of a comprehensive measure that is required to enhance improvement and analytical approaches in the protection of data and computer devices. As highlighted by the author of the ‘Elements of Computer Security’ book, the discipline of applying computer security is not only based on the focus of viruses, identity theft, data manipulation and privacy loss among other cyber-attacks (Udrea, 2017) . Contrary to this perception that most computer users have regarding security, other critical aspects that are rarely put into consideration is the physical protection of the electronic devices and technology, the diligence required and individual measures that must be applied to boost cyber-security.
Delegate your assignment to our experts and they will do the rest.
Confidentiality
Privacy is an essential aspect of computer security purposely for the information and data shared among two or more identified parties. As an element of computer security, confidentiality is mainly the protection of the data intended to be accessed and observed by authorized individuals from unsanctioned persons who may have an intention of invading available and shared data. Adopted from fields like the military and the government, concealment of information was purposed to restrict civilians and industrial competitors from having access to the information stored in the databases. To facilitate confidentiality as an element of computer security, most institutes have implemented mechanisms that control information accessibility for purposes of supporting data concealment. Significant forms of access control include the use of encryption and decryption keys among authorized parties. The technique of making use of encryption and decryption keys is referred to as cryptography.
Another essential aspect of confidentiality that most industries have put into practice is the hiding of resources. Resource hiding is the concealment of mostly the systems in which companies operate on, or the configurations applied. Accessibility of company configurations and systems jeopardizes the security of the company making it vulnerable to manipulation of its data contents and hacking among other cyber – attacks. On more straightforward grounds, confidentiality as an element of computer security is the ability for a user to provide clearance details to be in a position to access the systems, data, and information in question. Furthermore, the use of confidentiality as a security measure has ensured that each authorized audiences understand their roles regarding the need to view only or edit the contents of a particular document shared (Bishop, 2003) .
Integrity
Observed as a vital element in various fields, honesty is the requirement to apply trust, implementation of accuracy and consistency in handling data within an institute. Application of integrity is geared to prevent unauthorized users from accessing data and ensuring that approved users do not make any changes that have not been agreed upon. Critical sub-elements of this security item include data and origin integrity also referred to as authentication. Data integrity mostly handles the content of the associated information whereas authentication deals with the source which is the basis of credibility and accuracy that enhances trust amongst users. The mechanisms implemented to facilitate integrity in computer security are prevention and detection. Just like the name, the arrangement of prevention controls the accessibility of data especially from unapproved audiences who may attempt to make specific changes to the information at hand. As for the detection mechanism, the security measure is allocated to oversee any changes or corruption of data by an authorized user through the comparison of the original information with the edited one. Unlike confidentiality, integrity ensures that information is both protected from unsanctioned users and that it the original data is not corrupted or changed for personal gain or interest by approved audiences.
Availability
Denial of service is currently the most commonly observed attacks in the technological world. Authorized users have the right to access the data and resources allocated to them at any desired time, hence the reference of availability. Conventional techniques used to make resources unavailable to authorized users include the manipulation of control parameters that make data invalid to the audiences. Moreover, hackers may pull down the systems by compromising the server hence deliberately controls the use of the systems by authenticated persons is made difficult and impossible. Availability is an element of computer security that has to be applied by most industries which contain vital information of its staff, clients and other stakeholders in the database making it possible for every user to operate and run designated roles as required. Proper functionality of the system is a critical requirement of ensuring availability is secured (John D. Howard, & Thomas A Longstaff, 1998). For instance, if the systems of a particular company are ever facing breakdown then a compromise of functionality promotes the availability of data. Moreover, time and storage have been identified as other vital aspects that tamper with the availability of resources, information, and data. Poor storage may promote loss of information hence the need to have back up for every resource needed by all approved audiences. Some systems have been allocated the mechanisms of protecting specific information by availing them within a specified period. Therefore, time determines the availability of such resources which dictates user accessibility.
Conclusion
Computer security is a necessity considering the increase in cybercrime and attacks that have exposed technology users to extreme vulnerability. Besides the usual insecurities known to users which include malware, identity theft, and loss of privacy among others, physical protection and application of the proper use of technology devices are as important. As observed, the significant elements of computer security are confidentiality, integrity, and availability. Currently, more features have been added to promote security measures, and they include utility, nonrepudiation, and authenticity. Protection of the data and information within the systems are the significant aspects as to the allocation of computer security elements. Moreover, the enhancement of originality and avoidance of corruption of data through detection is promoted. Users, on the other hand, are encouraged to practice trustworthiness, accuracy, and efficiency while handling vital information and during communication.
References
Bishop, M. (2003, January 31). An Overview of Computer Security . Retrieved February 17, 2018, from Informit: http://www.informit.com/articles/article.aspx?p=30710
John D. Howard, & Thomas A Longstaff. (1998). A common language for computer security incidents. http://dx.doi.org/10.2172/751004
Salomon, D. (2010). Elements of Computer Security. Springer Publishing Company.
Udrea, C. (2017, August 17). Six essential elements of an application security framework . Retrieved February 17, 2018, from Paymill: https://blog.paymill.com/en/six-essential-elements-of-an-application-security-framework/