Preview

Computer Security and Cryptography Essay Example

Powerful Essays
Open Document
Open Document
1969 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Computer Security and Cryptography Essay Example
Computer security and cryptography

A computer program system that is supposed to be used only by those authorized must attempt to detect and exclude the unauthorized. Access to it is therefore usually controlled by insisting on an authentication procedure to establish with some degree of confidence the identity of the user, thence granting those privileges as may be authorized to that identity. Common examples of access control involving authentication include: * A captcha is a means of asserting that a user is a human being and not a computer program. * A computer program using a blind credential to authenticate to another program * Entering a country with a passport * Logging in to a computer * Using a confirmation E-mail to verify ownership of an e-mail address * Using an Internet banking system * Withdrawing cash from an ATM
In some cases, ease of access is balanced against the strictness of access checks. For example, the credit card network does not require a personal identification number for authentication of the claimed identity; and a small transaction usually does not even require a signature of the authenticated person for proof of authorization of the transaction. The security of the system is maintained by limiting distribution of credit card numbers, and by the threat of punishment for fraud. Computer security is a branch of computer technology known as information security as applied to computers and networks. The objective of computer security includes protection of information and property from theft, corruption, or natural disaster, while allowing the information and property to remain accessible and productive to its intended users. The term computer system security means the collective processes and mechanisms by which sensitive and valuable information and services are protected from publication, tampering or collapse by unauthorized activities or untrustworthy individuals and unplanned events respectively. The

You May Also Find These Documents Helpful

  • Good Essays

    Nt1330 Unit 1 Assignment

    • 711 Words
    • 3 Pages

    During operation, the system uses the access control rules to decide whether access requests consumers shall be approved or disapproved. Resources include individual files or items data, computer programs, computer devices and functionality provided by computer applications. Examples of consumers are computer users, computer programs and other devices on the…

    • 711 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    Computers systems are an essential piece of equipment in many people’s everyday lives they have to deal with a lot of processes information and be able to go on the internet where there is a risk of getting viruses and bugs. This is why computer systems have to be equipped with the right software utilities to ensure that they are working at their best at all times. There are many different types of software utilities available for a computer system I will explain them in detail in this report.…

    • 518 Words
    • 3 Pages
    Satisfactory Essays
  • Powerful Essays

    Nt1310 Unit 1 Assignment 1

    • 1434 Words
    • 6 Pages

    Information has become the most valuable asset of any organization. And keeping that information secure is a major factor in the design and development of any computer system. Security is defined by Merriam-Webster as “the state of being protected or safe from harm”. It is up to every organization to insure that their data is protected, and that nothing that is harmful to the company or its clients is compromised.…

    • 1434 Words
    • 6 Pages
    Powerful Essays
  • Satisfactory Essays

    07: Password and Ref

    • 4381 Words
    • 33 Pages

    Authentication is the process of ensuring that the individuals trying to access the system are who they claim to be.…

    • 4381 Words
    • 33 Pages
    Satisfactory Essays
  • Good Essays

    Information security includes the protection of information assets in storage, processing, or transmission. To assure the security of things such as schools, prisons, toads, and power plants, the confidentiality and integrity of information must be protected.…

    • 982 Words
    • 4 Pages
    Good Essays
  • Good Essays

    BSA/310

    • 674 Words
    • 3 Pages

    In business, an information security is a set of policies to protect the companies and small businesses infrastructure, physical, and information technology assets, and to ensure that information technology users within the domain of the companies and small businesses comply with the rules and guidelines related to the security of the information stored digitally at any network within the boundaries of authority. In short, it can protect data from the outside and even inside threat. The data and information, which the companies and small businesses have, are arguably the most important assets. They should ensure the data confidentiality, integrity, availability, non-repudiation, authentication, and authorization. Most small businesses and companies must have information security to ensure their business and information assets. Information security protects data and controls how it should be distributed within or without the businesses boundaries. This means that information should be encrypted and may have restrictions placed on its distribution to the third party. Information security should protect the data from the outside threats such as:…

    • 674 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    btec ict level 3

    • 870 Words
    • 4 Pages

    Security – This is when there are numbers of different ways to secure customers and websites information, this should make sure that they are able to adopt this to reassure their customers.…

    • 870 Words
    • 4 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Cis 105 Security Systems

    • 465 Words
    • 2 Pages

    With the variety of threats to worry about in regards to protecting one’s computer system, whether it is for a personal or business computer, it is very important to get some type of security protection. There are a lot of options out there in terms of what brand and what level of security an individual is looking for. The best option to protect a computer system from various threats is an all-in-one computer security system, such as Norton 360 and McAfee Total Protection. One problem an individual needs to worry about is identity theft. Identity theft problems can range from a stealing a person’s name, email address, physical address, credit card information, account numbers, documents, and even passwords. Other threats or annoyances to worry about are spyware, adware, pop-ups, spam, viruses, and worms. Keeping the computer system and the data contained protected within the computer is important.…

    • 465 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Security is a business issue because companies have very valuable information assets to protect. Business must protect not only their own information assets but also those of customers, employees, and business partners. Failure to do so may open the firm to costly litigation for data exposure or theft. Systems often hold confidential information about customers information( social security, date of birth, credit card information, taxes), corporate operations, new product development plans, marketing strategies. These information assets have tremendous value for the companies and can be devastating if they are lost, destroyed, disturbed or placed in wrong hands.…

    • 280 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    In April 2011, hackers obtained person information from over 100 million PlayStation Network users and Sony Online Entertainment users including credit, debit, and bank account information. This breach cost Sony and credit card issuers up to a total of $2 billion dollars (Laudon, 2013). During the time of the breach, security and control were not top priority. According to this case study Sony was using an older version of Apache Web Server software that was known for its security issues and compromised the security of Sony’s firewall, allowing hacker easy access. As for control, Sony obviously did not have appropriate policies or organizational procedures…

    • 328 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    Access Control Policy

    • 833 Words
    • 3 Pages

    Describe how and why authentication credentials are used to identify and control access to files, screens, and systems. Include a discussion of the principles of authentication such as passwords, multifactor authentication, biometrics, and single-sign-on.…

    • 833 Words
    • 3 Pages
    Powerful Essays
  • Better Essays

    Access control methods are a process that determines what services or company resources an employee has access to. These methods will be used to determine what an employee can and cannot access, as well as ways to make sure that all employees are being granted the correct access levels. Authentication is a process of determining whether someone or something is who or what they say they are. Authentication can be a form of determining whether an employee is actually the person that they say they are. Employees can be authenticated by being able to answer personal questions that only they would know or by providing a username and password that only the employee knows.…

    • 3217 Words
    • 13 Pages
    Better Essays
  • Good Essays

    It244 Access Control

    • 648 Words
    • 3 Pages

    Describe how and why authentication credentials are used to identify and control access to files, screens, and systems. Include a discussion of the principles of authentication such as passwords, multifactor authentication, biometrics, and single-sign-on.…

    • 648 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    Sanhu, R., & Samarati, P. (1996). Authentication, access control, and audit. ACM Computing Surveys (CSUR), 28(1), 241-243.…

    • 1465 Words
    • 4 Pages
    Powerful Essays
  • Good Essays

    Espionage is the secret gathering of information on rival countries for military purposes. Espionage can be used in business, military, economic or political decisions however; it is commonly employed government for defensive tactics. Espionage or spying is illegal in many nations however, it gains profits from agencies to protect the secrecy of information that is desired.…

    • 1313 Words
    • 6 Pages
    Good Essays