UNIVERSITY OF LA VERNE
La Verne, CA
July 25, 2014
Submitted in partial fulfillment
of the requirements for the degree
of Master of MBA
Professor Yehia Mortagy
BUS 510 Management of Information Technology
College of Business and Public Management
In the modern society, information can benefits both groups and individuals in many different areas. Whereas, at the same time, information also can be used to bring out a threat or even an act of war such as if a cyber attack which take down our financial systems or government systems. Computer security arouses the ethics and risk analysis, and is concerned with topics such as computer crime, the prevention, detection, remediation of attacks, identity and anonymity in cyberspace. In this paper, I want discuss the main problems of computer security and its serious threats.
Computer security, also known as cyber security or IT security, is information security as applied to computing devices such as computers and smartphones, as well as computer networks such as private and public networks, including the Internet. Computer security, which is the composition of hardware, software network system and the safety of delivering information through network, has been an essential issue. Computer security has not only technical problems but also management problems, and at the same time, both of them affect each other. The major technical areas of computer security are usually represented by the initials CIA: confidentiality, integrity, and authentication or availability. Confidentiality means information cannot be access by some parties unauthorized. It is a kind of secrecy or privacy, which breaches of confidentiality range from the embarrassing to the disastrous. Integrity means that information is protected in order to against unauthorized changes that are not detectable to authorized users. Authentication means that users are who they claim to be. Availability means that resources are accessible by authorized parties. The major management area of computer security is that the defects and deficiencies in the operation and management system restricts the computer security. The information security policies, programs and management tools, are all effect the operation and management system. The threats that computer security faced are multifaceted, including both threats from human error and malicious attacks artificially. It is a very serious problem that many incidents of hacking compromise the databases and other resources on some important system such as bank and government on purpose. Just like Leon Panetta said, the USA should consider any crippling attack on the Internet as a declaration of war on it. In fact, it has been a common question to the whole international community. Over the past years, there is a kind of computer virus Stuxnet that wiped out nearly 60 percent of Iran’s computer network. It illustrates that nation-states are easy to be effected by crippling cyber actions from other nation-states or individuals. And even the international community can not find the exact source and purpose of the virus, but clearly, because of this attack, they has realized their big vulnerability. First of all, in order to reduce the risk of attack from a similar virus, the policy makers must recognize that current security measures and systems are not powerful enough to prevent the attack with this type. In addition, people should attempt to discern the source of a cyber attack from different ways. Even though it may not be efficient enough to prevent Stuxnet right now, they also can build a well-architected and self-reinforcing manner to greatly improve an organization’s ability to prevent, detect, and respond to these types of cyber incidents. For example, government can encourage experimentation with promising technologies and practices. Why are...
Please join StudyMode to read the full document