Top-Rated Free Essay

Computer Security

Good Essays
Computer Security Many commercial software packages are designed with computer security features that control who can access the computer. These types of access controls use a process called identification and authentication. Identification verifies that the user is a valid user, and authentication verifies that the user is who he or she claims to be. Three common methods of authentication are remembered information, possessed objects, and biometric devices. With remembered information, a user is required to enter a word or series of characters that match an entry in a security file in the computer. Most multiuser operating systems provide for a logon code, a user ID, and a password (all forms of remembered information) that all must be entered correctly before a user is allowed to use an application program. A logon code usually identifies the application, and a user ID identifies the user. “A password usually if confidential, often known only by the user and the system administrator.” (Baker, 29-47). A possessed object is any item that a user must carry to gain access to the computer facility. Examples of possessed objects are badges, cards, and keys. Possessed objects often are used in conjunction with a personal identification number (PIN), “which is a numeric password.” (Prince, 15-18). A biometric device is one that verifies personal characteristics to authenticate a user. Examples of personal characteristics are fingerprints, voice pattern, signature, hand size, and retinal (eye) patterns. “A biometric device usually translates a user’s personal characteristics into a digital code that is compared to a digital code stored in the computer” (Victors, 7). If the digital code in the computer does not match the user’s code, access is denied. Each of these authentication techniques has advantages and disadvantages.
Many organizations distribute brochures and newsletters to promote their biometric devices. In the past, preparing these devices was extremely complicated and expensive. Due to modern technology; however, biometric devices have become very affordable (Baker, 29-47). A computer system should implement one or more of these authentication techniques to secure it from accidental or intentional misuse. In addition, the organization should review the techniques in place regularly to determine if they are still appropriate.

Works Sited Baker, Jamie D. and Cynthia I Danville. “Security, Ethics and Privacy”. Computers and Society Journal, Feb. 1998: pp. 29-47. Price, Karen E., “Identification and Authentication Controls”. pp.15-18. Victors, Michael R., The Computer Auditor. St. Louis: Green Valley Publishing Company, 1998. pp. 7. Baker pp. 7

You May Also Find These Documents Helpful

  • Powerful Essays

    Computer Security

    • 768 Words
    • 4 Pages

    Computer Security Student Name University Abstract James works for a bank, and he spends most of his attending to bank clients and travelling. He always carries with him a laptop that contains confidential bank information. The Operating System of the laptop was last updated in May 2011. Some of the programs James uses are MS word 2007, MS Access and MS Excel. James’ computer is, however, not well secured. It does not have a firewall or an antivirus. In addition, the data in the laptop are…

    • 768 Words
    • 4 Pages
    Powerful Essays
  • Good Essays

    Computer Security

    • 792 Words
    • 4 Pages

    Computer technology permeates most aspects of our lives. The ability to use computer technology and to evaluate electronic information has become a basic skill for most of people. In most places of business, a computer is standard. In the bank they use computers to look up for account information. They use computers in the auto repair shop to assess the cars. We can't find books in the library by looking in a card catalog — we must use a computerized database. Doctors' offices utilize computers…

    • 792 Words
    • 4 Pages
    Good Essays
  • Good Essays

    Computer Security

    • 810 Words
    • 4 Pages

    that pertains to all people. The law that amended the Computer Fraud Abuse Act of 1986 is the National Information Infrastructure Protection Act of 1996, it changed several sections of the Computer Fraud Abuse Act and increased the penalties for selected crimes. The law that was specifically created to deal with encryption policy in the US was the Security and Freedom through Encryption Act of 1999. In an information security context, privacy is not absolute freedom from observation,…

    • 810 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    Computer Security

    • 488 Words
    • 2 Pages

    G53SEC Computer Security Spring 2012/2013 Coursework 1 Name ID : : Arvinth Gunasegaran 005917 09/04/2013 Due date : Introduction/Technique Cryptography is the act or practice of using techniques for secret communication over public communication channels. The purpose of this is to enable the transmission of messages secretly without being understood by third parties. Cryptography is achieved by means of encryption, which is the process of converting normal text to ciphered text…

    • 488 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Computer Security

    • 549 Words
    • 3 Pages

    In discussing crime trends, it is important to understand the economic and political factors at the time that may have influenced the crime rate (example: economic recession; war; economic prosperity; etc). What variety of factors do you think influence the crime rate? Where do you think crime is most prevalent and why? In your postings be certain to discuss the issues of race, class, and gender. Use the framework listed in the above paragraph to post an answer to one of the three following questions:…

    • 549 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Computer Security Breach

    • 870 Words
    • 4 Pages

    happen at any place and any time when talking about computer security incidents. Not everything goes perfectly fine when a computer system is involved. It could be something as simple as a bad cable or it could be as horrible as a hacker trying to steal all of your information. Either way, it probably isn’t going to end well. Additionally, the FBI and the Computer Security Institute, in their annual survey on computer crime and information security, gathered the following disturbing facts in 1998:…

    • 870 Words
    • 4 Pages
    Good Essays
  • Good Essays

    Question 1: What are IT attacks? In computer, an attack is any effort to destroy, expose, alter, disable, steal or gain unauthorized access to or make unauthorized use of an asset. An attack usually is perpetrated by someone with bad intentions. The general term used to describe the category of software used to logically attacking computers is called malware. IT Security risk means that there might be unauthorized access to or theft of proprietary data…

    • 2138 Words
    • 9 Pages
    Good Essays
  • Good Essays

    General Computer Security

    • 2174 Words
    • 9 Pages

    General computer security Presented by developerWorks, your source for great tutorials ibm.com/developerWorks Table of Contents If you're viewing this document online, you can click any of the topics below to link directly to that section. 1. Tutorial tips 2. Security concepts 3. Physical security 4. Logistical security 5. Data security 6. Technical security 7. Overview and summary 8. Feedback 2 3 5 6 7 9 11 12 General computer security Page 1 Presented by developerWorks, your…

    • 2174 Words
    • 9 Pages
    Good Essays
  • Good Essays

    Overview on Computer Security In this course, you have discovered how important computers and their contents are to everyone. Safeguarding your computer and its valuable information is important. You should be aware of the threats facing by your computer and data, and take necessary measures to protect them as well. By taking some precautionary steps, you can safeguard not only your hardware, software and data, but yourself. This lesson introduces you with some of the most common threats to your…

    • 1208 Words
    • 5 Pages
    Good Essays
  • Good Essays

    vulnerabilities are in your environment is very important. High level and low level auditing capabilities provide necessary levels of insight into the effectiveness of your policies and enforcement capabilities. The technology involved in information security changes and improves as time…

    • 962 Words
    • 4 Pages
    Good Essays