Identifying and Managing Forms of Computer Security

Topics: Computer security, Information security, Computer Pages: 4 (1007 words) Published: June 12, 2013

Identifying and Managing Forms of Computer Security
Professor Francis Marin
Rodney Wakefall
Strayer University
CIS 105 Introduction to Information Systems
September 1, 2009

The corporate IT environment has changed irrevocably over the last few years. Threats are no longer high-profile viruses that spread themselves to millions of Internet users for maximum publicity. Today's fast, targeted, silent threats take advantage of the open network and new technologies that support an increasingly mobile workforce. Organizations need innovative approaches to protect the web, email servers and endpoint. This paper discusses the different types of threats, types of security and how to prevent data loss.

Computer Security
Computer security is a branch of technology known as information security as applied to computers and networks. The objective of computer security includes protection of information and property from theft, corruption, or natural disaster, while allowing the information and property to remain accessible and productive to its intended users. Computers face constant threats from viruses, worms, Trojan horses, spyware, zero-day attacks, and other types of malware. Achieving effective computer security requires a solution that's designed to fit your needs today and can adapt to tomorrow's security threats. Security is becoming increasingly complex, as new Internet threats appear daily or even hourly.

Computer Security was first developed for providing physical protection to limit access to all but a few authorized individuals. “With today’s worldwide networks, however, computer security involves much more. Despite its expanded nature and increased importance, computer security today has the same basic objectives as forty years ago” (White, Fisch, & Udo, 1995). We use the term security in many ways in our daily lives. A security system protects our house, warning...

Citations: and Referencing (APA Style) | 20 | 17 | The requirement stipulated that you use a minimum of four sources. |
Total | 100 | 94 | |
Continue Reading

Please join StudyMode to read the full document

You May Also Find These Documents Helpful

  • Computer Security Essay
  • Elements of Computer Security Essay
  • Essay about Computer Security
  • Computer Security Research Paper
  • Essay about Computer System: Security Threats and Defenses
  • Essay on Computer Security and Educational Services
  • Computer Networking Security Essay
  • Computer Security Risk for Home Users Essay

Become a StudyMode Member

Sign Up - It's Free