Running head: IDENTIFYING AND MANAGING FORMS OF COMPUTER SECURITY
Identifying and Managing Forms of Computer Security
Professor Francis Marin
CIS 105 Introduction to Information Systems
September 1, 2009
The corporate IT environment has changed irrevocably over the last few years. Threats are no longer high-profile viruses that spread themselves to millions of Internet users for maximum publicity. Today's fast, targeted, silent threats take advantage of the open network and new technologies that support an increasingly mobile workforce. Organizations need innovative approaches to protect the web, email servers and endpoint. This paper discusses the different types of threats, types of security and how to prevent data loss.
Computer security is a branch of technology known as information security as applied to computers and networks. The objective of computer security includes protection of information and property from theft, corruption, or natural disaster, while allowing the information and property to remain accessible and productive to its intended users. Computers face constant threats from viruses, worms, Trojan horses, spyware, zero-day attacks, and other types of malware. Achieving effective computer security requires a solution that's designed to fit your needs today and can adapt to tomorrow's security threats. Security is becoming increasingly complex, as new Internet threats appear daily or even hourly.
Computer Security was first developed for providing physical protection to limit access to all but a few authorized individuals. “With today’s worldwide networks, however, computer security involves much more. Despite its expanded nature and increased importance, computer security today has the same basic objectives as forty years ago” (White, Fisch, & Udo, 1995). We use the term security in many ways in our daily lives. A security system protects our house, warning...
Citations: and Referencing (APA Style) | 20 | 17 | The requirement stipulated that you use a minimum of four sources. |
Total | 100 | 94 | |
Please join StudyMode to read the full document