Buy custom Secure Systems essay
Computer security refers to the measures undertaken to protect computer information and property against theft, natural disasters and malicious intentions such as corruption of information. The security system adopted is meant to ensure that only eligible users access the information and computer rooms. Organizations all over the globe adopt various computer security systems that, they deem provide maximum security. Therefore, numerous computer security systems could be chosen. For instance, use of passwords, encryption of data, use of firewalls, locking computer rooms after use, installation of alarms in computer rooms, physical protection by use of security guards.. All these measures would ensure that computer information and properties are secure. There is a growing threat of computer security, which systems are the most secure?
According to research, computers security could be ensured by use of passwords. These are the secret codes and numbers that are developed to secure computers against unauthorized individuals. Passwords would ensure that only eligible persons log in to retrieve the desired information. Research asserts that passwords could be actual words or any other desirable character. Lehtinen, Russell, & Gangemi (2006) intimate that in order to ensure that computer security is achieved through passwords, the organization should develop unique codes for each department. In addition, passwords should not be leaked to outsiders or unauthorized individuals in the organization as this would lead interference with the information. Each computer and information should be assigned a password that is easy to memorize. Passwords should not be saved in the computers because they could be easily discovered and used for the retrieval of confidential information. Research asserts that individuals must consider the strength of the password before resolving to use it before resolving to adopt it. Attackers through guessing could easily crack weak passwords; therefore, accessing the hidden information. Password effectiveness would also be enhanced by taking care of computer viruses. According to Stallings & Brown (2008) an antivirus should be installed in the computer, to ensure that passwords are not affected leading to the ultimate loss of vital information. In cases where passwords have been leaked out, the organization should act faster to change them. Changes would ensure that the original password does not log into the information. This will promote a high degree of protection to organizational details intended for competitive advantage and other vital gains.
Data intended for transmission should be encrypted to enhance its security. Data encryption refers to the process by which the information being transmitted is transformed into a read only form using a decryption key. According to research, the decryption key ensures that information being transmitted through the network is safe because one cannot access it without the key used. Information would be safer in case the secret key is only shared among the communicators. This means the intended recipient thus averting any interference or loss of information would only access the information. Gollmann (2011) asserts that the protocols in the database will be protected through encryption thus, ensuring that the principles governing communication are observed to the latter. Encryption would be suitable where the information is shared via the internet, there are many users with different characters and some would want to read and alter the information. Computer users should ensure that they regularly update the encryption to enhance its efficiency. Straub, Goodman, & Baskerville (2008) observe that lack of regular updating would lead to loss of vital information or the exposure of the encryption key to unauthorized individuals. Research asserts that encryption is one of the vital computer protection mechanisms because it includes many technicalities especially in the access to information. Under this system, all the information in the database would be safe as it is transmitted.
Firewalls are used to enhance computer security. These filters allow communications only under certain circumstances. Research asserts that they are helpful because they eliminate unauthorized network users from accessing the information. According to Newman (2009), firewalls work under rules where they only allow the authorized individuals to access the required information. The rules governing the functioning of firewalls are vital because they determine and weigh clients before allowing for connection. They only connect the authorized networks and eliminate those deemed unauthorized and corruptive to the system information. The client’s host name is compare to the existing rules and validity determined. Firewalls provide the owner with numerous warnings in cases where unauthorized attempts to access the information has been made. This would provide for a room, to take corrective measures and ensure enhanced protection. Drab (2011) intimates that in order to ensure firewalls work properly, the server should continuously update them. They should not be allowed to run out time. According to research, the secrecy of the computer system would be enhanced by strategically placing the firewall between the public network and the organization’s intranet. This will make sure that information is filtered before getting into the public domain. The information would not be in a position, to be interfered with because of the control measures existing between these two networks.
The closure of computer rooms after use boosts computer security. This is a protective mechanism that ensures computer rooms with valuable information are kept under lock and the keys safely kept. According to research, the organization should not allow its employees to carry the keys to computer rooms freely. Delloite (2011) asserts that keys should be kept at designated places within the organization. In cases where computer rooms are left open, thieves could get in and take away the machines leading to loss of vital information. They could easily take computers perceived to be carrying the organization’s strategic decisions; this will retard everything and could lead to negative publicity if the information is altered for personal interest. Unlocked doors could also motivate unauthorized individuals to get into the computer rooms and read the organization’s secrets. All this would lead to loss of vital information to outsiders and competitors. Wilshusen (2009) observes that computer rooms should also be closed when vital information is being processed. The system should ensure that the real individuals working on the information access the room. In cases where the keys to the rooms are lost, faster action should be taken to ensure that new padlocks and keys are bought. This is to ensure that lost keys are not used to access the rooms. This security measure would be enhanced by making sure that well made doors and windows are used. Metallic doors are more preferable because they cannot be brought down and in cases of theft, it would be easy to tell. Research asserts that the locking of computer room doors would reinforce other measures put in place because there is no entrance into the place making sure that no passwords are lost.
Installation of alarms in computer rooms would promote computer security. Organizations have embraced alarms to boost computer security. These devices warn the concerned individuals of any unauthorized interferences. According to Pooch, Fisch, White, & Gregory (1996) alarms should be strategically placed in computer rooms and should be able to detect unauthorized access. Alarms are supposed to work perfectly by raising a concern in advance. Organizations use alarms especially in the prevention of crimes relating to computer loss. The alarm system of protection is effective especially when the computer operator is far away from the computers. Alarms would ensure that they gets to the rooms in time and prevent any form of crime. Research asserts that alarms would be effective if set at secret points where no one can access them. Alarms are vital due to their automatic nature of operation; they are not supposed to be controlled but automatically detect unauthorized individuals and raise a call. The alarm should be regularly checked to ensure it functions to the maximum. Pooch, Fisch, White, & Gregory (1996), intimate that any deviations in its working should be sense and corrective measures taken to increase its efficiency. The alarm system of protection would be vital in large organizations where operations are dispersed. This is because of the large distance covered by the alarms warning. A central control system should be set up to oversee the operations of alarms and make sure they are not interfered with. They should always be modified to achieve the desired quality and continued efficiency.
Human security is a vital security measure. This is a physical protection measure for computers. This is a system where guards are employed and assigned the different sections in the computer areas. They would be there to ensure that only authorized individuals get access to the computer rooms. Individuals are supposed to identify themselves before getting into information processing rooms. Guards ensure that computers are safe from thieves. According to research, they provide maximum security, which would ensure not all computer system is interfered with. Lehtinen, Russell, & Gangemi (2006) observe that human security is vital in computer protection because it provides a more physical sense of protection as guards are able to look at the vents as they occur. Strict guards would ensure all the computers are safe by ensuring that everyone getting into the rooms is frisked and ordered to give the purpose for the visit to computer rooms. This kind of system would provide an automatic barrier to malicious individuals especially if the guards are not subject to being changed through bribes. Under this security measure, organizations should consider it necessary to move or change the guards if there are any signs of conflict of interest. This would make sure that quality protection is achieved thus, putting off any fears of computer losses. Research asserts that human security would be vital especially in large organizations to complement other security measures. Human beings would provide security to both the computer information and machine theft. The security provided by guards is trustworthy because of its physical nature. Guards should also be fairly paid to ensure quality work is done.
The adoption of wireless transmission ensures computer security. Wireless transmissions would be vital in keeping off hackers. This is because they mostly depend on physical means to access data transmitted over the networks. This security measure would ensure that data transferred across the networks is as intact as possible. Hackers and other unauthorized individuals are not able to access the information and alter it because they are unaware of the source and contents. This vital security measure would ensure the organization is in a better position, to communicate and exchange information over long distance without fear of loss of confidentiality. Wilshusen (2009) points out that a stronger wireless transmission is adopted to boost the protective quality of the information. The transmitted information would thus be received in the desired format. Research asserts that the use of wireless transmission would ensure that the information is transported at a faster rate through the network hence leaving no possibility for interference with the information. Wireless transmission ensures that the intended persons only open the information sent or received. It is a security measure that adopts basic technology leading to reduced costs.
Cloud computing is being used as a security system. This method ensures several individuals share information transmission channels. According to research, it is ensures that computers are protected because it helps in the storage of user accounts in a remote database. This will ensure that no unauthorized individual accesses them to change and cause any other kind of harm to the documents. Cyberspace Policy Review (2011) asserts that cloud computing acts as a hindrance for unauthorized individuals willing to access the computer at any point because of the rules and procedures required. It demands numerous authentication details before allowing one to access the information. Stallings & Brown (2008) asserts that this security measure works well when managed in an efficient manner. Steps should be taken to ensure that cloud computing is effective. It should not be interfered with because it could lead to the unexpected exposure of secret information. Employees should not be allowed to abuse cloud computing because it would be inefficient in its further operations. According to research, cloud computing should be updated every moment to make sure it is in line with the existing trends. Cloud computing is also used to reinforce other security measure such as passwords due to its demand for such codes before access is allowed. In addition, it protects the initial details of all the information that is sent.
There are many computer security systems. All of these methods are vital because they complement each other in ensuring the safety of computers. They are all vital techniques of ensuring there is a maximum security to the computers. According to research, all the computer protection systems have positive and negative sides. For instance, passwords could be easily forgotten leaving to the loss of vital information. Firewalls are negative because they could easily malfunction and lead to the loss of data. Computer threats are on an increase, but it is difficult for one to determine the best to use among the large collection. According to research, no method is better than the other is. This is because all computer protection systems carry both positive and negative impacts. Cyberspace Policy Review (2011) asserts that there is no protection system superior to the rest because they mainly complement each other in their operation. Research indicates that, for the success of an organization, all these methods need to be unified for maximum security, to be achieved. None of the methods is self-reliant. This is enough to prove that there is no instant of superiority among all the methods. They should be incorporated and complemented to achieve the best for the organization.
In conclusion, computer security refers to the undertaking of steps to protect computer information and machines against losses. There are numerous computer security systems. Passwords are helpful in ensuring that unauthorized individuals do not access secret information. They supposed to be regularly altered in cases of discovery. Firewalls are security measures that are used to filter information and respective users. It ensures that the information is only available to legal users. Alarms provide an efficient form of security especially in machine theft. They cover large distances and are suitable for computer theft prevention in large companies. Human security is a form of physical security that could be adopted to protect computers. They protect both data details and machines from losses. Guards could be regularly changed and rotated to ensure that they work and deliver efficiently. Organizations are using cloud computing as a security technique. Under cloud computing, one is not able to access details as they are stored in the remote database. Wireless transmissions are vital security measures that deny hackers an opportunity to alter information. Computer protection methods are numerous, and there is none that is superior compared to others because they continuously depend on each other for success.
Buy custom Secure Systems essay