SlideShare uma empresa Scribd logo
1 de 4
v                                      See more essay samples onESSAYSHARK.COM




           Five-Paragraph Essay Sample



    COMPUTER SECURITY AND PRIVACY


        EssayShark.com - Online Academic Assistance
v                                                         See more essay samples onESSAYSHARK.COM




In the book Web Security, Privacy & Commerce, S. Garfinkel (2002) observes that “A
computer is secure if you can depend on it and its software to behave as you expect”. This is
held as true by most computer users, whether they sit in the privacy of their own homes or
work in any size undertaking or corporation (Garfinkel 3). All users understand that they take
risks when they use computers, which they attempt to mitigate by putting safety measures
into place. These measures are becoming increasingly complex and intricate, because making
a server and the data on it secure is neither simple nor straightforward. One hopes to stay a
step ahead of the ingenious people who find it a challenge to breach security, no matter how
complex (Pfleeger, 4). Countermeasures and controls are put into place by those who want to
protect their data, and the predictable ways in which their computers work. Protection of
personal and business data is essential, and is made possible by methods such as installation
of firewalls and use of encryption.

“Few controls are permanently effective” is a realistic but frightening sentence found early in
the book Security in Computing by C.P Pfleeger (2006), who advises frequent checks and
measures, and regular updating of computer security, to stay ahead of the geniuses who take
pleasure in seeking out the exposed and defenceless. One can be forgiven for thinking that the
most stringent of measures are the best. Many users adopt a “belt and suspenders” mentality
that has them putting more than one firewall into place, or installing more than one kind of
virus protection. There is, however, such as thing as too much defence. It is possible to run
the risk of programs overlapping and disabling each other, or software malfunctioning and
leaving the user with no protection at all (Bailey 17).

When security settings are too high, the user is practically paralysed, with access limited to
very few choices. Searches are reduced to a few options, and less and less is visible the more
stringent the settings become. The point of internet connectivity or belonging to a corporate
network is suddenly defeated (Garfinkel 88). While defending personal information from
identity theft, protecting juveniles from corruption, or insulating business data or assets from
theft, one must also safeguard and guarantee one’s ability to freely seek and exchange
information.

The cryptographic foundation of e-commerce is very complicated (Garfinkel 104), because
what it protects is of a highly complex and important nature. The sensitive data includes
information on banking, medical records, and national security data whose violation,
v                                                         See more essay samples onESSAYSHARK.COM


interruption, or interception could do widespread or irreparable damage. In addition,
“America’s electricity grids, water supplies, computer and cell phone networks and other
infrastructure are coming under attack” according to General Alexander, the leader of the
National Security Agency (New York Times, 2012) . The managers of this kind of material,
and especially essential services, which are not limited to facts and figures, are duty-bound to
safeguard it from theft, interference and digital snooping. Being too lax or blasé can lead to
down time at best, or exposure to terrorism and permanent damage in the worst case. If
security managers take their responsibility too far, on the other hand, it can lead to slow or
imperfect operations with reduced access to essential services (Pfleeger 69). Malicious
behaviour must be balanced by ethical and judicious control.
v                                                       See more essay samples onESSAYSHARK.COM


References




Bailey, M. The Complete Guide to Internet Privacy, Anonymity and SecurityNerel Online
     Publishing, 2011

Garfinkel, S. Web Security, Privacy & Commerce (Second Edition) O’Reilly Media, 2002

Pfleeger, C. P. Security in Computing (Fourth Edition) Prentice Hall, 2006

New York Times Computer Security (Cybersecurity) Times Topics August 2, 2012

     http://topics.nytimes.com/top/reference/timestopics/subjects/c/computer_security/index.
     html Retrieved August 16, 2012.

Mais conteúdo relacionado

Mais de ESSAYSHARK.com

Mais de ESSAYSHARK.com (20)

The Evolution of Female Representation in Disney Princess Films
The Evolution of Female Representation in Disney Princess Films The Evolution of Female Representation in Disney Princess Films
The Evolution of Female Representation in Disney Princess Films
 
Happy 10 years, EssayShark!
Happy 10 years, EssayShark!Happy 10 years, EssayShark!
Happy 10 years, EssayShark!
 
The Pay Gap Between Male and Female Employees
The Pay Gap Between Male and Female EmployeesThe Pay Gap Between Male and Female Employees
The Pay Gap Between Male and Female Employees
 
SCHOOL UNIFORM: THE KEY TO A SUCCESSFUL LEARNING PROCESS
SCHOOL UNIFORM: THE KEY TO A SUCCESSFUL LEARNING PROCESSSCHOOL UNIFORM: THE KEY TO A SUCCESSFUL LEARNING PROCESS
SCHOOL UNIFORM: THE KEY TO A SUCCESSFUL LEARNING PROCESS
 
Are Antidepressants Overprescribed
Are Antidepressants Overprescribed Are Antidepressants Overprescribed
Are Antidepressants Overprescribed
 
Geographical Conditions and National Cuisine
Geographical Conditions and National CuisineGeographical Conditions and National Cuisine
Geographical Conditions and National Cuisine
 
The Most Iconic Examples of Censorship
The Most Iconic Examples of CensorshipThe Most Iconic Examples of Censorship
The Most Iconic Examples of Censorship
 
Presentation on Globalization
Presentation on GlobalizationPresentation on Globalization
Presentation on Globalization
 
What is the Significance of Civil Rights Movements in the Middle of XX Century
What is the Significance of Civil Rights Movements in the Middle of XX CenturyWhat is the Significance of Civil Rights Movements in the Middle of XX Century
What is the Significance of Civil Rights Movements in the Middle of XX Century
 
APA Formatting Style
APA Formatting StyleAPA Formatting Style
APA Formatting Style
 
MLA Formatting Style
MLA Formatting StyleMLA Formatting Style
MLA Formatting Style
 
Chicago Formatting Style
Chicago Formatting StyleChicago Formatting Style
Chicago Formatting Style
 
«Crime and Punishment» Book Review
«Crime and Punishment» Book Review«Crime and Punishment» Book Review
«Crime and Punishment» Book Review
 
«Young Doctors Notebook» Book Report
«Young Doctors Notebook» Book Report«Young Doctors Notebook» Book Report
«Young Doctors Notebook» Book Report
 
How to Write a Resume That Rocks
How to Write a Resume That RocksHow to Write a Resume That Rocks
How to Write a Resume That Rocks
 
Tricks about effective studying you wish you knew before
Tricks about effective studying you wish you knew beforeTricks about effective studying you wish you knew before
Tricks about effective studying you wish you knew before
 
13 Creative Writing Exercises
13 Creative Writing Exercises13 Creative Writing Exercises
13 Creative Writing Exercises
 
7 English Idioms That Sound Funny in Different Languages
7 English Idioms That Sound Funny in Different Languages7 English Idioms That Sound Funny in Different Languages
7 English Idioms That Sound Funny in Different Languages
 
EssayShark in Numbers: 2016 Roundup [Infographic]
EssayShark in Numbers: 2016 Roundup [Infographic]EssayShark in Numbers: 2016 Roundup [Infographic]
EssayShark in Numbers: 2016 Roundup [Infographic]
 
6 Tips for Student Trips
6 Tips for Student Trips6 Tips for Student Trips
6 Tips for Student Trips
 

Último

Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
ciinovamais
 
Seal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptxSeal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptx
negromaestrong
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
kauryashika82
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
QucHHunhnh
 

Último (20)

Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
 
Dyslexia AI Workshop for Slideshare.pptx
Dyslexia AI Workshop for Slideshare.pptxDyslexia AI Workshop for Slideshare.pptx
Dyslexia AI Workshop for Slideshare.pptx
 
Unit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptxUnit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptx
 
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
 
PROCESS RECORDING FORMAT.docx
PROCESS      RECORDING        FORMAT.docxPROCESS      RECORDING        FORMAT.docx
PROCESS RECORDING FORMAT.docx
 
Seal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptxSeal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptx
 
Micro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfMicro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdf
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The Basics
 
Spatium Project Simulation student brief
Spatium Project Simulation student briefSpatium Project Simulation student brief
Spatium Project Simulation student brief
 
Asian American Pacific Islander Month DDSD 2024.pptx
Asian American Pacific Islander Month DDSD 2024.pptxAsian American Pacific Islander Month DDSD 2024.pptx
Asian American Pacific Islander Month DDSD 2024.pptx
 
Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
 
Understanding Accommodations and Modifications
Understanding  Accommodations and ModificationsUnderstanding  Accommodations and Modifications
Understanding Accommodations and Modifications
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdf
 
Food safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdfFood safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdf
 
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
 
On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsOn National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan Fellows
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
 
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17  How to Extend Models Using Mixin ClassesMixin Classes in Odoo 17  How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
 
Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024
 

Computer Security and Privacy

  • 1. v See more essay samples onESSAYSHARK.COM Five-Paragraph Essay Sample COMPUTER SECURITY AND PRIVACY EssayShark.com - Online Academic Assistance
  • 2. v See more essay samples onESSAYSHARK.COM In the book Web Security, Privacy & Commerce, S. Garfinkel (2002) observes that “A computer is secure if you can depend on it and its software to behave as you expect”. This is held as true by most computer users, whether they sit in the privacy of their own homes or work in any size undertaking or corporation (Garfinkel 3). All users understand that they take risks when they use computers, which they attempt to mitigate by putting safety measures into place. These measures are becoming increasingly complex and intricate, because making a server and the data on it secure is neither simple nor straightforward. One hopes to stay a step ahead of the ingenious people who find it a challenge to breach security, no matter how complex (Pfleeger, 4). Countermeasures and controls are put into place by those who want to protect their data, and the predictable ways in which their computers work. Protection of personal and business data is essential, and is made possible by methods such as installation of firewalls and use of encryption. “Few controls are permanently effective” is a realistic but frightening sentence found early in the book Security in Computing by C.P Pfleeger (2006), who advises frequent checks and measures, and regular updating of computer security, to stay ahead of the geniuses who take pleasure in seeking out the exposed and defenceless. One can be forgiven for thinking that the most stringent of measures are the best. Many users adopt a “belt and suspenders” mentality that has them putting more than one firewall into place, or installing more than one kind of virus protection. There is, however, such as thing as too much defence. It is possible to run the risk of programs overlapping and disabling each other, or software malfunctioning and leaving the user with no protection at all (Bailey 17). When security settings are too high, the user is practically paralysed, with access limited to very few choices. Searches are reduced to a few options, and less and less is visible the more stringent the settings become. The point of internet connectivity or belonging to a corporate network is suddenly defeated (Garfinkel 88). While defending personal information from identity theft, protecting juveniles from corruption, or insulating business data or assets from theft, one must also safeguard and guarantee one’s ability to freely seek and exchange information. The cryptographic foundation of e-commerce is very complicated (Garfinkel 104), because what it protects is of a highly complex and important nature. The sensitive data includes information on banking, medical records, and national security data whose violation,
  • 3. v See more essay samples onESSAYSHARK.COM interruption, or interception could do widespread or irreparable damage. In addition, “America’s electricity grids, water supplies, computer and cell phone networks and other infrastructure are coming under attack” according to General Alexander, the leader of the National Security Agency (New York Times, 2012) . The managers of this kind of material, and especially essential services, which are not limited to facts and figures, are duty-bound to safeguard it from theft, interference and digital snooping. Being too lax or blasé can lead to down time at best, or exposure to terrorism and permanent damage in the worst case. If security managers take their responsibility too far, on the other hand, it can lead to slow or imperfect operations with reduced access to essential services (Pfleeger 69). Malicious behaviour must be balanced by ethical and judicious control.
  • 4. v See more essay samples onESSAYSHARK.COM References Bailey, M. The Complete Guide to Internet Privacy, Anonymity and SecurityNerel Online Publishing, 2011 Garfinkel, S. Web Security, Privacy & Commerce (Second Edition) O’Reilly Media, 2002 Pfleeger, C. P. Security in Computing (Fourth Edition) Prentice Hall, 2006 New York Times Computer Security (Cybersecurity) Times Topics August 2, 2012 http://topics.nytimes.com/top/reference/timestopics/subjects/c/computer_security/index. html Retrieved August 16, 2012.