Thursday, June 20, 2019

Digital Security Essay Example | Topics and Well Written Essays - 2000 words

Digital surety - Essay ExampleDigital security devices include secure personal devices such as SIM cards, smart-card found USB tokens, e-passports, secure chips in contactless payment cards, and they give an individual the freedom to shop, communicate, travel, work and bank using his or her digital identity in a demeanor that is enjoyable, convenient and secure. Therefore, digital security is of utmost important since a lot of information is available on the various digital platforms. Some is personal or closed-door information and some is extremely sensitive information. Therefore, any person or firm needs to put in place security measures that operate that the security of systems is not breached. This paper examines computer security principles, cryptology and its associated applications and secure software engineering. Computer Security Principles There are many methods and approaches that are employ to secure computer systems. However, specific intrinsic expectations have t o be met regardless of whether the system is large or small, or is owned by a private organization of by a government. Therefore, there exists generally accepted system security. These principles usually address computer security from an extremely high-level point, and are to be applied when developing computer security policy and programs, and in the creation of new systems, policies and practices (Guttman & Swanson, 1996). Thus, practices encompass broad areas such as accountability, integration and cost-effectiveness. Principles differ from practices in the sense that the latter guides organizations on the types of objectives, procedures and controls that constitute an effective computer security program. Principle 1 Computer Security Supports the Organizations Mission The come out of computer security is to protect the valuable resources of an organization. These include software, hardware and information. By selecting and applying adequate safeguards, computer security support s a firms relegating by protecting its financial and physical resources, legal position, reputation, employees and other intangible and tangible assets (NIST, 1995). Sometimes security can be viewed as a nuisance due to the rules and procedures that are imposed on systems, users and managers. However, well-chosen security procedures and rules are there to protect significant assets as well as support the overall mission of the firm. As such, security should be viewed as a means to an end, and not an end in itself. Take an example of a private business. Usually, making net is primary while good security is secondary. Therefore, security should be able to support this primary goal of making profit. Principle 2 Computer Security is an Integral Element of Sound Management Information and computer systems are crucial assets that support an organizations mission. Protecting these systems is as important as the protection of other organizational resources such as employees, physical ass ets and money. It should be observed that the inclusion of security considerations in managing computers and information does not totally obliterate the possibility that the assets might be harmed. According to Hayden & Feringa (2004), this is why the managers of an organization have to decide the level of risk that they are ready to accept, taking into the account the be associated with security controls. When a firm

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.