logo

Computer Security: Protecting Systems and Information

   

Added on  2023-01-18

15 Pages5076 Words58 Views
Computer Security

Executive Summary
Computer security refers to securing computer systems as well as information from
unauthorised use, theft and harm. It is liable for detection as well as prevention of unauthorised
use of devices. Different kind of attacks are carried out within system of firms for having access
to their information, it is being carried out to harm the stakes of firm within market or have
access to details of their potential customers. For this firms make use of appropriate measures by
detecting vulnerabilities, threats and compromised systems so that at a early stage they can be
prevented. To deal with them frameworks like SABSA, Payment Card Industry Data Security
Standard, NIST Cyber security, COBIT and ISO framework can be used by firms. Along with
this, anti-virus and anti-malware must be installed within the systems as well as updated on
continuous basis. This will lead organisation top stay away from any kind of vulnerabilities and
threats which may hamper operations of their organisation.

Table of Contents
Executive Summary.........................................................................................................................2
Introduction......................................................................................................................................1
Overview................................................................................................................................1
Task 1...............................................................................................................................................1
5 elements of computer security that can act as potential risk...............................................1
Task 2...............................................................................................................................................4
Illustrate understanding of issues related with computer security through usage of threat
intelligence concept................................................................................................................4
Task 3...............................................................................................................................................6
Appraise cyber security frameworks for protection of different actors.................................6
Task 5...............................................................................................................................................9
Explicate code of conduct needed by IT professionals in context of ethical, social as well as
legal consideration..................................................................................................................9
Conclusion.....................................................................................................................................11
References......................................................................................................................................12

Introduction
Computer security/IT security or cybersecurity refers to process of protecting systems for
any kind of damage or theft to software, hardware and data from misdirection or disruption of
services which are being rendered by them. Information security has become an important aspect
with the evolution of technology as it has increased number of threats which can arise on the data
which is processed by them (Basta and CISSP, 2013). This is mandatory for each firm to
maintain overall health of their system to remain protected from malware and virus so that
programs can be executed in smoother and quicker manner. To understand the concept of
computer security, utility company has been taken. They are liable for maintaining infrastructure
for public services like water, natural gas, coal, telephone, sewage, transportation, broadband
internet and many others. This report comprises of security elements, issues related with
computer security, frameworks related with that along with social, legal and ethical
consideration.
Overview
This report is based on utility company's website which has been attacked by botnet. It is
a program which spreads online rapidly by injecting themselves within the website and wait for
users to click on the specified site. They have the ability to get install within the system who has
visited their website. This implies that both firm and users will get affected by this (botnet) and
need to take some preventive measures for eliminating such kind of activities or attacks.
Task 1
5 elements of computer security that can act as potential risk.
The protection of data along with computing system which are stored and accessed is
referred to as computer security. It implies global demand for protection of computer system
from any kind of malicious attacks that can be created on services rendered by a firm (Boyle and
Panko, 2014). It is crucial for organisation to ensure that their systems are protected from any
kind of illegal activities and for this it is necessary to identify critical elements which might be
impacted. They are specified below with respect utility organisation:
Confidentiality: The protection of information from unauthorised parties from being
accessed is defined as confidentiality. Basically, it denotes that people who are authorised can
have access to sensitive data. This is concealment of resources or information which is required
1

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Computer Security: Fundamentals, Examples, and Countermeasures
|15
|5240
|98

Computer Security: Elements, Issues, and Frameworks
|15
|5037
|1

Importance of Cyber Security in Protecting Against Cyber Attacks
|26
|8270
|85

Information Governance And Cyber Security
|11
|3243
|86

Information Technology Security Issues
|3
|555
|185

(PDF) Study of Botnets and their threats to Internet Security
|8
|1126
|478