Monday, June 17, 2019
Computer security Essay Example | Topics and Well Written Essays - 1500 words
Computer surety - Essay ExampleIt also provides recommendations for them. Threats to the system involve the absence of multilayered protection. The ease with which the junior officer accessed the DRS is indicatory of implies threats too. The backup copies were not functional and the ease of access meant that the information is at a greater risk. There were also a number of security principles that were broken. These include the need for professionals to have knowledge about their profession, lack of responsibility by the duty manager etc. The recommendations encompass the development of multifactor authentication, a risk prudence system, introducing firewalls etc. Introduction One of the oldest definitions for security is that it is the process whereby steps are taken to minimize vulnerabilities of assets and resources. Security encompasses the elements of keeping information confidential and of upholding the integrity and accessibility of resources these three elements are ofte n used to describe computer security goals (Stallings 2009). It is often associated with the three As authentication, authorization and accountability. Security does not entail the excreta of every threat or vulnerability to the system rather security implies that there is no such thing has 100% security, although one can sop up close to it. ... On the other hand, security will be high if the data is secured tightly, causing obstacles in accessibility (Cross & Shinder 2008). Computer security is also regarded as a compromise it is seen that the greater the security, the difficult it is for users to work with the system (Salomon 2006). The case study provides an example of how security lapses can occur and expose the systems vulnerabilities. This paper looks into the threats and vulnerabilities that the event exposed and examines the security principles that were broken. It also provides recommendations for buttressing the security of the computer systems based on the identified th reats and vulnerabilities. Identifying Threats and Vulnerabilities Threat to a computing contrivance is referred to as any potential happening, either unintentional or malicious, that may cause undesirable effects on the asset (Newman 2009). One of the main security issues that the event brought into limelight was the ease with which a junior employee was able to change the keys for the encryption on the database. There was no layered security protocol and a simple password provided the user access to valuable information. Moreover when the junior officer had logged into the system using the password of the duty manager, a message came up asking the officer to change the crypto keys on the DRS. Giving away the password to a junior officer and allowing him access to company files and other information which render a large value of the company gives rise to threats to the security of the computer. The junior officer did not know much about the diligence that launched to change the keys. The application could have been a malicious software too and could
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.