Tuesday, May 7, 2019

Computer security Essay Example | Topics and Well Written Essays - 1500 words

Computer credentials - Essay ExampleIt also provides recommendations for them. Threats to the system of rules acknowledge the absence of multilayered protection. The ease with which the junior police officer retrieveed the DRS is suggestive of implies threats too. The backup copies were not functional and the ease of access meant that the information is at a greater risk. in that respect were also a number of security principles that were broken. These involve the need for professionals to have knowledge about their profession, lack of responsibility by the duty manager and so on The recommendations encompass the development of multifactor authentication, a risk management system, introducing firewalls etc. Introduction One of the oldest definitions for security is that it is the address whereby steps are taken to minimize vulnerabilities of assets and resources. Security encompasses the elements of keeping information confidential and of upholding the integrity and availabl eness of resources these three elements are often used to describe computer security goals (Stallings 2009). It is often associated with the three As authentication, authorization and accountability. Security does not entail the elimination of every threat or vulnerability to the system rather security implies that there is no such thing has 100% security, although one can extend close to it. ... On the other hand, security will be high if the data is secured tightly, causing obstacles in accessibility (Cross & Shinder 2008). Computer security is also regarded as a compromise it is seen that the greater the security, the difficult it is for users to exertion with the system (Salomon 2006). The case study provides an example of how security lapses can occur and expose the systems vulnerabilities. This paper looks into the threats and vulnerabilities that the event exposed and examines the security principles that were broken. It also provides recommendations for buttressing the sec urity of the computer systems based on the identified threats and vulnerabilities. Identifying Threats and Vulnerabilities Threat to a computing device is referred to as any potential happening, either unwilled or malicious, that may cause undesirable effects on the asset (Newman 2009). One of the main security issues that the event brought into limelight was the ease with which a junior employee was able to change the keys for the encryption on the database. There was no layered security protocol and a simple password provided the user access to expensive information. Moreover when the junior officer had logged into the system using the password of the duty manager, a message came up asking the officer to change the crypto keys on the DRS. Giving away the password to a junior officer and allowing him access to company files and other information which constitute a large value of the company gives reverse to threats to the security of the computer. The junior officer did not know much about the natural covering that launched to change the keys. The application could have been a malicious software too and could

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.