100% (1)
Pages:
3 pages/≈825 words
Sources:
1
Style:
APA
Subject:
Technology
Type:
Essay
Language:
English (U.S.)
Document:
MS Word
Date:
Total cost:
$ 18.23
Topic:

Computer Security: Risk Management, Elements, and Establishment

Essay Instructions:

Define computer security. Discuss online security issues including computer security and risk management. Examine the main elements of computer security. Make sure to address the four steps in establishing a security policy.

Textbook- Electronic Commerce 12th Edition

Author: Gary P Schneider

Google Drive Link for textbook pages

https://drive(dot)google(dot)com/drive/folders/1AQif2WB8kRj0XdbDYmun814F2nwHY1vb?usp=share_link

Essay Sample Content Preview:

E-Commerce Online Security
Student Name
Department, University
Course Code: Course Name
Professor’s Name
Due Date
Define Computer Security
Computer security refers to the process of protecting assets from illegal access, use, or destruction. There are two types of computer security including, logical and physical. Logical security entails safeguarding computer assets through the application of nonphysical techniques such as using antivirus software and passwords. Physical security involves protecting computer assets against illegal access using security fences, fireproof doors, guards, and alarms (Schneider, 2017). A threat is any object or act that potentiates computer resources or assets vulnerabilities. In computer security, a countermeasure constitutes a procedure tailored to recognizing, reducing, or eliminating vulnerabilities.
Discuss online security issues, including computer security and risk management
Computer security within the online security landscape can be conceptualized as protecting computer assets, such as data and operating systems, from unauthorized people’s use, access, theft, and malicious intent. As noted in the preceding discussion, any object that potentiates vulnerabilities in the computer infrastructure or asset is termed a threat to computer security. In this context, a countermeasure is necessary to recognize and mitigate online computer threats, such as eavesdroppers, hackers, crackers, and viruses (Schneider, 2017). The extent to which countermeasure occurs can differ according to the significance of the computer asset at risk or the severity of the vulnerability. Computer risks that are unlikely to occur can be ignored, especially when the protection cost against the danger surpasses the value of the resource to the protected.
Risk management is the process of protecting electronic commerce and internet assets against physical as well as electronic threats posed by eavesdroppers, impostors, and hackers. In the context of online security, an eavesdropper is an individual or device that can copy and listen to internet transmissions. Hackers are technologically skilled individuals who can manipulate technologies to get unauthorized entry to network systems and computers to steal information or destroy the system’s software and hardware. Crackers are skilled individuals who leverage their competencies to access network systems or computers without permission – typically to steal critical information or compromise the entire information system infrastructure or hardware. To implement a practical security plan, the organization should establish the vulnerabilities, determine how to safeguard threatened assets, and compute the cost allocations based on the severity of the risk. In order to protect computers a...
Updated on
Get the Whole Paper!
Not exactly what you need?
Do you need a custom essay? Order right now:
Sign In
Not register? Register Now!