Friday, February 21, 2020
Computer Security Essay Example | Topics and Well Written Essays - 7500 words
Computer Security - Essay Example In this research a proposal of an offensive defense comprising of a corporate partnership with successful cyber defense software companies to provide a united front against malware is of the highest preference. The initial capital investment of free anti-virus software to users would be offset in time by added security and stability. The key to which is integration of the social subsystem in order to execute such a strategy. Computer usersââ¬â¢ basic lack of knowledge on the dangers that lie within the network system, such as the use of weak passwords or just trusting any e-mails sent to their mailboxes actually makes it easier for hackers to gain access to the vulnerable computers over the networked systems. Presently, the web is a host of viruses, worms, Trojan horses, making unsecured computer devices or computers that their protective software are not up-to-date easier to pull down through introduction of malwares into the systems. Solutions there in are to ensure safe and sec ured system administration. Situation Analysis This project rolls out several ambitious although critical objectives that are directed towards: laying out the central concepts for the current situations in regards to computer security of the stand alone or interconnected devices; to come up with the best definitions that covers the logic encompassed by insecurity consequences over the unprotected computer systems; and the subsequent establishment of a set of foundations that the thereafter work can be build upon. Organizations and individuals whose operations extensively dependent on the use of computers and their services do describe their needs for information security under major concepts of integrity, secrecy, availability and accountability of their required information. Therefore, every computer user has to make prompt decisions on what security as a measure means to him/ her. It is from this description of the userââ¬â¢s needs for security with his/ her personal computer o f organizationsââ¬â¢ computers that security policies are established; and hence, a system that effectively meets those needs is termed as a secure system (Venkatesh, V. et al., 2003, pp. 425-478.). In computer security, it is important take note that technology in never enough for a trusted system. Any business organization must ensure that its secure program takes into account other managerial controls, means of recovery from security breaches, and also full awareness and acceptance of people who are entrusted with the use of such devices (Weirich, D., and Sasse, M. A., 2001, pp. 137-143.). This idea of recognizing a person is brought about by the fact that security cannot be attained in an environment where people are not of full commitment in achieving a secure computer operation as a goal. Security continues to sap vital resources and manpower from the Information Technology (IT) departments. Rather than focusing on the efficiency of knowledge management, IT professionals ar e increasingly swamped with cyber security tasks. Profits from cyber-crime are shifting the threat from board teenagers to well financed professionals. A security survey analysis concluded that as break-ins morph from prank to business, profit-driven attackers
Wednesday, February 5, 2020
Literature review Essay Example | Topics and Well Written Essays - 2500 words - 1
Literature review - Essay Example adership has led to some difficulties in implementation, the potential benefits for the organization as well as the stakeholders, meaning owners, board members, managers, employees and consumers cannot be ignored. The following literature review illustrates this progression. In ââ¬Å"Meta-Analytic Reviews of Board Composition, Leadership Structure and Financial Performanceâ⬠(Dalton et al, 1998), the authors establish that there is no direct connection between the composition of traditional organizational boards or board leadership structures and financial performance of the organization despite widespread belief that such a relationship exists. After exposing this basic belief, the authors examine a number of different forms of board compositions and leadership structures and illustrate the means used to evaluate any relationship between these and the firmââ¬â¢s financial performance. Although these relationships have been studied in a variety of ways in the past, this study focuses on bringing the research together to determine whether the findings have yielded any meaningful results. Because this study takes into account numerous other studies, it is able to provide a more broadly-based view upon the findings of each study conducted and conc ludes that, despite individual reports of inconclusive results, is able to demonstrate that while there does not seem to be any direct relationship evident between the board and the firmââ¬â¢s financial performance, further study into the various ways board subcommittees might affect the firm is recommended, giving rise to many new theories regarding organizational leadership. In a study entitled ââ¬Å"The Illusion of Leadershipâ⬠(Weber et al, 2001), the problem of the large group in bringing about effective, efficient leadership in the organization is examined as the authors study how groups tend to work together through the use of coordination games. The authors suggest that the traditional means by which individuals are
Subscribe to:
Comments (Atom)