Create a new account

It's simple, and free.

Computer and Database Security

A discussion of computer and database security is presented which discusses internal (employee) and external system security. Secondary issues discussed include hackers, locking devices, passwords, file tampering, costs, and software.

Computer security was first formally addressed by the Department of Defense in 1973 (Schwalls, 1989, p. 122). Increased utilization and dependence upon the computer by business, schools (DeLoughry, 1989, p. 1) and those organizations supporting the defense industry, place computer and database security at a premium. While they are easier to utilize than their predecessors, today's computers are also more vulnerable to unplanned interference. Clearly, a key element of good computer security is the detection and correction of these vulnerabilities (p. 1)). Vulnerabilities refer to any hardware, firmware, or software weakness or deficiency in design that leaves an information system open to internal (employee derived) or external tampering. Such tampering permits the alteration or compromise of information or the denial of this service. The best known of the computer vulnerabilities are viruses. The cost to industry and the taxpayer due to computer viruses, has been estimated at over $1 million (p. 1). Since viruses can cause the loss of programs, information, or system time, one can readily see that this estimate may fall far short of actuality. As computer technology becomes more and more available to a greater spectrum of users, the need for security becomes increasingly more critical (Raskin, 1987, pp. 35-39). Data resident today on desktop computers have become so valuable that security measures and control procedures are no longer limited to the large mainframe type of computers (Ainsworth, 1987, p. 1).

The biggest computer security threat to business in the employee. The consensus in the computer industry is that 80% of computer security breaches are internally generated. These breac...

Page 1 of 9 Next >

More on Computer and Database Security...

Loading...
APA     MLA     Chicago
Computer and Database Security. (1969, December 31). In LotsofEssays.com. Retrieved 11:36, March 29, 2024, from https://www.lotsofessays.com/viewpaper/1681953.html