scroll to top
Stuck on your essay?
Get ideas from this essay and see how your work stacks up
Word Count: 2,003
As governments organizations and individuals increasingly rely on desktop and laptop computers other connected devices handheld smart phone Blackberry etc and the Internet they lose control of the information processing that was present in the traditional data center As the control of computing information moves to the personal computer and remote sites via networking it is essential that managers understand the threats to this information and create security plans that will meet this new challenge Computer security controls work with a different set of variables than those used for mainframes and LANs For example control over program changes data security system documentation backup recovery plans and system testing are inherent in most mainframe LAN environments However desktops laptop and handheld computer systems seldom have this protection One of the most critical security issues one that has been compounded by the wireless portability and LANWAN revolutions is a lack of awareness by executives and users to the vulnerability of their critical and sensitive information Other threats include computer and component theft vandalism and sabotage Computers have unique security problems that must be understood for effective implementation of security measures These problems include Data Communications Networking Software Hardware Physical Security and Accessibility and Disaster Recovery Data Communications is an area where there is a critical and continuing need for security countermeasures and controls Our increasingly reliance on e-mail the Internet and mobile devices has open numerous opportunities for cyber criminals It is astonishing to think that in todays competitive environment corporate America exposes it self by sending sensitive information through e-mail on the Internet Everything from price lists strategic plans budgets customer lists mergers and proposals Banks financial institutions and the US Government have been using encryption technology for years but not until recently has the technology been available to everyone Intellectual property being the creator of wealth in the 21st century it is imperative for companies to protect themselves from threats of misuse abuse or theft
@Kibin is a lifesaver for my essay right now!!
- Sandra Slivka, student @ UC Berkeley
Wow, this is the best essay help I've ever received!
- Camvu Pham, student @ U of M
If I'd known about @Kibin in college, I would have gotten much more sleep
- Jen Soust, alumni @ UCLA