Purchase Solution

Review of Articles on Elements of Computer Security

Not what you're looking for?

Ask Custom Question

Research and apply the content from a minimum of three recent articles about elements of computer security.

Purchase this Solution

Solution Summary

This solution reviews three recent articles on elements of computer security. This paper examines the key elements of the computer security. This paper also explores the findings of three articles dealing with computer security. The first article explores the basic elements of computer security and how organizations can address these elements of computer security. The second article examines how organizations can address all these elements of computer security into a comprehensive security solution. The third article examines the issues related to managerial decision making in the context of computer and information security. 1046 words with references.

Solution Preview

Abstract

Computer Security is an issue of strategic importance for all organizations, taking into account the fact that information systems have become an integral part of strategic planning for all major companies. Organizations need to take into account the key elements of computer security while planning their information systems strategy. This paper examines the key elements of the computer security. This paper also explores the findings of three articles dealing with computer security (Coffee, 2007; Johnston & Hale, 2007; Katz, 2000). The first article explores the basic elements of computer security and how organizations can address these elements of computer security (Coffee, 2007). The second article examines how organizations can address all these elements of computer security into a comprehensive security solution (Katz, 2000). The third article examines the issues related to managerial decision making in the context of computer and information security (Johnston & Hale, 2007).

Elements of Computer Security

Computer security refers to the protection given to automated information systems in order to protect their integrity, availability and confidentiality (Stallings et al., 2008). Computer security involves security of all the information system resources including hardware, software, firmware and telecommunications.

According to Katz (2000), the key elements of computer security include physical security, authentication, access control, encryption and management of resources. Physical security includes secure environment for storage of all the digital resource both hardware as well as software. Authentication is the assurance that the communicating entity is the one it claims to be (Stallings et al., 2008). There are ...

Purchase this Solution


Free BrainMass Quizzes
Understanding Management

This quiz will help you understand the dimensions of employee diversity as well as how to manage a culturally diverse workforce.

Marketing Research and Forecasting

The following quiz will assess your ability to identify steps in the marketing research process. Understanding this information will provide fundamental knowledge related to marketing research.

Introduction to Finance

This quiz test introductory finance topics.

Organizational Behavior (OB)

The organizational behavior (OB) quiz will help you better understand organizational behavior through the lens of managers including workforce diversity.

Six Sigma for Process Improvement

A high level understanding of Six Sigma and what it is all about. This just gives you a glimpse of Six Sigma which entails more in-depth knowledge of processes and techniques.