Explore BrainMass


Photo credit: Perspecsys Photos

In a word full of sensitive emails and digital banking information, good computer security is of paramount importance. The term 'computer security' is generally used as a blanket term for several subsections of digital security legal practices like internet law and computer forensics, network security concerns like authentication, security interests to do with secrecy like data encryption and cryptography and also the more business-orientated aspects of security like information risk management and information systems. Governments may also the term to include things that computers are used to protect against or give warning of, such as earthquakes and tsunamis.

It is obvious now that security architecture is an important field of study. It requires the architect to be constantly on their toes, effectively thinking of ways to outsmart everyone in the world with access and malicious intent as well as guarding the system from honest yet destructive mistakes (the latter of which are resoundingly more common). One must think like an experienced software designer and a completely new user at the same time. This is especially important in operating system design as every home computer, used by technophobes and those with computer science PHDs alike uses one. Technology from the 1980s led to some of the most impenetrable OS builds ever, yet the changes in system management they required were not widely understood and so these marvels of security only enjoy specific, limited use today. Security architecture has hardware aspects too, as one must position controls that promote confidentiality, integrity, assurance and accountability while still remaining available for widespread use. 

One must understand that different situations require different degrees of security as well. In an ideal world, everything would be locked with cutting-edge security like that used in multinational corporations and military operations, yet in reality, one must always balance the benefits with the cost.

Categories within Security

Computer Forensics

Postings: 0

Computer forensics is a branch of digital forensic science pertaining to legal evidence found in computers.

Information Risk Management

Postings: 3

Information risk management is an information system that assists in consolidating property values, claims, policy, and exposure information and provide the tracking and management reporting capabilities.

Network Security

Postings: 12

Network Security is the provision and policies of network administration to prevent unauthorized access.


Postings: 1

Authentication is the act of confirming the truth of an attribute of an entity.

Data Encryption

Postings: 8

Data Encryption Standard is a previously predominant algorithm for the encryption of electronic data.

Information Systems

Postings: 37

Information systems is the study of complementary networks of hardware and software.


Postings: 4

The science and art of creating and breaking codes, now almost exclusively computerized

Cyber security, offense vs. defense

Defense cyber strategy: We can and will hit back, by Amber Corrin, C4&ISR Networks, Jul 1 2015 Cybersecurity: The Best Defense is a Good Offense, by Taylor Schlacter, May 8, 2015

Economic Considerations of Information Security and Management

What are the economic considerations of information security and its management? Furthermore, it should also answer/discuss the following questions in the reference paper: Discuss the following issues, and support with arguments and evidence: •What are the major economic considerations in information security and manage

Public Key Cryptography

*I need 1 page of reference material or information that explains what public key cryptography is and discusses the associated pros and cons. *I need 1 page of reference material or information that discusses the pros and cons of solving security via technology. *I need 1 page of reference material or information that d

Paypal Use Example Problems

When you consider security concerns and limited resources, do you think public sector entities should consider utilizing PayPal to facilitate inexpensive and efficient means of electronic payments? Why or why not? List three examples of mobile technology that have increased opportunities for public sector stakeholders. How ha

Future of IT Professionals

Where will the computing profession be in 10 years, 25 years, 50 years? Will it be different than it is today? In what ways? Which jobs are likely to change?

Acceptable Use Policy

What should be considered in an Acceptable Use Policy? What should be allowed as acceptable behavior when using corporate information resources?

Business Value of Enterprise Systems

Discuss the business value of enterprise systems. How can they be used to make the management of the supply chain more effective? (500-750 words with references)

Global IS Management

What are some of the global IS management challenges that face IS leaders today?

Pivot Table Record In Excel

Create a pivot table, an active surveillance, in Excel to identify adverse events related to flu vaccine. I need to come up with a background information, indicate the goals of the surveillance and data management then decide what information you need to have in order to do the surveillance then create a worksheet using a Pivot

Investing in microwave towers

In an effort to save costs, some companies with multiple buildings have invested in microwave towers to transmit data among the various locations. Is this truly cost effective?

Issues in Data Mining

In your opinion, what are the two most important issues in data mining? Why do you think these two are the most important?

Computer Science

1.) Discuss any of the internetworking equipment that you have experience with and the advantages and disadvantages of them. 2.) Discuss the impact of Global Intellectual Property Law upon the Telecommunication industry and upon businesses. Does it have a positive impact or none at all?

Data communications

The earliest LANs used coaxial cable as a transmission medium. Over time, unshielded twisted pair (UTP) wiring emerged as a better and faster medium. Wireless (RF) LANs are emerging as cheaper and faster alternatives to UTP. What concerns might be faced with a decision regarding upgrading a LAN from UTP to RF? What would guide t

Critiquing a case (Self Analysis of a Computer Forensics Case)

After a computer forensics investigation, you need to meet with your department or group of fellow investigators and critique the case in an effort to improve your work. Describe how to make a self-evaluation of your work by answering the following questions and write a report: 1. How could you improve your performance in t

Project Code, Project Name, Completion Date Access

Please answer the following questions below. Phil has been asked to create a database for his company. The database is to track employees and the projects on which the employees work. A project can have between 3 and 7 employees assigned to it. He has determined that he needs the following tables: Employee (Social Securit

Communicating News to Project Stakeholders

The general approach is to encourage timely communication of news (positive or negative) to project stakeholders. However, can you envisage situations where it may be necessary, or even advantageous, for project management to suppress the dissemination of negative/bad news relating to the project?

RBS top-down approach for project risk categorization

'Risk Breakdown Structures' (RBS) utilize a top-down approach for identifying and categorizing project risks, and this is generally viewed as a sound technique. Can you think of situations where the RBS approach would be non-ideal or inefficient?

project priorities and scheduling issues

What general recommendations would you provide for helping to promote common understanding of project priorities and critical scheduling issues, amongst project team members and stakeholders, particularly external collaborators?

Escalating decisions on project changes to project sponsors

It has been suggested in some quarters that for large projects, decisions on any changes that materially affect project milestones or deadlines should always be escalated to project sponsors for consideration. Do you agree with the suggestion, or do you feel that this is taking things a little too far?

Schedule Issues

Why do you think schedule issues often cause the most conflicts on projects? Please include references.

Guarding against inflated time estimates

It is often suggested that time estimates for I.T. project work elements should be generated primarily by those involved in carrying out the work (e.g. analysts and programmers). If this advice is heeded, how would the Project Manager guard against the natural tendency to inflate completion times?

Poorly defined requirement and scope

What would you do if you were appointed project manager for an already running project, which was performing badly because the requirements and scope had been poorly defined at the outset?

Technical versus Soft Skills for Project Managers

Assuming that there is some consensus with the basic premise that most skills can be learnt, which would you expect to be the more productive task, if re-skilling Project Managers - 1) Teaching people management, team building and linking skills to a Project Manager with very good technical knowledge of the project field O