Analysis Of Issues In Computer Arrangement Security

Read Complete Research Material



Analysis of Issues in Computer Arrangement Security

By

Acknowledgement

I would take this opportunity to thank my research supervisor, family and friends for their support and guidance without which this research would not have been possible.

DECLARATION

I [type your full first names and surname here], declare that the contents of this dissertation/thesis represent my own unaided work, and that the dissertation/thesis has not previously been submitted for academic examination towards any qualification. Furthermore, it represents my own opinions and not necessarily those of the University.

Signed __________________ Date _________________

Abstract

Computer networks are propagate rapidly for a number of reasons, where one is technology innovation. During this boom has placed relatively little attention to computer network security. This paper describes the problems caused by network security and computer query and provides an overview of methods and technologies available today to increase computer network security. Current methods are discussed, such as information security strategy, computer security and its relation to network security, data communications security and data encryption.

There was very little detailed research security threats and incidents, and last but not least, the UK IT industry strategy uses to combat them. In addressing the shortage, the study used qualitative case study methodology, involving various organizations throughout the UK. Approach, using in-depth interviews, contributed to a thorough examination of the information security risks (risks and incidents) and the inclusion of evaluation and analysis of management (CMS) to address identified risks.

Table of Contents

CHAPTER 1: INTRODUCTION7

1.1 Outline of the Study7

1.2 Background of the research7

1.3 Problem Statement9

1.4 Aims and Objectives9

1.5 Significance10

1.6 Research Question11

CHAPTER 2: LITERATURE REVIEW13

2.1 Context13

2.2 Survey of Current Methods13

2.3 Information Security Model14

2.4 Public Key Crypto systems16

2.5 Physical Security17

2.6 Personnel Security18

2.7 Administrative Security18

2.8 Computer Security19

2.8.1 Hardware Security Devices19

2.8.2 Software Security20

2.8.3 Data Communications Security22

2.8.4 Message Stream Modification24

CHAPTER # 3: METHODOLOGY34

3.1 Research design35

3.1.1 Research purpose35

3.1.2 Research strategy36

3.2 Case study design39

3.2.1 Unit of analysis40

3.2.3 Number of interviewees41

3.2.4 Case Selection42

3.2.4.1 Similar outcomes for predictable reasons44

3.2.4.2 Rich information44

3.2.4.3 Different characteristics45

3.2.4.4 Researcher familiarity with organisations45

3.2.4.5 Scope change46

3.2.5 Time Frame46

3.2.6 Data assemblage techniques47

3.2.6.1 In-depth interviews48

3.2.6.2 In-depth interview equipment design49

3.2.6.3 Structured in writing questionnaire52

3.2.6.4 Structured in writing questionnaire design52

3.2.6.5 Demographics53

3.3.2 Conducting interviews55

CHAPTER 4: RESULTS57

4.1 Background Information on case studies57

4. 2 Overview of within-case investigation method60

4.3. Case A - Small wholesale nourishment business63

4.3.1 Risks64

4.3.1.1 Threats67

4.3.1.2 Incidents68

4.3.1.3 The enterprise as a target69

4.3.2 Management70

4.3.2.1 Countermeasures70

4.3.2.2 Level of security expenditure72

4.3.3 Differentiators72

4.3.4 Case A - Security evaluation framework73

4.4 Summary and recommendations74

4.5 Case B - Commonwealth Government agency75

4.5.1 Reliance on IT76

4.5.2 The enterprise as a target86

4.4.2 Management87

4.4.2.1 Countermeasures87

4.4.2.2 Level of security expenditure90

4.4.3 Differentiators91

4.4.4 Security Framework93

4.4.5 Summary and recommendations93

CHAPTER 5 - CONCLUSIONS AND IMPLICATIONS95

5.1 Conclusions about IT reliance97

5.2 Implications100

REFERENCES105

APPENDIX116

CHAPTER 1: INTRODUCTION

1.1 Outline of the Study

The outline for this study is to identify the different issues concerning to computer security and its related issues.

1.2 Background of the research

Computer networks are reproduce rapidly for a number of reasons, where one is technology innovation. During this boom has placed relatively little attention to computer network security. This paper describes the problems caused by network security and computer questions and provides an overview of methods and technologies available today to increase ...
Related Ads