Key Underlying Computer Information Security Theories

Read Complete Research Material



Key Underlying Computer Information Security Theories

Key Underlying Computer Information Security Theories

Introduction

People care a lot about the security of their personal information. When it comes to computer security, any data on a computer or a network is vulnerable to theft. Privacy issues have existed since several years but as technology continues to change drastically, the threats have increased considerably. This change in the threats has led to a change in the way they are managed (Cooper & Schindler, 2003).

The theories developed in the initial years of computing have undergone major changes just like the way technology has been changing. The speed of change in technology is such that new gadgets and devices are being designed on a daily basis. Artificial Intelligence has also undergone a massive change due to which it has become easier for someone to hack others information.

The biggest threat however is not posed to individuals instead it is posed by major organizations. The data of major organizations is very confidential and any leakage can result in a compromise on their competitive advantage due to this, the theories of computer security have to be continuously adjusted so that every term is clearly defined.

Discussion

Theory of Computer Security

The threats posed to computer security can easily be countered by proper access control. This ensures that no outsider can access information that could lead to major problems. This gives the user only a minor access while all other access is only given to a certain group of people who can be trusted. In some cases it is only when multiple people are present that the information can be viewed. This ensures that no one will steal information without the knowledge of others. The advantage of such security is that confidential information remains confidential. However, even the with the strongest security in place, data can still be compromised. Therefore, people question the level of security that can be attained in computer systems. The answer is that although organizations are trying their best to provide the safest computing environment, intruders are always trying their best to ensure that none of the security measures are successfully implemented (Gollmann, 2010).

As it has been observed, the threats that are open to the security of computers can be encountered by giving proper control access over the information systems of a computer in order to make sake that focused and authorized users are allowed access over the computers. What is demanded ...