Premium Essay

Computersecurity

In:

Submitted By AngelMat
Words 905
Pages 4
As we look at the field of Information Technology and its security, we have to consider the need and necessity to keep the information that should be secure safe. In keeping this information safe, we have to look at many of the characteristics that it will take to keep that information safe. The characteristics that this personal data must have to be considered safe from those who are not privy to the information are called the Expanded CIA Triangle.
When using computers, especially over the internet, keeping information safe and confidential will always be one of the toughest obstacles. Ensuring that you are using the Expanded CIA Triangle characteristics will increase that security but not prevent it from being compromised.
As we all know, the CIA Triangle or Triad is based upon three principles. Those security principles are Confidentiality, Integrity and Availability. Despite these principles, it was necessary for an expansion of the triad because of the ever changing and developing minds of those who make attempts at information that should be kept confidential. Therefore the need for the Expanded CIA Triangle was necessary. Those principles being: Confidentiality, Integrity, Availability, Accuracy, Authenticity, Utility and Possession.
I am the supervisor of training and development at a lodge and resort in the city of Frankenmuth, Michigan. I have access to company data that an hourly employee does not. I have a right to access this information while other staff members do not. This is the confidentiality part of my company’s triag. We have in place security measures where privileges and classifications of staff are in place. Our security policies will not allow certain employees to access information and data that is sensitive to the operation of our training and the development of our company.
When an email is sent to a group of staff members, that email

Similar Documents

Free Essay

Internet Technology

...computersecurity Multiple Choice Identify the letter of the choice that best completes the statement or answers the question. ____ 1. The term _____ refers to online or Internet-based illegal acts. |a. |malicious-logic program |c. |cybercrime | |b. |computer crime |d. |system failure | ____ 2. A _____ is a program that copies itself repeatedly in memory or on a network, using up resources and possibly shutting down the computer or network. |a. |computer virus |c. |Trojan horse | |b. |worm |d. |all of the above | ____ 3. A _____ is a malicious-logic program that hides within or looks like a legitimate program and usually is triggered by a certain condition or action. |a. |computer virus |c. |Trojan horse | |b. |worm |d. |all of the above | ____ 4. The _____ is the destructive event or prank a malicious-logic program is intended to deliver. |a. |zombie |c. |cracker ...

Words: 331 - Pages: 2

Premium Essay

Negative Effects of Social Networking

...Negative Effects of Social Networking Shelly Miner Western Governors University WGU Student #000246417 Negative Effects of Social Networking Social Networking or Social Media Websites (Social Networking) allow users to quickly share information and create online connections with other users. Despite the benefits, social networking can negatively effect us socially and can lead to undeveloped social skills and social alienation. Our intimate relationships can be negatively effected because social networking users can quickly find and communicate discreetly with others which can potentially lead to infidelity. Information posted on social networking sites can also have negative effects on current or potential employment opportunities. Social networks are intended to share information with everyone; this lack of protection can increase security risks such as identity theft, cyberbullying and computer viruses. Although each of these social networking sites offers attractive incentives and overwhelming popularity, research indicates that social networking can actually be detrimental because it has negative effects on social skills, relationships, employment, and security. Since their creation, social networking are rapidly changing the way we communicate, discover and share information and has become a crucial part of not only our personal lives but our professional lives. Social networking can be seen almost everywhere we go from retail stores...

Words: 2864 - Pages: 12

Free Essay

Operating System

...[Abbot1984]C.Abbot,"InterventionSchedulesfo rReal-TimeProgramming", IEEETransactionsonSoftwareEngineering,VolumeSE-10,Number3(1984),pages 268-274. [Accett aetal.1986 ]M.Accetta,R.Baron,W.Bolosky,D.B.Golub,R.Rashid, A.Tevanian,andM.Young,"Mach:ANewKernelFoundationfo rUnix Development",ProceedingsoftheSummerUSENIXConference(1986),pages 93-112. [Agrawa landAbbadi1991]D.P.AgrawalandA.E.Abbadi,"AnEfficientand Fault-TolerantSolutionofDistributedMutualExclusion",ACM Transactionson ComputerSystems,Volume9,Number1(1991) ,pages1-20 . [Agr e2003]P.E.Agre,"P2PandthePromiseofInternetEquality",Communica-tionsoftheACM,Volume46,Number2(2003) ,pages39-42. [Ahituvetal.1987 ]N.Ahituv,Y.Lapid,andS.Neumann,"Processing EncryptedData",CommunicationsoftheACM,Volume30,Number9(1987) , pages777-780. [Ahmed2000 ]I.Ahmed,"ClusterComputing:AGlanceatRecentEvents",IEEE Concurrency,Volume8,Number1(2000) . [Ak l1983]S.G.Akl,"DigitalSignatures:ATutorialSurvey",Computer,Volume 16 ,Number2(1983) ,pages15-24. [AkyurekandSalem1993]S.AkyurekandK.Salem,"AdaptiveBlockRear-rangement" ,ProceedingsoftheInternationalConferenceonDataEngineering(1993), pages182-189. [Al t1993]H.Alt,"RemovableMediainSolaris",ProceedingsoftheWinter USENIXConference(1993) ,pages281-287. [Anderson1990 ]T.E.Anderson,"ThePerformanceofSpinLockAlternatives fo rShared-MoneyMultiprocessors",IEEETrans.ParallelDistrib.Syst.,Volume 1,Number1(1990) ,pages6-16. [Andersonetal.1989 ]T.E.Anderson,E.D.Lazowska,andH.M.Levy,"The Perfo...

Words: 5897 - Pages: 24

Premium Essay

The Trends

...Trends Shaping Tomorrow’s World By Marvin J. Cetron and Owen Davies Forces in the Natural and Institutional Environments Introduction For nearly half a century, Forecasting International has been tracking the forces that shape our future. Some 20 years ago, we codified our observations into a list of trends that forms the basis for much of our work. For each of our projects, we compare the specific circumstances of an industry or organization with these general trends and project their interactions. This often allows us to form a remarkably detailed picture of what lies ahead. This is Part Two of FI’s periodic trend report. It covers trends in energy, the environment, technology, management and institutions, and terrorism. (Part One, published in the May-June 2010 issue of THE FUTURIST, tracked economic, population, societal, family, and work trends.) Because this forecast project is ongoing, the authors — and the World Future Society — welcome your feedback. 38 THE FUTURIST July-August 2010 © 2010 World Future Society • 7910 Woodmont Avenue, Suite 450, Bethesda, MD 20814, U.S.A. • All rights reserved. JULIEN GRONDIN / ISTOCKPHOTO Energy Trends 40% in 1999 to about 37% in 2020. n Despite efforts to develop alternative sources of energy, oil consumption is still rising rapidly. • The world used only 57 million barrels of oil per day in 1973, when the first major price shock hit. By 2008, it was using 86 million barrels daily...

Words: 12752 - Pages: 52

Premium Essay

Cyber Crime

...An Examination of Cybercrime and Cybercrime Research: Self-control and Routine Activity Theory Katherine M. Grzybowski Arizona State University 1 March 2012 Cybercrime 1 TABLE OF CONTENTS 1. ABSTRACT .....................................................................................................3 2. INTRODUCTION...........................................................................................4 3. A REVIEW OF CYBERCRIME ...................................................................6 3.1 Cybercrime Legislation ............................................................................7 3.1.1 Federal Laws .................................................................................7 3.1.2 State Laws ......................................................................................9 3.2 Cybercrime Law Enforcement Agencies ................................................11 3.3 Classifying Cybercrime ............................................................................16 3.4 National Levels of Cybercrime ................................................................19 3.4.1 Business Cyber Victimization ......................................................20 3.4.2 Individual Cyber Victimization ...................................................22 4. A REVIEW OF THEORIES..........................................................................26 4.1 Self-control Theory ....................................

Words: 13816 - Pages: 56

Premium Essay

This Paper Provides an Overview of the Growing Cybercrime Problem and Reviews Two Criminological Theories That Have Been Applied to the Study of Cybercrime and Cybercrime Victimization. Legislation Which Defines

...An Examination of Cybercrime and Cybercrime Research: Self-control and Routine Activity Theory Katherine M. Grzybowski Arizona State University 1 March 2012 Cybercrime 1 TABLE OF CONTENTS 1. ABSTRACT .....................................................................................................3 2. INTRODUCTION...........................................................................................4 3. A REVIEW OF CYBERCRIME ...................................................................6 3.1 Cybercrime Legislation ............................................................................7 3.1.1 3.1.2 Federal Laws .................................................................................7 State Laws ......................................................................................9 3.2 Cybercrime Law Enforcement Agencies ................................................11 3.3 Classifying Cybercrime ............................................................................16 3.4 National Levels of Cybercrime ................................................................19 3.4.1 3.4.2 Business Cyber Victimization ......................................................20 Individual Cyber Victimization ...................................................22 4. A REVIEW OF THEORIES..........................................................................26 4.1 Self-control Theory ...................................................................

Words: 13816 - Pages: 56

Premium Essay

Looko

...User Guide Version 9 Document version 9501-1.0-18/08/2007 Cyberoam User Guide IMPORTANT NOTICE Elitecore has supplied this Information believing it to be accurate and reliable at the time of printing, but is presented without warranty of any kind, expressed or implied. Users must take full responsibility for their application of any products. Elitecore assumes no responsibility for any errors that may appear in this document. Elitecore reserves the right, without notice to make changes in product design or specifications. Information is subject to change without notice. USER’S LICENSE The Appliance described in this document is furnished under the terms of Elitecore’s End User license agreement. Please read these terms and conditions carefully before using the Appliance. By using this Appliance, you agree to be bound by the terms and conditions of this license. If you do not agree with the terms of this license, promptly return the unused Appliance and manual (with proof of payment) to the place of purchase for a full refund. LIMITED WARRANTY Software: Elitecore warrants for a period of ninety (90) days from the date of shipment from Elitecore: (1) the media on which the Software is furnished will be free of defects in materials and workmanship under normal use; and (2) the Software substantially conforms to its published specifications except for the foregoing, the software is provided AS IS. This limited warranty extends only to the customer as the original...

Words: 48399 - Pages: 194