.

Sunday, May 12, 2019

Digital Security Essay Example | Topics and Well Written Essays - 2000 words

Digital gage - Essay ExampleDigital certification department devices let in secure personal devices such as SIM cards, smart-card based USB tokens, e-passports, secure chips in contactless payment cards, and they give an psyche the freedom to shop, communicate, travel, work and bank using his or her digital identity in a means that is enjoyable, convenient and secure. Therefore, digital security is of utmost important since a lot of information is available on the various digital platforms. Some is personal or esoteric information and some is extremely irritable information. Therefore, any person or firm needs to put in place security measures that look into that the security of systems is not breached. This paper examines ready reckoner security principles, cryptology and its associated applications and secure software engineering. reckoner security Principles There are many methods and approaches that are used to secure computer systems. However, specific intrinsic expec tations go to be met regardless of whether the system is large or small, or is owned by a private nerve of by a government. Therefore, there exists generally accepted system security. These principles usually address computer security from an extremely high-level point, and are to be applied when developing computer security insurance and programs, and in the creation of new systems, policies and practices (Guttman & Swanson, 1996). Thus, practices encompass broad areas such as accountability, integration and cost-effectiveness. Principles differ from practices in the sense that the latter guides organizations on the types of objectives, procedures and controls that constitute an effective computer security program. Principle 1 Computer Security Supports the Organizations Mission The aim of computer security is to protect the valuable resources of an organization. These implicate software, hardware and information. By selecting and applying adequate safeguards, computer security supports a firms delegating by protecting its financial and physical resources, legal position, reputation, employees and other intangible and tangible assets (NIST, 1995). Sometimes security sens be viewed as a nuisance due to the rules and procedures that are imposed on systems, users and managers. However, well-chosen security procedures and rules are there to protect significant assets as well as support the overall mission of the firm. As such, security should be viewed as a means to an end, and not an end in itself. reside an example of a private business. Usually, making profit is primary while good security is secondary. Therefore, security should be able to support this primary goal of making profit. Principle 2 Computer Security is an Integral Element of Sound Management Information and computer systems are crucial assets that support an organizations mission. Protecting these systems is as important as the protection of other organizational resources such as employees, physical assets and money. It should be observed that the inclusion of security considerations in managing computers and information does not totally eradicate the possibility that the assets might be harmed. According to Hayden & Feringa (2004), this is why the managers of an organization have to decide the level of stake that they are ready to accept, taking into the account the costs associated with security controls. When a firm

No comments:

Post a Comment