Paper Details  
 
   

Has Bibliography
4 Pages
920 Words

 
   
   
    Filter Topics  
 
     
   
 

COMPUTER SECURITY ISSUES

00% percent protection it will help prevent the majority of known virus. An important note to this point, is the importance of getting regular virus updates from the software manufacturer. With the introduction of the IT facilities, the amount of room information takes up is drastically reduced from a whole filing cabinet to a small hard drive. Information can be easily copied and since the advent of the Internet, information does not even have to be on a psychical media to leave the building. This therefore makes it much more easier to copy and take out valuable information. All the companys details, their accounts and their customers accounts are prone to the risk. A single person can take out all the information on a zip disk or even a floppy disk depending on the size of the file. This poses the risk of company espionage and financial fraud, through the use of customers credit card details. There are a number of ways to help deal with this problem. 1.The system should be a closed network. This means, that only people authorised to access the information may only do so through a user name and password. In this system there should be a hierarchy of privileges, so only people who need to access the most sensitive information may do so. 2.Also by having a login system, people using the system can be identified, helping solve and deter employee fraud. An important point to note is that the employee responsible for managing IT should be aware of sleeper programmes that may lie inside the system, and should be checked on a regular basis. 3.Another step to take care of this problem is to use encryption, when storing data and with todays encryption standards it would be near impossible to break the code. One must note that there would be little point in using this technique if the keys and passwords were not properly managed. Good quality encryption software is available. A very important security aspect is in systems failure, data corrupti...

< Prev Page 2 of 4 Next >

    More on COMPUTER SECURITY ISSUES...

    Loading...
 
Copyright © 1999 - 2025 CollegeTermPapers.com. All Rights Reserved. DMCA