Premium Essay

Computersecurity

In: Computers and Technology

Submitted By AngelMat
Words 905
Pages 4
As we look at the field of Information Technology and its security, we have to consider the need and necessity to keep the information that should be secure safe. In keeping this information safe, we have to look at many of the characteristics that it will take to keep that information safe. The characteristics that this personal data must have to be considered safe from those who are not privy to the information are called the Expanded CIA Triangle.
When using computers, especially over the internet, keeping information safe and confidential will always be one of the toughest obstacles. Ensuring that you are using the Expanded CIA Triangle characteristics will increase that security but not prevent it from being compromised.
As we all know, the CIA Triangle or Triad is based upon three principles. Those security principles are Confidentiality, Integrity and Availability. Despite these principles, it was necessary for an expansion of the triad because of the ever changing and developing minds of those who make attempts at information that should be kept confidential. Therefore the need for the Expanded CIA Triangle was necessary. Those principles being: Confidentiality, Integrity, Availability, Accuracy, Authenticity, Utility and Possession.
I am the supervisor of training and development at a lodge and resort in the city of Frankenmuth, Michigan. I have access to company data that an hourly employee does not. I have a right to access this information while other staff members do not. This is the confidentiality part of my company’s triag. We have in place security measures where privileges and classifications of staff are in place. Our security policies will not allow certain employees to access information and data that is sensitive to the operation of our training and the development of our company.
When an email is sent to a group of staff members, that email…...

Similar Documents

Premium Essay

This Paper Provides an Overview of the Growing Cybercrime Problem and Reviews Two Criminological Theories That Have Been Applied to the Study of Cybercrime and Cybercrime Victimization. Legislation Which Defines

...the object, which they called inertia, affects target suitability (Cohen & Felson, 1979). The smaller and lighter an object is, the easier it is to steal. In conclusion, routine activity theory identifies characteristics of objects and people that make these objects and people suitable targets, namely their value, their physical visibility, the access an offender has to them, and the size and weight of the target. Researchers have begun to expand routine activity theory to the study of cybercrime victimization. In one study of college students, researchers examined the applicability of applying routine activity theory to the study cybercrime and found that students that disregard their participation in online activities and do not use computersecurity software are more likely to be victimized (Choi, 2008). People who overlook the riskiness of their behavior are unlikely to protect themselves by curbing their behavior or using protective guardians and thus are more likely to be victimized. Another study testing the applicability of routine activity theory to the study cybercrime found that the number of hours a student spent on online communication sites, such as chat-rooms, and his or her engagement in computer crime impacted the student‟s risk of cyber Cybercrime 35 victimization (Holt & Bossler, 2008). People whose regular activities place them in situations where they have the possibility of interacting with offenders are at an increased risk of being victimized.......

Words: 13816 - Pages: 56

Free Essay

Operating System

...Volume4,Number3(1972) ,pages179-196. [Holub2000]A.Holub,TamingJavaThreads,Apress(2000) . [Hongetal.1989]J.Hong,X.Tan,andD.Towsley,"APerformanceAnalysis ofMinimumLaxityandEarliestDeadlineSchedulinginaReal-TimeSystem", IEEETransactionsonComputers,Volume38,Number12(1989) ,pages1736-1744. [Howar detal.1988]J.H.Howard,M.L.Kazar,S.G.Menees,D.A.Nichols, M.Satyanarayanan,andR.N.Sidebotham,"ScaleandPerformanceina DistributedFileSystem",ACMTransactionsonComputerSystems,Volume6, Number1(1988) ,pages55-81. [Howart hetal.1961]D.J.Howarth,R.B.Payne,andF.H.Sumner,'Th e ManchesterUniversityAtlasOperatingSystem,PartII:User'sDescription", ComputerJournal,Volume4,Number3(1961) ,pages226-229. [Hsiaoetal.1979]D.K .Hsiao,D.S.Kerr,andS.E.Madnick,ComputerSecurity, AcademicPress(1979) . [H uandPerrig2004]Y.-C.HuandA.Perrig,"SPV :ASecurePathVector RoutingSchemefo rSecuringBGP",ProceedingsofACMSIGCOMM Conference Bibliography86 7 onDataCommunication(2004).? [Huetal.2002]Y.-C.Hu,A.Perrig,andD.Johnson,"Ariadne:ASecureOn-DemandRoutingProtocolforAdHocNetworks",ProceedingsoftheAnnual InternationalConferenceonMobileComputingandNetworking(2002). [Hyman1985]D.Hyman,The ColumbusChicken Statuteand MoreBonehead Legislation,S.GreenePress(1985). [Iacobucci1988]E.Iacobucci,OS/2Programmer's......

Words: 5897 - Pages: 24

Premium Essay

Looko

... libraries, and similar institutions; also, sites whose purpose is the display of artworks Sites assisting users in establishing interpersonal relationships, friendship, excluding those of exclusively gay, or lesbian or bisexual interest and Matrimonial Sites providing photos and details of individuals seeking life partners Sites whose primary purpose is providing freeware and shareware downloads of application, software, tools, screensavers, wallpapers, and drivers Advertisements AlcoholandTobacco Non Working Non Working ALLWebTraffic Applets ArtsAndHistory Neutral Non Working Non Working Astrology BusinessAndEconomy Non Working Neutral Chat CommercialBanks Non Working Neutral Communication Neutral ComputerSecurity Cookies Cricket Neutral Non Working Non Working CrimeAndSuicide UnHealthy CulturalInstitutions Neutral DatingAndMatrimonials Non Working DownloadFreewareAndSh areware UnHealthy 243 Cyberoam User Guide Drugs EducationalInstitions UnHealthy Productive Sites providing information about the cultivation, preparation, or use of prohibited drugs Sites sponsored by schools, colleges, institutes, online education and other educational facilities, by non-academic research institutions or that relate to educational events and activities Sites offering books, reference-shelf content such as atlases, dictionaries, encyclopedias, formularies, white and yellow pages, and public statistical data Sites providing......

Words: 48399 - Pages: 194

Premium Essay

The Trends

...the Dalai Lama. • U.S. security officials reported discovery of illicit software buried in computers that control the nation’s electrical grid. The routines, which authorities said must have been installed by one or more foreign governments, would have allowed hackers to shut down the power system in time of emergency. • Cyber-gangs in eastern Europe have been attacking small and midsized companies in the United States, transferring funds from out of the target accounts. Victims who have come forward include an electronics testing firm in Baton Rouge, Louisiana, that was robbed of nearly $100,000; a Pittsburgh-area school district that lost $700,000; and a Texas company that was defrauded of $1.2 million. • In 2007, government computersecurity specialists discovered that someone had broken into networks operated by the departments of Defense, State, and Commerce, and probably NASA and the Department of Energy — “all the high-tech agencies, all the military agencies,” as Jim Lewis, director of the Center for Strategic and International Studies, put it. The intruders downloaded a mass of sensitive information roughly equivalent to the contents of the Library of Congress. • Several major power outages in Brazil — in 2005, 2007, and 2009 — have been blamed on computer hackers who sabotaged the electric company’s control systems. • In November 2009, cybersecurity officials from the U.S. Strategic Command reported that the number of malicious attempts to break into Defense......

Words: 12752 - Pages: 52

Premium Essay

Negative Effects of Social Networking

...Should Consider Employing A Social Media Specialist To Coordinate Campaigns. Retrieved on February 4, 2012 from http://socialmediatoday.com/keredy-stott/234013/businesses-should-consider-employing-social-media-specialist-coordinate-campaign Andrew, Colin. (2012). The Real-World Effects of Online Gaming: Socially Inept. Retrieved on February 27, 2012 from http://voices.yahoo.com/the-realworld-effects-online-gaming-3255207.html?cat=41 Ludden, Jennifer. (2010). Can social media break up a marriage? Retrieved on February 27, 2012 from http://www.npr.org/templates/story/story.php?storyId=130897679 Acohido, Byron. (2010). How Cybercriminals Invade Social Networks, Companies. Retrieved from http://www.usatoday.com/tech/news/computersecurity/2010-03-04-1Anetsecurity04_CV_N.htm Hinduja, Sameer & Patchin, Justin W. (2011). Cyberbullying Research Summary. Retrieved on February 24, 2012 from http://www.cyberbullying.us/cyberbullying_sexual_orientation_fact_sheet.pdf...

Words: 2864 - Pages: 12

Premium Essay

Cyber Crime

... which they called inertia, affects target suitability (Cohen & Felson, 1979). The smaller and lighter an object is, the easier it is to steal. In conclusion, routine activity theory identifies characteristics of objects and people that make these objects and people suitable targets, namely their value, their physical visibility, the access an offender has to them, and the size and weight of the target. Researchers have begun to expand routine activity theory to the study of cybercrime victimization. In one study of college students, researchers examined the applicability of applying routine activity theory to the study cybercrime and found that students that disregard their participation in online activities and do not use computersecurity software are more likely to be victimized (Choi, 2008). People who overlook the riskiness of their behavior are unlikely to protect themselves by curbing their behavior or using protective guardians and thus are more likely to be victimized. Another study testing the applicability of routine activity theory to the study cybercrime found that the number of hours a student spent on online communication sites, such as chat-rooms, and his or her engagement in computer crime impacted the student‟s risk of cyber Cybercrime 35 victimization (Holt & Bossler, 2008). People whose regular activities place them in situations where they have the possibility of interacting with offenders are at an increased risk of being......

Words: 13816 - Pages: 56

Free Essay

Internet Technology

...computersecurity Multiple Choice Identify the letter of the choice that best completes the statement or answers the question. ____ 1. The term _____ refers to online or Internet-based illegal acts. |a. |malicious-logic program |c. |cybercrime | |b. |computer crime |d. |system failure | ____ 2. A _____ is a program that copies itself repeatedly in memory or on a network, using up resources and possibly shutting down the computer or network. |a. |computer virus |c. |Trojan horse | |b. |worm |d. |all of the above | ____ 3. A _____ is a malicious-logic program that hides within or looks like a legitimate program and usually is triggered by a certain condition or action. |a. |computer virus |c. |Trojan horse | |b. |worm |d. |all of the above | ____ 4. The _____ is the destructive event or prank a malicious-logic program is intended to deliver. |a. |zombie |c. |cracker ...

Words: 331 - Pages: 2