How can I earn money with StudyBay? Top writers
Order Assignment
This order has already been completed on Studybay
On Studybay you can order your academic assignment from one of our 45000 professional writers. Hire your writer directly, without overpaying for agencies and affiliates! Check price for your assignment
17 bids submitted. Essay Example.

The Computer Security and Internet Privacy

Today one of the most urgent problems in the field of information systems is the protection of information on the internet. Indeed, people can’t imagine their life without electronic global network. People make a variety of financial transactions on the internet, order goods, services, use credit cards, carry out payments, talk and write, and perform many other actions that require privacy and protection.

Information security is a state of information indicating that the system is operating normally, data is protected, its safety is ensured and there is integrity, confidentiality, and availability. The main components of information security involve the following:

  • If there is access to data only by those users who can log in, it is then confidential.
  • Reliability and completeness of information means integrity.
  • The concept of accessibility implies that there will be access to resources and related assets to authorized users, if the need arises.

These are the three principles of information security. In addition to them, there is a principle of authenticity, which means the authenticity of the subject and object of access must be ensured.

There are several sources that may pose a threat or unauthorized access to your data on the computer.

There are man-made source that include the actions of different subjects. They may be intentional or unintentional. They are divided into external and internal types. The first is the illegal invasion of a foreign person from the external general-purpose network. The second one involves an act from within, i.e., by an officer of the company, for example.

Everything that leads to a failure or refusal of work of the program or computer refers to man-made sources. Here you can blame software errors, obsolete device or system, and equipment failures (cable or disk system, a server, or workstation problems).

When you pass transfer some data using internet, then before it reaches its destination, it gas to go through many other servers and routers. There is no tracking control on its way. Therefore, anything can happen to this information. Data protection on the internet is one of the main problems of any large company or organization.

In order to ensure the necessary privacy, companies often seek help of experts in cryptography or encryption of information. When you create the encrypted data you use an algorithm or device that implements it. The changing code of key is managed by encryption. With its help you can extract information.

Today one of the most urgent problems in the field of information systems is the protection of information on the internet. Indeed, people can’t imagine their life without electronic global network.

Related Materials
Assignment ID
100002262
Discipline
Type
CREATED ON
October 19, 2016
COMPLETED ON
October 20, 2016
Price
$20
This order has already been completed on Studybay
On Studybay you can order your academic assignment from one of our 45000 professional writers. Hire your writer directly, without overpaying for agencies and affiliates!
Check price for your Essay
Essay Example Comments
pavangongidi23
November 13, 2016
pavangongidi23
excellent work...thank you
nichol2594
November 6, 2016
nichol2594
Like always she is the absolute best. I will return!
lloverggirl86
October 30, 2016
lloverggirl86
Was quick, but didn't deliver the way I expected. I do appreciate her effort and time.