How can I earn money with StudyBay Top writers
Order Assignment
This order has already been completed on Studybay
On Studybay you can order your academic assignment from one of our 45000 professional writers. Hire your writer directly, without overpaying for agencies and affiliates! Check price for your assignment
17 bids submitted. Essay Example.

The Computer Security and Internet Privacy

Today one of the most urgent problems in the field of information systems is the protection of information on the internet. Indeed, people can’t imagine their life without electronic global network. People make a variety of financial transactions on the internet, order goods, services, use credit cards, carry out payments, talk and write, and perform many other actions that require privacy and protection.

Information security is a state of information indicating that the system is operating normally, data is protected, its safety is ensured and there is integrity, confidentiality, and availability. The main components of information security involve the following:

  • If there is access to data only by those users who can log in, it is then confidential.
  • Reliability and completeness of information means integrity.
  • The concept of accessibility implies that there will be access to resources and related assets to authorized users, if the need arises.

These are the three principles of information security. In addition to them, there is a principle of authenticity, which means the authenticity of the subject and object of access must be ensured.

There are several sources that may pose a threat or unauthorized access to your data on the computer.

There are man-made source that include the actions of different subjects. They may be intentional or unintentional. They are divided into external and internal types. The first is the illegal invasion of a foreign person from the external general-purpose network. The second one involves an act from within, i.e., by an officer of the company, for example.

Everything that leads to a failure or refusal of work of the program or computer refers to man-made sources. Here you can blame software errors, obsolete device or system, and equipment failures (cable or disk system, a server, or workstation problems).

When you pass transfer some data using internet, then before it reaches its destination, it gas to go through many other servers and routers. There is no tracking control on its way. Therefore, anything can happen to this information. Data protection on the internet is one of the main problems of any large company or organization.

In order to ensure the necessary privacy, companies often seek help of experts in cryptography or encryption of information. When you create the encrypted data you use an algorithm or device that implements it. The changing code of key is managed by encryption. With its help you can extract information.

Today one of the most urgent problems in the field of information systems is the protection of information on the internet. Indeed, people can’t imagine their life without electronic global network.

Related Materials
Assignment ID
100002262
Discipline
Type
CREATED ON
October 26, 2016
COMPLETED ON
October 27, 2016
Price
$20
This order has already been completed on Studybay
On Studybay you can order your academic assignment from one of our 45000 professional writers. Hire your writer directly, without overpaying for agencies and affiliates!
Check price for your Essay
Essay Example Comments
akshayksh3
September 22, 2017
akshayksh3
Recommended! looking forward to work again!!!
rosasjr48
September 21, 2017
rosasjr48
Thank you for a paper well written!
manu 2016
September 20, 2017
manu 2016
The best writer so far. kellyessays always deliver me "A" Grade paper.