Verified Document

Computer Security Although It Is Never Possible Term Paper

Computer Security Although it is never possible to fully prevent the unauthorized use of information from people with security clearances and access, the use of security clearance and access is important to ensure that people without security clearance cannot access the confidential information. In other words, the concept of 'absolute security' is a chimera. It is the nature of security that makes it necessary to weigh up the threats, the risks, the harm arising, and the cost of safeguards (Bach, 1986). A balance must be found between predictable costs and uncertain benefits, in order to select a set of measures appropriate to the need.

In most of the cases, the risks of security clearance involve on the personal integrity, trustworthiness, and honesty than the information systems (IS) security measures. Even if IS security measures are handled to monitor and control all of the keystrokes of the computers, there are instances of unauthorized information because of personal negligence, such as one may leave inadvertently classified material left unattended. Also, computer diskettes, CDs, carbon paper, and used typewriter...

However, this kind of measure is neither cost-effective nor productive, because where people are trustworthy and they need such information for authorized uses will have access to such information in bits and pieces from several locations. It would not only create time delay in accessing all of the needed information, but it would create much difficulty in putting all of the information in order. However, when data are in a database format, it is possible to partition sensitive data into separate tables so that only authorized users can access these tables based on legitimate needs. Partitioning scheme mechanism is based on a simple in-built DBMS security feature to prevent unauthorized access to sensitive data (Bhargavan and Gadia, 1990).
Some organizations have…

Sources used in this document:
References

Bach, Maurice J. (1986). The Design of the Unix Operating System. Englewood Cliffs, N.J: Prentice-Hall.

Bhargava, Gautam, and Gadia, Shashi K. (1990). The Concept of Error in a Database: An Application of Temporal Database. Data Management: Current Trends. McGraw-Hill: New Delhi, India, pp. 106-121.

Bjork, L.A. (1975). Generalized Audit Trail Requirements and Concepts for Database Applications. IBM Systems Journal, Vol. 14, No. 3, pp. 229-245.

Denning, Dorothy E. (1988). Lessons Learned from Modeling a Secure Multilevel Relational Database System. Database Security: Status and Prospects. North-Holland, Amsterdam: Elsevier, pp. 35-43.
Cite this Document:
Copy Bibliography Citation

Related Documents

Security Awareness the Weakest Link
Words: 8202 Length: 30 Document Type: Case Study

To offer an information security awareness training curriculum framework to promote consistency across government (15). Security awareness is needed to ensure the overall security of the information infrastructure. Security awareness programs is the can help organizations communicate their security information policies, as well as tips for users, to help keep systems secure, and the practices the entire organization should be utilizing. However, as Kolb and Abdullah reiterate, "security awareness is not

Computer Hacker Nefarious Notions III
Words: 9646 Length: 35 Document Type: Term Paper

(Hackers Chronology, 2006). 1989 The first case of cyber espionage is recognized in Germany (west). This reportedly involved the CHAOS computer club. "Mentor releases the hacker manifesto Conscience of a hacker, which ends with the intriguing line: 'You may stop the individual, but you can't stop us all.'" (Hackers Chronology, 2006). 1990 Electronic Frontier, Freedom on the Internet advocacy group, is launched Polymorphic viruses (which modifies themselves when they spread), along with other sophisticated kinds of

Security Issues Creating a Site
Words: 4754 Length: 17 Document Type: Research Proposal

Even though there is always some form of a risk involved in the coding technique together with the deployment methods of a website, some technologies such as PHP and MySQL form some of the worst aggravators of online website security. The loopholes that exists in the use of these technologies results in some of the worst hack attacks and security breaches ever experienced in the field of web design. The

Security Issues of Online Communities
Words: 15576 Length: 60 Document Type: Term Paper

This researcher rejects the existence of online communities because computer mediated group discussions cannot possibly meet this definition. Weinreich's view is that anyone with even a basic knowledge of sociology understands that information exchange in no way constitutes a community. For a cyber-place with an associated computer mediated group to be labeled as a virtual settlement it is necessary for it to meet a minimum set of conditions. These are:

Computers & the Internet: Intellectual
Words: 1783 Length: 5 Document Type: Research Paper

S.C. § 302). In contrast, copyright protection for a work created between 1923 and the end of 1977 has already expired currently. With the durational element of copyright protection in mind, one can clearly see how important such protection is for creators. Having one's work meet the requirements for federal copyright protection is of the utmost importance to solidifying long-term and strong protection of one's efforts as a creator and

Security Aviation Security Pre and
Words: 10540 Length: 30 Document Type: Term Paper

With the threat of terrorism remaining so strong in this country it is vital to find new and better ways to protect people and to keep them safe from harm as much as is humanly and technologically possible. Scope of the Study The scope of this particular study is very broad and far-reaching, because there are so many people who are being affected by it now and will be affected by

Sign Up for Unlimited Study Help

Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.

Get Started Now