Submitted by: Submitted by Tougie05
Views: 173
Words: 1251
Pages: 6
Category: Science and Technology
Date Submitted: 10/08/2013 02:57 PM
Chapter 1
INTRODUTION
Context of the Problem
Computer Security is ensuring the confidentiality, integrity, and availability to
components of computer systems. The three principle pieces of a computing system
subject to attacks are hardware, software, and data. These three pieces, and the
communications between them constitute the basis of computer security. There are four
kinds of attacks on computer systems: interruption, interception, modification, and
fabrication. Three principles affect the direction of work in computer security as follows;
1) by the principle of easiest penetration, a computer system penetrates will
use whatever means of attack are the easiest; therefore, all aspects of
computer system security must be considered at once. 2) By the principle
of timeliness, a system must be protected against penetration only long
enough so that penetration is of no value to the penetrate. 3) The principle of
effectiveness states that controls must be usable in order to serve their
purpose.
Controls can be applied at the levels of data, programs, and the
system, physical devices communications links, the environment and
personnel. Sometimes several controls are needed to cover a single
vulnerability and sometimes one control address several problems at once.
1. Computer services are analogous to theft to electricity or any other utility.
2. Computers with sensitive data is not good practice, especially when the chosen software.
3. Security is a high risk in government worldwide.
Statement of the Problem
Computer systems in the Federal government and organizations around
Washington, DC is being attacked constantly. The computer security being used
today’s environment needs to be upgraded so that inside and outside influences can
not manipulated the systems for their personal use to everyone’s security and
information....