SlideShare une entreprise Scribd logo
1  sur  4
v                                      See more essay samples onESSAYSHARK.COM




           Five-Paragraph Essay Sample



    COMPUTER SECURITY AND PRIVACY


        EssayShark.com - Online Academic Assistance
v                                                         See more essay samples onESSAYSHARK.COM




In the book Web Security, Privacy & Commerce, S. Garfinkel (2002) observes that “A
computer is secure if you can depend on it and its software to behave as you expect”. This is
held as true by most computer users, whether they sit in the privacy of their own homes or
work in any size undertaking or corporation (Garfinkel 3). All users understand that they take
risks when they use computers, which they attempt to mitigate by putting safety measures
into place. These measures are becoming increasingly complex and intricate, because making
a server and the data on it secure is neither simple nor straightforward. One hopes to stay a
step ahead of the ingenious people who find it a challenge to breach security, no matter how
complex (Pfleeger, 4). Countermeasures and controls are put into place by those who want to
protect their data, and the predictable ways in which their computers work. Protection of
personal and business data is essential, and is made possible by methods such as installation
of firewalls and use of encryption.

“Few controls are permanently effective” is a realistic but frightening sentence found early in
the book Security in Computing by C.P Pfleeger (2006), who advises frequent checks and
measures, and regular updating of computer security, to stay ahead of the geniuses who take
pleasure in seeking out the exposed and defenceless. One can be forgiven for thinking that the
most stringent of measures are the best. Many users adopt a “belt and suspenders” mentality
that has them putting more than one firewall into place, or installing more than one kind of
virus protection. There is, however, such as thing as too much defence. It is possible to run
the risk of programs overlapping and disabling each other, or software malfunctioning and
leaving the user with no protection at all (Bailey 17).

When security settings are too high, the user is practically paralysed, with access limited to
very few choices. Searches are reduced to a few options, and less and less is visible the more
stringent the settings become. The point of internet connectivity or belonging to a corporate
network is suddenly defeated (Garfinkel 88). While defending personal information from
identity theft, protecting juveniles from corruption, or insulating business data or assets from
theft, one must also safeguard and guarantee one’s ability to freely seek and exchange
information.

The cryptographic foundation of e-commerce is very complicated (Garfinkel 104), because
what it protects is of a highly complex and important nature. The sensitive data includes
information on banking, medical records, and national security data whose violation,
v                                                         See more essay samples onESSAYSHARK.COM


interruption, or interception could do widespread or irreparable damage. In addition,
“America’s electricity grids, water supplies, computer and cell phone networks and other
infrastructure are coming under attack” according to General Alexander, the leader of the
National Security Agency (New York Times, 2012) . The managers of this kind of material,
and especially essential services, which are not limited to facts and figures, are duty-bound to
safeguard it from theft, interference and digital snooping. Being too lax or blasé can lead to
down time at best, or exposure to terrorism and permanent damage in the worst case. If
security managers take their responsibility too far, on the other hand, it can lead to slow or
imperfect operations with reduced access to essential services (Pfleeger 69). Malicious
behaviour must be balanced by ethical and judicious control.
v                                                       See more essay samples onESSAYSHARK.COM


References




Bailey, M. The Complete Guide to Internet Privacy, Anonymity and SecurityNerel Online
     Publishing, 2011

Garfinkel, S. Web Security, Privacy & Commerce (Second Edition) O’Reilly Media, 2002

Pfleeger, C. P. Security in Computing (Fourth Edition) Prentice Hall, 2006

New York Times Computer Security (Cybersecurity) Times Topics August 2, 2012

     http://topics.nytimes.com/top/reference/timestopics/subjects/c/computer_security/index.
     html Retrieved August 16, 2012.

Contenu connexe

Plus de ESSAYSHARK.com

The Evolution of Female Representation in Disney Princess Films
The Evolution of Female Representation in Disney Princess Films The Evolution of Female Representation in Disney Princess Films
The Evolution of Female Representation in Disney Princess Films ESSAYSHARK.com
 
Happy 10 years, EssayShark!
Happy 10 years, EssayShark!Happy 10 years, EssayShark!
Happy 10 years, EssayShark!ESSAYSHARK.com
 
The Pay Gap Between Male and Female Employees
The Pay Gap Between Male and Female EmployeesThe Pay Gap Between Male and Female Employees
The Pay Gap Between Male and Female EmployeesESSAYSHARK.com
 
SCHOOL UNIFORM: THE KEY TO A SUCCESSFUL LEARNING PROCESS
SCHOOL UNIFORM: THE KEY TO A SUCCESSFUL LEARNING PROCESSSCHOOL UNIFORM: THE KEY TO A SUCCESSFUL LEARNING PROCESS
SCHOOL UNIFORM: THE KEY TO A SUCCESSFUL LEARNING PROCESSESSAYSHARK.com
 
Are Antidepressants Overprescribed
Are Antidepressants Overprescribed Are Antidepressants Overprescribed
Are Antidepressants Overprescribed ESSAYSHARK.com
 
Geographical Conditions and National Cuisine
Geographical Conditions and National CuisineGeographical Conditions and National Cuisine
Geographical Conditions and National CuisineESSAYSHARK.com
 
The Most Iconic Examples of Censorship
The Most Iconic Examples of CensorshipThe Most Iconic Examples of Censorship
The Most Iconic Examples of CensorshipESSAYSHARK.com
 
Presentation on Globalization
Presentation on GlobalizationPresentation on Globalization
Presentation on GlobalizationESSAYSHARK.com
 
What is the Significance of Civil Rights Movements in the Middle of XX Century
What is the Significance of Civil Rights Movements in the Middle of XX CenturyWhat is the Significance of Civil Rights Movements in the Middle of XX Century
What is the Significance of Civil Rights Movements in the Middle of XX CenturyESSAYSHARK.com
 
Chicago Formatting Style
Chicago Formatting StyleChicago Formatting Style
Chicago Formatting StyleESSAYSHARK.com
 
«Crime and Punishment» Book Review
«Crime and Punishment» Book Review«Crime and Punishment» Book Review
«Crime and Punishment» Book ReviewESSAYSHARK.com
 
«Young Doctors Notebook» Book Report
«Young Doctors Notebook» Book Report«Young Doctors Notebook» Book Report
«Young Doctors Notebook» Book ReportESSAYSHARK.com
 
How to Write a Resume That Rocks
How to Write a Resume That RocksHow to Write a Resume That Rocks
How to Write a Resume That RocksESSAYSHARK.com
 
Tricks about effective studying you wish you knew before
Tricks about effective studying you wish you knew beforeTricks about effective studying you wish you knew before
Tricks about effective studying you wish you knew beforeESSAYSHARK.com
 
13 Creative Writing Exercises
13 Creative Writing Exercises13 Creative Writing Exercises
13 Creative Writing ExercisesESSAYSHARK.com
 
7 English Idioms That Sound Funny in Different Languages
7 English Idioms That Sound Funny in Different Languages7 English Idioms That Sound Funny in Different Languages
7 English Idioms That Sound Funny in Different LanguagesESSAYSHARK.com
 
EssayShark in Numbers: 2016 Roundup [Infographic]
EssayShark in Numbers: 2016 Roundup [Infographic]EssayShark in Numbers: 2016 Roundup [Infographic]
EssayShark in Numbers: 2016 Roundup [Infographic]ESSAYSHARK.com
 
6 Tips for Student Trips
6 Tips for Student Trips6 Tips for Student Trips
6 Tips for Student TripsESSAYSHARK.com
 

Plus de ESSAYSHARK.com (20)

The Evolution of Female Representation in Disney Princess Films
The Evolution of Female Representation in Disney Princess Films The Evolution of Female Representation in Disney Princess Films
The Evolution of Female Representation in Disney Princess Films
 
Happy 10 years, EssayShark!
Happy 10 years, EssayShark!Happy 10 years, EssayShark!
Happy 10 years, EssayShark!
 
The Pay Gap Between Male and Female Employees
The Pay Gap Between Male and Female EmployeesThe Pay Gap Between Male and Female Employees
The Pay Gap Between Male and Female Employees
 
SCHOOL UNIFORM: THE KEY TO A SUCCESSFUL LEARNING PROCESS
SCHOOL UNIFORM: THE KEY TO A SUCCESSFUL LEARNING PROCESSSCHOOL UNIFORM: THE KEY TO A SUCCESSFUL LEARNING PROCESS
SCHOOL UNIFORM: THE KEY TO A SUCCESSFUL LEARNING PROCESS
 
Are Antidepressants Overprescribed
Are Antidepressants Overprescribed Are Antidepressants Overprescribed
Are Antidepressants Overprescribed
 
Geographical Conditions and National Cuisine
Geographical Conditions and National CuisineGeographical Conditions and National Cuisine
Geographical Conditions and National Cuisine
 
The Most Iconic Examples of Censorship
The Most Iconic Examples of CensorshipThe Most Iconic Examples of Censorship
The Most Iconic Examples of Censorship
 
Presentation on Globalization
Presentation on GlobalizationPresentation on Globalization
Presentation on Globalization
 
What is the Significance of Civil Rights Movements in the Middle of XX Century
What is the Significance of Civil Rights Movements in the Middle of XX CenturyWhat is the Significance of Civil Rights Movements in the Middle of XX Century
What is the Significance of Civil Rights Movements in the Middle of XX Century
 
APA Formatting Style
APA Formatting StyleAPA Formatting Style
APA Formatting Style
 
MLA Formatting Style
MLA Formatting StyleMLA Formatting Style
MLA Formatting Style
 
Chicago Formatting Style
Chicago Formatting StyleChicago Formatting Style
Chicago Formatting Style
 
«Crime and Punishment» Book Review
«Crime and Punishment» Book Review«Crime and Punishment» Book Review
«Crime and Punishment» Book Review
 
«Young Doctors Notebook» Book Report
«Young Doctors Notebook» Book Report«Young Doctors Notebook» Book Report
«Young Doctors Notebook» Book Report
 
How to Write a Resume That Rocks
How to Write a Resume That RocksHow to Write a Resume That Rocks
How to Write a Resume That Rocks
 
Tricks about effective studying you wish you knew before
Tricks about effective studying you wish you knew beforeTricks about effective studying you wish you knew before
Tricks about effective studying you wish you knew before
 
13 Creative Writing Exercises
13 Creative Writing Exercises13 Creative Writing Exercises
13 Creative Writing Exercises
 
7 English Idioms That Sound Funny in Different Languages
7 English Idioms That Sound Funny in Different Languages7 English Idioms That Sound Funny in Different Languages
7 English Idioms That Sound Funny in Different Languages
 
EssayShark in Numbers: 2016 Roundup [Infographic]
EssayShark in Numbers: 2016 Roundup [Infographic]EssayShark in Numbers: 2016 Roundup [Infographic]
EssayShark in Numbers: 2016 Roundup [Infographic]
 
6 Tips for Student Trips
6 Tips for Student Trips6 Tips for Student Trips
6 Tips for Student Trips
 

Dernier

Wellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptxWellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptxJisc
 
Understanding Accommodations and Modifications
Understanding  Accommodations and ModificationsUnderstanding  Accommodations and Modifications
Understanding Accommodations and ModificationsMJDuyan
 
Google Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptxGoogle Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptxDr. Sarita Anand
 
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...pradhanghanshyam7136
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfagholdier
 
Python Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxPython Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxRamakrishna Reddy Bijjam
 
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...ZurliaSoop
 
Interdisciplinary_Insights_Data_Collection_Methods.pptx
Interdisciplinary_Insights_Data_Collection_Methods.pptxInterdisciplinary_Insights_Data_Collection_Methods.pptx
Interdisciplinary_Insights_Data_Collection_Methods.pptxPooja Bhuva
 
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...Nguyen Thanh Tu Collection
 
Fostering Friendships - Enhancing Social Bonds in the Classroom
Fostering Friendships - Enhancing Social Bonds  in the ClassroomFostering Friendships - Enhancing Social Bonds  in the Classroom
Fostering Friendships - Enhancing Social Bonds in the ClassroomPooky Knightsmith
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsTechSoup
 
How to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSHow to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSCeline George
 
Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.pptRamjanShidvankar
 
On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsOn National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsMebane Rash
 
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...Nguyen Thanh Tu Collection
 
How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17Celine George
 
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdf
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdfUnit 3 Emotional Intelligence and Spiritual Intelligence.pdf
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdfDr Vijay Vishwakarma
 
Sociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning ExhibitSociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning Exhibitjbellavia9
 

Dernier (20)

Wellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptxWellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptx
 
Understanding Accommodations and Modifications
Understanding  Accommodations and ModificationsUnderstanding  Accommodations and Modifications
Understanding Accommodations and Modifications
 
Google Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptxGoogle Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptx
 
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdf
 
Python Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxPython Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docx
 
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
 
Interdisciplinary_Insights_Data_Collection_Methods.pptx
Interdisciplinary_Insights_Data_Collection_Methods.pptxInterdisciplinary_Insights_Data_Collection_Methods.pptx
Interdisciplinary_Insights_Data_Collection_Methods.pptx
 
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
 
Fostering Friendships - Enhancing Social Bonds in the Classroom
Fostering Friendships - Enhancing Social Bonds  in the ClassroomFostering Friendships - Enhancing Social Bonds  in the Classroom
Fostering Friendships - Enhancing Social Bonds in the Classroom
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The Basics
 
How to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSHow to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POS
 
Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.ppt
 
On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsOn National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan Fellows
 
Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024
 
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
 
How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17
 
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdf
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdfUnit 3 Emotional Intelligence and Spiritual Intelligence.pdf
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdf
 
Sociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning ExhibitSociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning Exhibit
 
Spatium Project Simulation student brief
Spatium Project Simulation student briefSpatium Project Simulation student brief
Spatium Project Simulation student brief
 

Computer Security and Privacy

  • 1. v See more essay samples onESSAYSHARK.COM Five-Paragraph Essay Sample COMPUTER SECURITY AND PRIVACY EssayShark.com - Online Academic Assistance
  • 2. v See more essay samples onESSAYSHARK.COM In the book Web Security, Privacy & Commerce, S. Garfinkel (2002) observes that “A computer is secure if you can depend on it and its software to behave as you expect”. This is held as true by most computer users, whether they sit in the privacy of their own homes or work in any size undertaking or corporation (Garfinkel 3). All users understand that they take risks when they use computers, which they attempt to mitigate by putting safety measures into place. These measures are becoming increasingly complex and intricate, because making a server and the data on it secure is neither simple nor straightforward. One hopes to stay a step ahead of the ingenious people who find it a challenge to breach security, no matter how complex (Pfleeger, 4). Countermeasures and controls are put into place by those who want to protect their data, and the predictable ways in which their computers work. Protection of personal and business data is essential, and is made possible by methods such as installation of firewalls and use of encryption. “Few controls are permanently effective” is a realistic but frightening sentence found early in the book Security in Computing by C.P Pfleeger (2006), who advises frequent checks and measures, and regular updating of computer security, to stay ahead of the geniuses who take pleasure in seeking out the exposed and defenceless. One can be forgiven for thinking that the most stringent of measures are the best. Many users adopt a “belt and suspenders” mentality that has them putting more than one firewall into place, or installing more than one kind of virus protection. There is, however, such as thing as too much defence. It is possible to run the risk of programs overlapping and disabling each other, or software malfunctioning and leaving the user with no protection at all (Bailey 17). When security settings are too high, the user is practically paralysed, with access limited to very few choices. Searches are reduced to a few options, and less and less is visible the more stringent the settings become. The point of internet connectivity or belonging to a corporate network is suddenly defeated (Garfinkel 88). While defending personal information from identity theft, protecting juveniles from corruption, or insulating business data or assets from theft, one must also safeguard and guarantee one’s ability to freely seek and exchange information. The cryptographic foundation of e-commerce is very complicated (Garfinkel 104), because what it protects is of a highly complex and important nature. The sensitive data includes information on banking, medical records, and national security data whose violation,
  • 3. v See more essay samples onESSAYSHARK.COM interruption, or interception could do widespread or irreparable damage. In addition, “America’s electricity grids, water supplies, computer and cell phone networks and other infrastructure are coming under attack” according to General Alexander, the leader of the National Security Agency (New York Times, 2012) . The managers of this kind of material, and especially essential services, which are not limited to facts and figures, are duty-bound to safeguard it from theft, interference and digital snooping. Being too lax or blasé can lead to down time at best, or exposure to terrorism and permanent damage in the worst case. If security managers take their responsibility too far, on the other hand, it can lead to slow or imperfect operations with reduced access to essential services (Pfleeger 69). Malicious behaviour must be balanced by ethical and judicious control.
  • 4. v See more essay samples onESSAYSHARK.COM References Bailey, M. The Complete Guide to Internet Privacy, Anonymity and SecurityNerel Online Publishing, 2011 Garfinkel, S. Web Security, Privacy & Commerce (Second Edition) O’Reilly Media, 2002 Pfleeger, C. P. Security in Computing (Fourth Edition) Prentice Hall, 2006 New York Times Computer Security (Cybersecurity) Times Topics August 2, 2012 http://topics.nytimes.com/top/reference/timestopics/subjects/c/computer_security/index. html Retrieved August 16, 2012.