This website uses cookies to ensure you have the best experience. Learn more

Computer Security In Education Essay

330 words - 2 pages

Maintaining internet security is of the utmost importance to higher education systems. The majority of universities’ administrative, financial, and clinical systems are available through a campus-wide network (Rasmussen, 2011). This means that highly confidential documents, such as student’s personal information, medical records, and much more are housed on campus servers. This information is vulnerable to security threats and puts the university at risk for lawsuits if the information is exposed. Student’s internet use on campus daily comes in contact with social ...view middle of the document...

The higher education system then has to deal with legal issues, public relations fiascos, and various financial losses.
In order to avoid any unnecessary headaches, universities go to great lengths to protect their networks from security threats. Organizations storing sensitive data are required by law to have a technology-based deterrent, a monitoring and reviewing method, and a process to lessen the breach (cite). In addition, universities practice standard internet security procedures such as implementing firewalls, filtering, sniffers, and virtual private networks. In this age of technology, no one is completely safe from cyber security threats, but with these combined practices, universities are much more equipped to defend themselves.

Oblinger, D. (2003). IT Security and Academic Values. In Computer and network security in higher education (chapter one). Retrieved from
Rasmussen, R. (2011, April 28). The college cyber security tightrope: Higher education institutions face greater risks. Retrieved from

Other Papers Like Computer Security In Education

Principles of Information Security Chapter 1

4922 words - 20 pages study of computer security? Which are most commonly associated with its study? The six components are software, hardware, data, people, procedures, and networks. People would be impacted most by the study of computer security. People can be the weakest link in an organization’s information security program. And unless policy, education and training, awareness, and technology are properly employed to prevent people from

Computer Crimes Essay

819 words - 4 pages be thriving despite the concerted efforts of both the law enforcement and business communities to stop it. The government has enacted the USA Patriot Act. The Act is broadly scoped, and some of its provisions may affect Internet usage, computer security, and critical infrastructure protection. In the area of computer security, the Act creates a definition of “computer trespasser” and makes such activities a terrorist act in certain circumstances

Ethical Hacking

1344 words - 6 pages into computer systems. While the first definition is older and is still used by many computer enthusiasts(who refer to cyber-criminals as "crackers"), the second definition is much more commonly used.” – Definition by Internet Security Systems In the context of “ethical hacking”, hacking refers to the second definition –breaking into computer systems. It can be assumed that hacking is illegal, as breaking into a house would be. At this point

Security Goals and Objectives

805 words - 4 pages available in security and related disciplines which allows the security professional the ability to gain the expertise in his or her, security related field. Some types of certifications include fraud certifications, disaster recovery, physical security and loss prevention (Goodchild n.d.). Security personnel with valid certifications gain the expertise to help the organization protect all assets. Education is the key to avoid potential legal issues


620 words - 3 pages . & Security Analysis (SP) MGT447 Business & Society ________ Free elective ________ Free or General Education elective ________ Free elective Notes: 1. *These courses can be interchanged between semesters within the specified year. 2. (F) means fall semester only and (SP) means spring semester only. 3. Bolded courses are major course requirements. ACC306 Tax Accounting counts as a free elective. 4. In total, there are 9 GE courses to take, including 3 CAT B, 3 CAT C, 1 CAT D, and 2 CAT E. In addition, there are 5 free electives.

Data And Privacy

2289 words - 10 pages Data Privacy and Security Table of Contents Introduction 3 Why Protection 4 Computer Virus 4 How Viruses Infect Computer 5 How People Hack Computer Systems 6 How to Keep Computers Safe from Online Predators 7 Conclusion 10 REFERENCES 11 Introduction The role of computer systems is very vital in our daily lives. Since computers help us to deal with approximately all the

Uses of Computer

547 words - 3 pages storage capacities. As computers are a daily utility, they have gained immense importance in day-to-day life. Their increasing utility has made computer education the need of the day. By computer education, we mean, gaining the know-how of the basic concepts related to a computer and gaining the basic knowledge of computer operation. Knowing about the basic components of a computer, the basic concepts behind the use of computers and the know-how of

Cyber Crimes

1489 words - 6 pages against "computer hacking he may be able to escape any conviction (Washington Times 5/18/2000)." So the hacker who caused damage of 15 billion worldwide could get away with a crime considered a felony in the U.S. Although computer crime and hacking have become a global problem, it does serve a function in society. Under the functionalist perspective, "society seeks equilibrium within the five institutions of the economy, family, education

Assignment 1: Digital Computer Crimes

1527 words - 7 pages from terror and foreign intelligence agencies, as well as any other federal crime that has not been specifically designated to another federal agency. Next is the National Security Agency, or NSA is primarily responsible for protecting classified computer data and the integrity of U.S. information systems. Even though most of the work performed by the NSA remains secretive in nature, the agency's expertise in the area is intended to improve

Itt It255 Unit 4 Aup

1345 words - 6 pages . Richman Investments management reserves the right to monitor and/or log all employee use of Richman Investments Information Resources with or without prior notice. Part III – Acceptable Use Requirements 1. Users must report any weaknesses in Richman Investments computer security to the appropriate security staff. Weaknesses in computer security include unexpected software or system behavior, which may result in unintentional disclosure of

Teaching Hacking in College

1111 words - 5 pages computer system or database, or to learn how to program a virus. In recent years, hackers have been able to access information in databases that includes bank account information, social security numbers, credit card numbers, names, addresses and other personal information that can be used to steal someone’s identity. They have been able to do this because passwords on the database were not changed, or the software for the database was not updated

Related Essays

The Impact Of Computer In Our Modern Days Organization ( A Case Study Of Federal College Of Education Technical Asaba, Delta State)

5420 words - 22 pages information system, billing system and drug administration. Likewise in education computers are useful in teaching the basic skills. In office management the use of computer has made great impact on the area of our modern office equipment which had been automated such as typewriters, communication system and language translation. In business and professional office, computer is used in inventory. Control information processing, accounting

Course Discription Essay

968 words - 4 pages Stallings, W., & Brown, L. (2008). Computer security principles and practice. Pearson Education, Inc. Software Microsoft® Project 2010 (Virtual Desktop) Microsoft® Visio® 2010 (Virtual Desktop) Microsoft® Excel® 2010 (Virtual Desktop) Microsoft® Word 2010 (Virtual Desktop) All electronic materials are available on the student website. Supplemental Resource Microsoft. (2012). Microsoft Office Project 2010. Hoboken, NJ

Introduction To Information Security Student Essay

1249 words - 5 pages Documents Grampp and Morris write “UNIX Operating System Security.” In this report, the authors examine four“important handles to computer security”: physical control of premises and computer facilities,management commitment to security objectives, education of employees, and administrativeprocedures aimed at increased security. Reeds and Weinberger publish “File Security and the UNIX System Crypt Command.” Their premise was: “No technique can be


478 words - 2 pages TB – 332 Week 1 The Who, What, When, Where, and Why of Information Technology My name is Mark Anthony C. Fajardo and I am a junior at ITT Technical Institute, who is graduating in March of 2013 with an Associate’s Degree in Applied Science, majoring in Computer Network Systems. I am pursuing an education in Information Technology because I wanted to start a career in a growing industry. Although I do not have a lot of experience in computers