This website uses cookies to ensure you have the best experience. Learn more

Threats To Elements Of Computer Security

1748 words - 7 pages

Running Head: THREATS TO ELEMENTS OF COMPUTER SECURITY

Threats To Elements Of Computer Security: Ways Employee Use of Emails May Breach Confidentiality, Integrity And Availability of Information.
Gertrude Nyandat
Grantham University

Abstract
Email has indeed become the primary communications medium for most organizations, While email is critical to the operation of almost all organizations, it is also susceptible to a variety of serious disruptions that range eavesdropping, identity theft, message interception and modification and false messaging are just some of the threats undermining the elements of a computing system. emailing provides an ...view middle of the document...

Gone are the days that email was regarded as secure eavesdropping, identity theft, message modification and false messaging are just some of the threats undermining the elements of a computing system
Confidentiality ensures that the necessary level of secrecy is enforced to prevent unauthorized disclosure or unauthorized usage. Virtually every email that you send has to go through a number of computers before it reaches the intended receiver which renders it vulnerable to interception. Emails can be intercepted at many points on route to the recipient. Hence making it open to confidentiality flaws. Assuming you work for company A and you are sending an Email to a relationship Manager who works for company B. attaching a document that is confidential and is not released to the public. The Documents needs to reach the Relationship manager as soon as possible. On Enroute to the Relationship manager’s inbox, A rogue IT Personnel from either organization intercepts the email read the contents and leaks the contents to the public, causing headache to both companies. The very fact that the information was leaked to the public compromises the confidentiality of the information. The information was Disclosed when it shouldn’t have.
Sensitive information can easily be distributed accidently or deliberately. Let’s start with accidentally; one of my functions is to processes waiver plans. (companies offer waiver plans when they want to raise capital) and one requirement for waiver plans is that no participant should know who is who and how much the other participant is contributing. Assuming Iam handling a waiver with 100 participants it will be cumbersome for me to send 100 emails with the same information, so I decided to create a distribution list. In the Cause of Sending the email I accidentally used the “TO”functionality instead of BCC (blind carbon copy) which makes the recipients invisible to all of the other recipients of the message. By doing this I have breached the confidentiality of the participants as they were supposed to be anonymous to each other. The participants might lose faith in our organizations since we did not protect their identity as required. Mallory couldn’t sum it better when he stated:
“Examples of how difficult it is for organizations to control information flow is demonstrated by how many people have accidentally sent a confidential e-mail to a distribution list when they meant to send it to an individual recipient.”(Mallery, nd)
Email as a tool is very great to an organization as it makes it easier and faster to send information from one user to another, but looking at the security standpoints it can cause a lot of damage to an organization's information.
Now the deliberate part, the majority of employees are reliable, trustworthy individuals seeking to use the system for legitimate purposes. Unfortunately there is always a bad apple in every bushel. Assuming the bad apple is in identity...

Other Papers Like Threats to Elements of Computer Security

The Vulnerability Of Computerised Accounting Information Systems To Computer Crime

2560 words - 11 pages Abstract.The objective of this essay is to determine the vulnerability of computerised accounting information system to computer crime and the solutions to prevent such crime from occurring in organisations. Ever-Changing information technology has made computerised accounting processes easier. However, it has also created significant threats in relation to ensuring the security and reliability of computerised accounting information systems

Weapons of Mass Destruction and Its Threat to Global Security

4518 words - 19 pages of Surrender on 2 September, officially ending World War II. The bombings led, in part, to post-war Japan's adopting Three Non-Nuclear Principles, forbidding the nation from nuclear armament. The role of the bombings in Japan's surrender and their ethical justification are still debated.[6] In this paper I would like to discuss what we mean by a weapon of mass destruction and how it affects global security and induces terrorism. A weapon of

Evaluate a Range of Ways to Embed Elements of Functional Skills in Your Specialist Area

595 words - 3 pages Evaluate a range of ways to embed elements of Functional Skills in your specialist area Functional skills are defined as ‘practical skills in English, information and communication technology (ICT) and mathematics that allow individuals to work confidently, effectively and independently in life.’ (The Qualifications and Curriculum Development Agency, 2009). These skills are often termed ‘transferable skills’ as they can be applied (or

Identify the Elements of Globalization to Determine Their Impact on the Hr Function

1806 words - 8 pages | ------------------------------------------------- ------------------------------------------------- Faculty Use Only ------------------------------------------------- ------------------------------------------------- ------------------------------------------------- ------------------------------------------------- Identify The Elements Of Globalization To Determine Their Impact On The HR Function Marqueze Sawyers Northcentral University Introduction

Richard Dawkins: Using Computer Modeling To Explain The Theory Of Evolution By Natural Selection

1359 words - 6 pages Using Computer Modeling to Explain the Theory of Evolution by Natural Selection Throughout The Blind Watchmaker Richard Dawkins attempts to use computer modeling to explain and defend various aspects of the theory of evolution by natural selection. Where Dawkins’ computer modeling comes into use in a significant way is discussed in Chapter 3 of his book titled, “Accumulating Small Change”. In it, Dawkins takes the reader through

To What Extent Are Domestic Energy Resources Important in Determining the Energy Security of Countries?

705 words - 3 pages (b) To what extent are domestic energy resources important in determining the energy security of countries? (15) To have energy security means to have access to reliable and affordable energy sources. E.g. Russia and their natural gas reserves. Countries/regions/localities that do not haver this are said to be energy insecure. E.g. Rural communities in Zimbabwe or the UK winter fuel allowance for the elderly is a recognition of fuel poverty

Gain Access to the Homes of Individuals, Deal with Emergencies and Ensure Security on Departure

1889 words - 8 pages , 2.3 | | |Question 3: | |The following questions are about you ensure security when you leave a service user’s home. Here you need to think of a

Through The Theme Of Innocence Salinger Is Able To Bring Forth Different Elements Of Litterature Which Will Be Discussed In This Essay

1228 words - 5 pages to themselves. This is a dominating theme in the book, which is characterized by two literary elements: characterization and symbolism.The first literary device, which constitutes the development of this major theme in the book The Catcher in the rye, is characterization. Holden Caulfield, the protagonist of the novel, is residing at Pency Prep. Holden is an intelligent and sensitive boy but has a very cynical and jaded point of view of the world

Calculate the Total Price to Purchase All the Components Required to Build a State-of-the-Art Gaming Computer from Components Available on the Internet

798 words - 4 pages Problem definition: Calculate the total price to purchase all the components required to build a state-of-the-art gaming computer from components available on the Internet. CPU Intel Core i5-3570K Ivy Bridge 3.4GHz $230 Case Rosewill BLACKHAWK Gaming ATX Mid Tower Computer Case $80 Power supply CORSAIR HX Series HX750 $130 Motherboard GIGABYTE GA-990FXA-UD3 $133 Hard Drive TOSHIBA DT01ACA100 1TB 7200 RPM 32MB Cache $65 Sound Card ASUS

Effect of Computer Games to Students

2046 words - 9 pages -aaral. Masama kung dahil dito ay nakakasakit tayo ng ibang tao. II.INTRODUKSYON SA PAKSA Ano nga ba ang computer game? Ito ay ang mga larong nilalaro sa kompyuter. Ito ay madalas na nagbibigay aliw sa atin, lalo na sa mga kabataan ngayon. Ang mga halimbawa nito ay DotA (Defense of the Ancient), Counter Strike, Warcraft, NBA Live, Doom, Ragnarok at marami pang iba. Ito yung kadalasang pagpasok mo sa isang computer rentals, makikita mo na

The Scope of Sustainable Agriculture in the District of Allahabad: an Approach to Food Security, Innovation & Greening the Economy

2043 words - 9 pages Research Proposal for the Ph. D. Admissions: 2015-16 A Geographical Study of Natural Disasters and their Management in Uttarakhand Submitted By SANJAY KUMAR M. A. (GEOGRAPHY) Introduction: Disasters are not new to mankind. They have been the constant, though inconvenient, companions of the human beings since time immemorial. Disasters continue to occur without warning and are perceived to be on an increase in their magnitude, complexity

Related Essays

Multiple Threats To Security In South Asia

1120 words - 5 pages Provider ID_peterjharvey There are multiple threats to security in Southwest Asia today. Which threat in your opinion poses the greatest danger to regional and international peace and why? There are many documented reasons why Southwest Asia poses a danger to regional and international peace, and this essay is designed to touch on some of the myriad of problems confronting Southwest Asia at the present time and explain why. If we look

Are Regional Organizations Best Suited To Manage Security Threats In Their Own Geographical Area?

3066 words - 13 pages Are Regional Organisations best suited to manage security threats in their own geographical area? Introduction: Since the end of the Second World War there has been a constant growth of regional organisations military, political and economic. The process of decolonization at the end of the 2nd World War has accelerated this growth. Today there are more then 50 regional organizations with various aims and objectives from NATO to ASEAN, Arab

Chapter 1 Introduction To Information Security: Principles Of Information Security

979 words - 4 pages available to those authorized to use it. 6. If the CIA triangle is incomplete, why is it so commonly used in security? The CIA triangle is still used because it addresses the major concerns with the vulnerability of information systems. 7. Describe the critical characteristics of information. How are they used in the study of computer security? Availability: Authorized users can access the information Accuracy: free from errors

Importance Of Computer To English Students

2420 words - 10 pages English in computing From Wikipedia, the free encyclopedia Jump to: navigation, search The English language is sometimes described as the lingua franca of computing. In comparison to other sciences, where Latin and Greek are the principal sources of vocabulary, Computer Science borrows more extensively from English. Due to the technical limitations of early computers, and the lack of international standards on the Internet, computer users