Computer security

Decent Essays
Improved Essays
Superior Essays
Great Essays
Brilliant Essays
    Page 17 of 50 - About 500 Essays
  • Improved Essays

    Today's technology is evolving at an unprecedented rate making the use, and misuse, of cyberspace easily accessible to anyone with access to a computer, smartphone, and the internet. Many governments realize how invaluable of an asset the internet is and have integrated it as an integral part of their nation's infrastructure and society. Unfortunately, whether it be by way of an individual person or a national institution, it is not uncommon to have enemies' attempting to exploit weaknesses.…

    • 601 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    HIPAA was founded in 1996 in which created regulations regarding the protection and security of health information. Before HIPAA, there was not a set of regulations that protected health information in the health field. During this time, the health industry was starting to convert to electronic forms of records, in which the Security Rule was then founded. HIPAA Security Rule is the protection of health records specifically in the electronic form. This includes the transferring of electronic…

    • 1427 Words
    • 6 Pages
    Improved Essays
  • Great Essays

    Cyber Warfare Quotes

    • 613 Words
    • 3 Pages

    Apps, Peter. “Commentary: As Cyber Warfare Turns 10, the West Risks Falling Behind.”Reuters, Thomson Reuters, 4 May 2017, www.reuters.com/article/us-cyber-warfare-commentary/commentary-as-cyber-warfare-turns-10-the-west-risks-falling-behind-idUSKBN180035. The article suggests that there is a distinction between how the West and countries such as Russia and China use cyberspace. The United States focuses on preventing enemies from gaining access to resources such as government systems or…

    • 613 Words
    • 3 Pages
    Great Essays
  • Improved Essays

    Database Security

    • 2041 Words
    • 9 Pages

    Based on the three principles of computer security; Confidentiality, Integrity and Availability, they have clear relations to database management systems. Integrity and confidentiality is a major concern within database security since data is constantly being stolen leaving it unprotected against malicious users. Confidentiality is the protection against disclosure of sensitive information…

    • 2041 Words
    • 9 Pages
    Improved Essays
  • Improved Essays

    Target Breach Essay

    • 1427 Words
    • 6 Pages

    sensitive information to be compromised. In hindsight, had the security systems been the top priority the data breach may have been avoided. The fact that the CEO shunned the decision to have the improvements made, caused the consumers to suffer the devastation of having their sensitive information stolen, thereby generating an ethical calamity for Target that cost them their stellar integrity. Target should have had better security features that would…

    • 1427 Words
    • 6 Pages
    Improved Essays
  • Improved Essays

    part in. The technology has successfully submerged society in every part of their daily lives and is the major source of innovation. New technological inventions and software have improved and benefited the educational system, healthcare, and the security and protection of communities in plenty of forms. Innovation and the introduction of technology in the education system engage and offer more opportunities to students. For example, an online article covered a study…

    • 1011 Words
    • 4 Pages
    Improved Essays
  • Great Essays

    Hacking In Healthcare

    • 1225 Words
    • 5 Pages

    There are various reasons why systems in the healthcare industry specifically are under cyber-attack. The passwords to get around the security firewalls are not strong or enforced enough to where one can easily figure out or hack in. Employee education or lack thereof is another issue healthcare is faced with. Health information about a patient is a need to know basis and some healthcare…

    • 1225 Words
    • 5 Pages
    Great Essays
  • Improved Essays

    Project Part 1 Task 1: Outline Security Policy First World Bank Savings and Loan; a financial institution that offers banking services (loans and deposits). The bank would like to provide online banking services to the customers, which includes online credit card use for loan applications. Recommendations are based on such factors as: ownership total cost, scalability, and reliability. Decisions and recommendations made need to be appropriate from the CIA triad perspective. My team’s…

    • 1249 Words
    • 5 Pages
    Improved Essays
  • Improved Essays

    Do not bring your insurance policy cards and Public Security Credit cards. Keep your records in a protected papers container at home. Only bring photocopies of cards and keep the original ones in your container. If you should bring credit cards, just bring a maximum of two. This makes it less challenging for…

    • 694 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    so that one has a clear understanding of what identity theft is and how to protect themselves. According to wallethub, “identity theft is when someone gains unauthorized access to your personally identifying information – such as your name, Social Security…

    • 688 Words
    • 3 Pages
    Improved Essays
  • Page 1 14 15 16 17 18 19 20 21 50