Computer Security Although it is never possible to fully prevent the unauthorized use of information from people with security clearances and access, the use of security clearance and access is important to ensure that people without security clearance cannot access the confidential information. In other words, the concept of 'absolute security' is...
Computer Security Although it is never possible to fully prevent the unauthorized use of information from people with security clearances and access, the use of security clearance and access is important to ensure that people without security clearance cannot access the confidential information. In other words, the concept of 'absolute security' is a chimera. It is the nature of security that makes it necessary to weigh up the threats, the risks, the harm arising, and the cost of safeguards (Bach, 1986).
A balance must be found between predictable costs and uncertain benefits, in order to select a set of measures appropriate to the need. In most of the cases, the risks of security clearance involve on the personal integrity, trustworthiness, and honesty than the information systems (IS) security measures. Even if IS security measures are handled to monitor and control all of the keystrokes of the computers, there are instances of unauthorized information because of personal negligence, such as one may leave inadvertently classified material left unattended.
Also, computer diskettes, CDs, carbon paper, and used typewriter ribbons may pose a problem when doing a security check, as a visual examination of these items does not tell whether the items contain classified information (Bjork, 1975). Although to prevent the unauthorized use of information, information can be disaggregated at several locations, without providing networks communications between these locations.
However, this kind of measure is neither cost-effective nor productive, because where people are trustworthy and they need such information for authorized uses will have access to such information in bits and pieces from several locations. It would not only create time delay in accessing all of the needed information, but it would create much difficulty in putting all of the information in order.
However, when data are in a database format, it is possible to partition sensitive data into separate tables so that only authorized users can access these tables based on legitimate needs. Partitioning scheme mechanism is based on a simple in-built DBMS security feature to prevent unauthorized access to sensitive data (Bhargavan and Gadia, 1990). Some organizations have found it necessary to lock their computer drives to prevent any downloading of files from the classified system.
If an individual wishes to download and retransmit an unclassified file from a classified system, the file must be downloaded and processed by the system administrator to remove electronic traces of other files before it is retransmitted (Denning, 1988). Secrets in the computer require the same protection as secrets on paper. Information can be recovered from a computer hard drive even after the file has been deleted or erased by the computer user.
It is estimated that about a third of the average hard drive contains information that has been "deleted" but is still recoverable. Encrypting sensitive data is another method that prevents the unauthorized access of data. This mechanism is offers value so that none other than the genuine person can take measures for data modification (Bhargava and Gadia, 1990). It also inhibits unauthorized dumping and interpretation of data, and enables secure authentication of users.
Presently, information security encompasses a number of measures such as communications security, computer security and radiation security (i.e. emissions from devices such as monitors and printers). Then there are other measures such as the use of security PINS.
The remaining sections cover Conclusions. Subscribe for $1 to unlock the full paper, plus 130,000+ paper examples and the PaperDue AI writing assistant — all included.
Always verify citation format against your institution's current style guide.