What's New-Given Below
technicalsymposium
technicalsymposium
technicalsymposium

Lecture Notes


ABSTRACT

COMPUTER SECURITY is the prevention and Protection of computer assets from unauthorized access, use, alteration, degradation, destruction, and other threats. There are two main subtypes: physical and logical. PHYSICAL computer security involves tangible protection devices, such as locks, cables, fences, safes, or vaults. LOGICAL computer security involves non-physical protection, such as that provided by authentication or encryption schemes. Make a point of noting that the distinction between physical versus non-physical phenomena runs through a number of areas in computer science, despite minor differences in definition. The skills of a COMPUTER SECURITY expert are in high demand, and those skills are not just technical -- they require an interdisciplinary background -- someone trained in police science, law and legal analysis, organizational behavior, press relations, business management and computer information systems. Also, because we live in a globally connected society, experts need to know world geography, comparative politics, and current events. English and communication .that kind of cash - someone quick, thoughtful, responsive, and sure of themselves.

Managing a computer system is an unique responsibility, full of surprises. ANYONE or ANYTHING can be the target or instigator, although 85% of your security violations will be accounted for by insiders. It makes a difference if you're working for a government entity, a large, mid-size, or small corporation, a social service agency, or an educational institution. There are times in business when you don't want to call the police, because news of the break-in might devalue your company matter what type of organization. Only rarely do we hear of cases going to civil or criminal court. Digital evidence is the MOST EASILY altered, damaged, and hidden crime scene evidence. The perpetrators are some of the smartest, clever, and most wily people in the world. They don't leave calling cards or signatures, and they always cover their tracks. They always seem two steps ahead of security, and the best that can often be done is to profile the attack and count the damage done

All Engineering Department-Lecture Notes-Free Download-Given Below

Hosting by Yahoo!

About-Us    Contact-Us    Site-map

©copyright 2009 All rights are reserved to technicalsymposium.com