Uploaded by joan kangiri

Computer Security and Information Security

advertisement
1
Week 1 Chapter 1 Assignment
Computer Security and Information Security
Student’s name
Institution
Couse
Date
2
What is the defining difference between computer security and information security?
Data is often more valuable than the hardware it is stored on, so it makes sense that
information security would be more concerned with protecting data than computer security.
However, both disciplines are important in keeping systems and data safe from harm. Information
security is a relatively new field, while computer security has been around for much longer. This
is due in part to the fact that computers have only become widely used in the last few decades. As
more and more businesses and individuals rely on computers, the need for information security
has grown (Van Oorschot 2020). Computer security was originally developed to protect military
and government systems, but it has since been adopted by the private sector as well.
There are many different techniques used in information security, such as encryption,
access control, data leakage prevention, and intrusion detection. These techniques are designed to
protect data from unauthorized access or modification. They can also be used to prevent data
breaches, which can lead to the loss of confidential information. Computer security is also
concerned with protecting systems from attacks. These attacks can come in the form of viruses,
worms, Trojans, and other malicious software. They can also come from hackers who try to gain
access to systems in order to steal data or disrupt operations. Both computer security and
information security are important disciplines that work to protect systems and data from
unauthorized access and attack. While they have different focus areas, they both play a vital role
in keeping information safe.
Why can we argue that information security is really an application of social science?
One of the key reasons why information security can be seen as an application of social
science is because a lot of the time, the weakest link in any security system is the human element.
No matter how strong or well-designed a security system may be, it can still be compromised if
3
people do not follow proper procedures or if they are careless with sensitive information
(Mamonov & Benbunan-Fich 2018).
This is where social science comes in, as it can help us to understand why people behave
the way they do and how it can influence their behavior to make them more security-conscious.
For example, through our understanding of human psychology, better training programs can be
designed that can teach people about information security risks and how to avoid them (Schinagl
& Shahim 2020). Alternatively, knowledge of social norms can be used to create campaigns that
encourage people to change their behavior in order to better protect themselves and others.
Ultimately, by taking a social science approach to information security, we can develop more
effective ways to protect our data and systems from being compromised.
3. A globally interconnected commercial world has emerged from the technical advances
that, created the Internet. Has its creation increased or decreased the need for organizations
to maintain secure operation of their systems? Why?
The rapid expansion of the internet has led to a more interconnected and globalized world,
where businesses and individuals are increasingly reliant on online systems and data. This has in
turn created a greater need for organizations to ensure the security of their operations and protect
against cyber threats (Schinagl & Shahim 2020). The ever-changing landscape of the internet
means that there are constantly new risks to consider, and organizations must be vigilant in order
to keep their systems secure. The need for security is only likely to increase in the future as the
internet continues to grow and evolve.
4
References
Mamonov, S., & Benbunan-Fich, R. (2018). The impact of information security threat awareness
on privacy-protective behaviors. Computers in Human Behavior, 83, 32-44.
Schinagl, S., & Shahim, A. (2020). What do we know about information security
governance?“From the basement to the boardroom”: towards digital security
governance. Information & Computer Security.
Van Oorschot, P. C. (2020). Computer Security and the Internet. Springer International
Publishing.
Download