IRMA-International.org: Creator of Knowledge
Information Resources Management Association
Advancing the Concepts & Practices of Information Resources Management in Modern Organizations

Understanding Computer Security

Understanding Computer Security
View Sample PDF
Author(s): Steve Brown (Capella University, USA)
Copyright: 2008
Pages: 7
Source title: Encyclopedia of Information Technology Curriculum Integration
Source Author(s)/Editor(s): Lawrence A. Tomei (Robert Morris University, USA)
DOI: 10.4018/978-1-59904-881-9.ch144

Purchase

View Understanding Computer Security on the publisher's website for pricing and purchasing information.

Abstract

During the last several years a great deal has been written in academic and trade journals that has focused on security. There are several different terms often used, but the following—information security (InfoSec), computer security, and information assurance—are typically meant to be the same, that is, the protection of data, although information assurance is also expanded to include aspects such as personnel, plant, and equipment. While one main theme that has been written has been to improve the effectiveness and understanding of security, apply the various security concepts learned and understand the technologies developed, it is important to recognize that computer security may take on different meanings, dependent on the context that it is being discussed. Computer security is a very large field, and one that is often misunderstood. When we discuss computer security, are we discussing our personal computer at work or home? Are we discussing portable devices, such as mobile devices like Blackberries, PDAs, or laptops? Are we discussing security laws and regulations that might impact the safeguard of personal information, or could we be discussing, designing, and implementing, a risk-based security plan for an organization? It is therefore difficult to discuss computer security unless it is discussed in a frame of reference. Therefore, this paper will discuss some of the issues and concerns of computer security in different frames of reference, and the importance of teaching security with that focus in mind.

Related Content

Jessica A. Manzone, Julia L. Nyberg. © 2024. 22 pages.
Angela Marie Novak, Brittany N. Anderson. © 2024. 27 pages.
Lucy K. Hunt, Erin Yoshida-Ehrmann. © 2024. 20 pages.
Angela Marie Novak. © 2024. 36 pages.
Lynne F. Henwood. © 2024. 19 pages.
Sean Doyle. © 2024. 20 pages.
Nyree D. Clark. © 2024. 26 pages.
Body Bottom