StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Computer Security Problems and Measures - Case Study Example

Cite this document
Summary
The paper 'Computer Security Problems and Measures' is a great example of an Information Technology Case Study. In the modern world, people and businesses depend on software to perform numerous important functions; software enables systems and machines to work in all sectors of the world economy. As a result, software licenses have become very important. …
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER94.1% of users find it useful

Extract of sample "Computer Security Problems and Measures"

COMPUTER SECURITY PROBLEMS AND MEASURES by Student’s Name Code + Course Name Professor University City/State Date Computer Security Problems and Measures Executive Summary This paper assesses whether software licensing is antisocial, whether computer security problems can be solved by ethical teachings, and whether incidences of computer fraud can be reduced by the removal of computer security measures. Software licensing is not antisocial; although it restricts the distribution of a program and hence harmful to the society overall, its benefits outweigh its drawbacks. It enables key developments in the society and thus it does not cause significant harm to the society. Ethical teaching is one of the solutions to computer security problems; however, it is not sufficient to address them sufficiently. There are many types of security problems and different strategies are crucial in addressing them sufficiently. Ethical teachings would only reduce and not eliminate such security incidents. Removal of computer security would not reduce the incidence of computer fraud. It would increase the weakness in a security and this would allow attackers to easily breach the integrity of a system. Security measures play an important function of deterring and preventing computer crime and fraud and thus should not be removed. Table of Contents Introduction 3 Is Software Licensing Antisocial? 4 Is ethical teaching the solution to computer security problems? 6 Would the removal of computer security measures reduce the incidence of computer fraud? Why or why not? 7 Conclusion 8 Reference List 10 Introduction In the modern world, people and businesses depend on softwares to perform numerous important functions; softwares enable systems and machines to work in all sectors of the world economy. As a result, software licenses have become very important; they serve as agreements that grant the right to use software codes to other people. Most pieces of softwares come with licenses that stipulate what the user can and cannot do with it (Comino & Manenti 2011). It is considered an important means of improving computer security; however, it has led to various problems such as sluggish response time, user antagonism, as well as reduced performance. Some scholars have argued that software licensing is antisocial because it prohibits technology growth by keeping information from other people. This paper will analyze whether software licensing is antisocial, whether computer security problems can be solved by ethical teachings, and whether incidences of computer fraud can be reduced by the removal of computer security measures. Is Software Licensing Antisocial? Software licensing has both its benefits and drawbacks. Companies and individuals spend a lot of money selling user rights to software as well as related services. Hence, the different types of software licenses are increasingly becoming important for both IT firms and their customers. On one hand, these licenses encourage the development of better and novel ideas through protecting the undertakings of firms seeking to come up with new software products that will offer them a competitive advantage in the market and/or increased profits. Most companies spend money and time to develop new technologies due to the financial rewards that come with it. If there were no licenses to help businesses safeguard their investments through licensing the software to other people, it would not be easy for them to obtain financial incentives for their endeavors in the research and development of new softwares. There would be no new and better technologies without such incentives and hence economic systems would fail, as there would be limited or no new softwares to develop new products to meet customer needs. On the other hand, licenses take away people and businesses freedom to share and change the works; it curtails the freedom to change and share versions of a software program. The software is not free to user for all the users. Some software manufacturers sell the software using the terms they wish or can negotiate; usually, perpetual, one year, and three years terms. This means that once the term of the right to use the software expires, new software has to be procured or license term renewed unless the software is no longer needed (Allen, Doyle, Lehr, and Fisher 2011). Free software available to all people would foster new ideas. From an ethical point of view, licensing software is harmful as it restricts the distribution of a program and hence harmful to the society overall. Stallman (2014) noted that material harm results from software licensing as fewer people use the programs; the users cannot fix or adapt the program and other developers cannot base new work or learn from the program. Each of these levels of material harm has an associated form of psychological harm. The benefits of software licensing outweigh its drawbacks. Free software would curtail economic and social development as there would be fewer programmers due to the lack of financial incentive and motivation to come up with new softwares; this would be bad for the society as it would restrict development of new products and services which would in turn have a negative impact on their livelihood. This shows that although software licensing restricts sharing of program and information with neighbors, it plays a key role in various developments in the society and hence it is not very harmful to the society. Is ethical teaching the solution to computer security problems? Proper ethical teaching can help to solve most security problems. Nevertheless, no single approach offers a complete solution to the issue of computer abuse and fraud and hence proper ethical teaching is not sufficient to help address the problems. Computer security problems take many forms such as hacking or unauthorized use of and access of networks, server, systems, and data, illegal use of network for illegal activities, spreading computer viruses, NetID password theft, and computer comprise among others. These problems require different strategies for addressing them and not just proper ethical teachings. Ethical and social concerns arise in computer security and computer crime, creation of viruses and computer hacking, software theft and intellectual property rights, invasion of privacy, computer and information system failure, workplace computerization, and social implications of artificial intelligence and expert systems (Johnson & Miller 2009). Unethical actions usually take place within the context of these categories and it has a negative impact on the society. Proper ethical teachings would serve to only reduce but not rid of such security incidents. Ruighaver, Maynard and Warren (2010, p 732) noted that “the use of ethics in information systems and information security has two purposes: to identify criteria between good and bad and to promote good desires over bad ones.” Putting in place good security measure helps to prevent loss of data, productivity, and money, prevents identity theft and ensures that only authorized people use the networks. The solution to security problems also entails using strong passwords, anti-virus and anti-spyware softwares, logging off public computers, using more secure web browsers, and using firewalls. Nonetheless, new viruses or malicious attacks are introduced every time these security products prevent a virus or a malicious attack. Although not adequate in addressing computer security problems and cannot influence all people to act in an ethical manner in computer, ethical teaching play a very important role compared to other roles. The teaching of ethical use of computer technology, as long as it takes, always leads to better security measures than other strategies (Kizza 2009). For without moral values and ethics, whatever trap people make, one of use will eventually make a better trap (Kizza 2009). Ethical teaching bestows individuals with moral principles that enable them to apply acceptable behavior while using computers. It encourages individuals not to use computers to harm other users, to respect copyright policies and laws, not to copyright software without the permission of the author, to use the internet ethically, not to access file without the owners’ permission, not to steal other people information, to respect others privacy, and to safeguard their use identity and passwords. The answer as to what is wrong or right on computer use depends on the system of ethics that individuals follow or their lack of (Dittrich, Bailey, and Dietrich 2011; Stahl, Eden & Jirotka et al 2014). There are people that disregard moral guidelines when using computers and information systems and hence engage in computer fraud comprising other people security. As a result, it is important to have other security measures in place. Would the removal of computer security measures reduce the incidence of computer fraud? Why or why not? Removal of computer security would not reduce the incidence of computer fraud. Although no security system is impenetrable, system security measures considerably reduce the chances for both unintentional and intentional threats. Lack of adequate security controls would increase incidence of fraud and theft. Removal would increase computer crimes as perpetrators would have sufficient motive, and they would be able to rationalize their dishonest actions. Security measures serve as access controls that restrict important and sensitive information in computers (Furnell & Thomson 2009). They prevent theft of important documents and electronic files with confidential data that ruin an individual or company. For instance, softwares that alert a business management in case of unauthorized access play a very crucial role in safeguarding important information. Removal of computer security measures increases the weakness in a computer system and this allows attackers to violate the integrity of a system. Such vulnerabilities may result from computer virus, weak passwords, software bugs, unchecked user input, and malwares (malicious softwares). Prevention such attacks depends on an individual and organization ability to identify and assess the risks to its systems and identify risks to the best level possible. Security measures help to detect security incidents rapidly, minimize loss and destruction, identity weaknesses, and restore IT operations rapidly. As a result, they play a crucial role in preventing computer fraud and hence should not be removed. Conclusion Computers have become very important in the modern era; they perform numerous important functions that improve the lives of people and enable businesses to make increased profits. Consequently, software licenses have become very important. Software licensing is not antisocial. From an ethical perspective, licensing software is harmful as it restricts the distribution of a program and hence harmful to the society overall, however the benefits of software licensing outweigh its drawbacks. Although software licensing restricts sharing of program and information with neighbors, it plays a key role in various developments in the society and hence it is not very harmful to the society. Proper ethical teaching can help to solve most security problems however; it is not adequate to help address the problems. Computer security problems take many forms and require different strategies for addressing them. Proper ethical teachings would serve to only reduce but not rid of such security incidents. Removal of computer security would not reduce the incidence of computer fraud. It would increase the weakness in a computer system and this would allow attackers to violate the integrity of a system. Security measures play a crucial role in preventing computer fraud and should not be removed. Recommendations Software licensing is not antisocial and hence their manufacturers or programmers should be allowed to license their programs and softwares as this promotes production of new and better ones. To encourage software sharing, they can use perpetual terms. Ethical teaching is one of the most important solutions to computer security problems and hence should be undertaken at the individual and business levels. Computer security measures should be increased to counter the numerous and increasing incidence of computer fraud. Reference List Allen, R, Doyle, J, Lehr,T & Fisher, W 2011, Reducing risk and maximizing investment through it asset management: a practitioner’s perspective, IT Asset Management, LLC. Comino, S & Manenti, F 2011, ‘Dual Licensing in Open Source Software Markets’, Information Economic and Policy, vol. 23, no. 3-4, pp, 234-242 Dittrich, D, Bailey, M & Dietrich, S2011, ‘Building an Active Computer Ethics Community’, IEEE Security & Privacy, vol. 9, no.4, pp. 32-40 Furnell, S & Thomson, K 2009, ‘From Culture to Disobedience: Recognizing the Varying User Acceptance of IT Security’, Computer Fraud & Security, vol. 2, pp. 5-10 Johnson, D & Miller, K 2009, Computers Ethics, Prentice-Hall. Kizza, J2009, Guide to Computer Network Security, New York: Springer-Verlag. Ruighaver, A, Maynard, S & Warren, M 2010, ‘Ethical Decision making: Improving the Quality of Acceptable Use Policies’, Computers & Security, vol. 29, no.7, pp. 731-736 Stahl, B, Eden, G, Jirotka, M & Coeckelbergh, M 2014, ‘From computer ethics to responsible research and innovation in ICT : The transition of reference discourses informing ethics- related research in information systems’, Information & Management, vol. 51, no. 6, pp. 810-818 Stallman, R 2014, Why Software should be Free? GNU Operating System, viewed September 9 2014, http://www.gnu.org/philosophy/shouldbefree.html Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(Computer Security Problems and Measures Case Study, n.d.)
Computer Security Problems and Measures Case Study. https://studentshare.org/information-technology/2070355-accounting-information-system-assignment-about-software-licensing-computer-security-etc
(Computer Security Problems and Measures Case Study)
Computer Security Problems and Measures Case Study. https://studentshare.org/information-technology/2070355-accounting-information-system-assignment-about-software-licensing-computer-security-etc.
“Computer Security Problems and Measures Case Study”. https://studentshare.org/information-technology/2070355-accounting-information-system-assignment-about-software-licensing-computer-security-etc.
  • Cited: 0 times

CHECK THESE SAMPLES OF Computer Security Problems and Measures

Computer Security or Ethical Issue

This research paper "computer security or Ethical Issue" shows that due to the amazing efficiency of a computer system, every business feels the need to utilize computer technology inside the business infrastructure to enhance its operational performance.... his paper presents a detailed overview of computer security.... This paper discusses how computer security has become an important issue for companies.... Introduction computer security can be perceived as the procedure of averting as well as identifying illegal exploitation of a company's computer system....
9 Pages (2250 words) Research Paper

Cyber Network Security, Threats, Risk, and Its Prevention

This dissertation "Cyber Network security, Threats, Risk, and Its Prevention" is about a crime that has created major concerns in the modern world with the greater advancements in the field of information technology, and the misuse being increased.... The rapid change in technology has significant effects on the everyday lives of humans influencing all the aspects of life such as medicine, commerce, education, and security.... However, considering the topic of information technology, the concern for security also arises to which it can be stated that the technology has both a good side as well as a bad side....
36 Pages (9000 words) Dissertation

Adoption of Computer Security

This report "Adoption of computer security" discusses computer security usage via the use of firewalls, anti-virus, offensive defense, and anti-spyware software applications.... Situation Analysis This project rolls out several ambitious although critical objectives that are directed towards laying out the central concepts for the current situations in regards to computer security of the stand-alone or interconnected devices; to come up with the best definitions that cover the logic encompassed by insecurity consequences over the unprotected computer systems; and the subsequent establishment of a set of foundations that the thereafter work can be built upon....
31 Pages (7750 words) Research Paper

Computer Security Licensing

The paper "computer security Licensing" states that generally, computer users should be taught on the varied solutions to computer problems.... Users should, therefore, be taught the various computer security measures such as encryption of computer software to prevent and reduce fraud and fraud-related acts.... Software licensing refers to all legal measures that govern the dispersion of software.... es, it is ethical and widely acknowledged learning the solutions to computer problems....
6 Pages (1500 words) Essay

Methods Available for Maintaining Computer System Security

Therefore, computer security is a must in every field.... computer security can be achieved in different ways such as by using an anti-malware program, by using cryptography technique to encrypt the data, and also various other methods.... Therefore, a total solution for any computer security system has to meet the three requirements like integrity, secrecy or confidentiality, and availability.... This separation can be achieved by involving three subproblems as a part of computer security i....
8 Pages (2000 words) Coursework

Computer Security

The paper gives detailed information about the computer security.... This paper presents a detailed overview of computer security.... This paper discusses how computer security has become an important issue for the companies.... In view of the fact that the word computer security is employed regularly; however, the framework of a computer system is defenseless to a number of threats except the system is linked with more computer systems using some sort of network arrangement....
9 Pages (2250 words) Research Paper

Effectiveness of Internet and Network Security Measures

The paper "Effectiveness of Internet and Network Security measures' is an excellent example of a research proposal on information technology.... The paper "Effectiveness of Internet and Network Security measures' is an excellent example of a research proposal on information technology.... In contrast, since malicious codes (external from the Internet) can go through any communication channel such as Internet websites, email, portable devices, and others, the most common network security measures employed are networking traffic filtering (Firewall), scanning incoming files by an anti-malware program, and user behavior modification....
9 Pages (2250 words) Research Proposal

Information Security - Risks, Security Plans, and Defensive Measures

As the paper "Information Security - Risks, Security Plans, and Defensive Measures" outlines, the aim of providing computer security may differ but it mostly entails protecting computer network information from corruption, hackers, theft, or its preservation.... This will depend entirely on security policy.... Network security enforces constraints on computers which vary from other systems requirements as they mostly are applied as restrictions on what a network is supposed to undertake....
14 Pages (3500 words) Essay
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us