Data and computer systems require absolute protection against intervention or alienation. With this, the term computer security was coined, defined as the branch of information security dealing with computers. Protection may very from theft or corruption, more specifically on the preservation of availability as described in security policy. There are instances that the user requests for an information that he might not regard as sensitive, or the faulty manager releases information outside the bounds of the requested information.The implementation covers limitations on physical access, development of hardware mechanisms that would entail control over computer programs, as to preclude dependence on computer programs for security assurance, and parameters to consider choosing which programs would be allowed to enter the system.
(Pfleeger and Pfleeger, 2003, p. 329). Computer security protocols are diffi
...cult to attain because of the complexity of data and the determination of mode of protection. It can be understood more in the case of selectivity: there might be information insensitive for sharing.
This is what precision is all about. This is experienced in a situation that involves revealing the data without having to disclose the identity of the individuals being the source of the information. Examples of which are information pertaining to grades of students who were identified as drug users and the statistical data demonstrating the list of salaries of men and women. The aim of being precise in the information being released is to protect all sensitive data and at the same time exposing as much non-sensitive data as possible (Pfleeger and Pfleeger, p. 30).Maintenance of perfect confidentiality with maximum precision is accomplished by the ideal combination of security and precision.
To take i
more simply, the data being disclosed are all and only the non-sensitive data. The queries can be filtered, and with this, the completion of the task is safe, rendering the needs of the users without sacrificing the privacy contained in the information database (Pfleeger and Pfleeger, p. 331).
- Computer File essays
- Desktop Computer essays
- Servers essays
- Internet Privacy essays
- Cyber Security essays
- Camera essays
- Cell Phones essays
- Computer essays
- Ipod essays
- Smartphone essays
- Data Management essays
- Enterprise Resource Planning essays
- John Locke essays
- 9/11 essays
- A Good Teacher essays
- A Healthy Diet essays
- A Modest Proposal essays
- A&P essays
- Academic Achievement essays
- Achievement essays
- Achieving goals essays
- Admission essays
- Advantages And Disadvantages Of Internet essays
- Alcoholic drinks essays
- Ammonia essays
- Analytical essays
- Ancient Olympic Games essays
- APA essays
- Arabian Peninsula essays
- Argument essays
- Argumentative essays
- Art essays
- Atlantic Ocean essays
- Auto-ethnography essays
- Autobiography essays
- Ballad essays
- Batman essays
- Binge Eating essays
- Black Power Movement essays
- Blogger essays
- Body Mass Index essays
- Book I Want a Wife essays
- Boycott essays
- Breastfeeding essays
- Bulimia Nervosa essays
- Business essays
- Business Process essays
- Canterbury essays
- Carbonate essays
- Catalina de Erauso essays