Programming
Computer security

computer security

New England College

Question Description

1) In 500 words or more, discuss the risk and costs of compromised data integrity breaches. Focus on integrity not confidentiality. Look at military, education, science, medicine, finance, utilities, municipalities, etc.

Use at least three sources. Use the Research Databases available from the Danforth Library, not Google. Include at least 3 quotes from your sources enclosed in quotation marks and cited in-line by reference to your reference list. Example: "words you copied" (citation) These quotes should be one full sentence not altered or paraphrased. Cite your sources using APA format. Use the quotes in your paragaphs.

Write in essay format not in bulleted, numbered or other list format.

Reply to two classmates' posting in a paragraph of at least five sentences by asking questions, reflecting on your own experience, challenging assumptions, pointing out something new you learned, offering suggestions.

part2:

Use an example from the news.

Include at least one quote from each of 3 different articles, place the words you copied (do not alter or paraphrase the words) in quotation marks and cite in-line (as all work copied from another should be handled). The quotes should be full sentences (no more, less) and should be incorporated in your discussion (they do not replace your discussion) to illustrate or emphasize your ideas.

Cite your sources in a clickable reference list at the end. Do not copy without providing proper attribution (quotation marks and in-line citations). Write in essay format not in bulleted, numbered or other list format.


2) Please write about 300 words on the following question.

Using the Web or other resources, find out what your states,laws are regarding cyber stalking.

Write a brief essay describing those laws and what they mean.

Read and respond to at least two other students Discussions.

Instructions: Do not use spinbot or other word replacement software. Proof read your work or have it edited. Find something interesting and/or relevant to your work to write about.

Final Answer

Attached.

Running head: COMPUTER SECURITY

1

Computer Security
Name
Institution

COMPUTER SECURITY

2
COMPUTER SECURITY

A computer security breach is a harmful activity that many organizations have witnessed across
the globe. Evaluating the loss and risks due to security breach cannot be realistic and
understandable enough. The price tag of data loss and damage is beyond the grief of calculations
for many organizations. The effects of compromised data can be severe to the extent of shutting
down a business—the causes of security breach range from an intentional and unintentional human
error to technical dysfunction. The most common trend in data compromise is the interference,
exposure, or loss of an organization's information system. These aspects are significant actions of
hackers. Their interference with the information system of an organization leaves negative impacts
on the integrity of the information. The problem is more of a nightmare to organizations dealing
with databases for business. However, all organizations virtually deal with data, especially for
business analysis (Wong, 2013). Organizations should, therefore, be keen to protect their
information against intruders.
Robust and reliable information that an organization has can be a good boost in terms of nationality
advantage from its external threats and competitors. Exposure and breach of confidential
information tear the organization apart and leaves it vulnerable and susceptible to competition.
Competition can be useful to organizations because it makes them apply more effort to get
relevance. However, competition resulting from compromised data of an organization is deadly
(Kashmiri et al., 2016). It means that the victim organization will lose customers and its reputation.
Competition for such an organization will mean lowering prices and investing in unplanned
ventures to get back to the initial status. Information breaches can lead to leakage of vital business
strategies that business rivals can use to bring unfair competition.

COMPUTER SECURITY

3

Companies and organizations that deal with and rely on data can suffer in several ways. The first
and perhaps the most obvious way is the loss of customers. Organizations like banks and other
financial institutions deal with classified and confidential information of individual customers.
When the clients realize that their personal information is under compromise through a bank
information system, they cannot stay and watch the drama; they will look for better and secure
bank services from other institutions. In the end, the victim organization will suffer the loss of
customers to other organizations. Customer loss ultimately results in a bad reputation for a
company and low revenue. The organization is likely to undergo a financial crisis because no
customer will be willing to risk his or her personal information.
Compromised data security in an organization always occurs due to external intrusion. Some
organizations realize data breach after a system hitch or detecting irregularities in their financial
statements. It is already clear that information loss and interference result in a lot of expenses for
an organization. The surface costs like compensation and like are but a small portion of the costs.
Organizations spend enormous amounts of money on investigating and catching up with hackers.
The legal fees are an additional cost that comes up when bringing the culprits to justice.
Organizations also have to pay regulatory fees and fines. To continue with business as usual, the
victim organization has to invest in the new and perhaps more sophisticated information security
system as a form of compliance. All these measures come at high costs.
Cyberstalking Legislation
Cyberstalking is a pretty new term that is yet to get a universal definition. Many organizations,
however, have a joint base of the idea around cyberstalking. It is typically the stealth approach or
pursues a person using technology to reach their confidential information. The objective behind
cyberstalking is mostly to intimidate and thre...

Paulidavo (11100)
Duke University

Anonymous
Solid work, thanks.

Anonymous
The tutor was great. I’m satisfied with the service.

Anonymous
Goes above and beyond expectations !

Studypool
4.7
Trustpilot
4.5
Sitejabber
4.4
Similar Questions
Related Tags

Brown University





1271 Tutors

California Institute of Technology




2131 Tutors

Carnegie Mellon University




982 Tutors

Columbia University





1256 Tutors

Dartmouth University





2113 Tutors

Emory University





2279 Tutors

Harvard University





599 Tutors

Massachusetts Institute of Technology



2319 Tutors

New York University





1645 Tutors

Notre Dam University





1911 Tutors

Oklahoma University





2122 Tutors

Pennsylvania State University





932 Tutors

Princeton University





1211 Tutors

Stanford University





983 Tutors

University of California





1282 Tutors

Oxford University





123 Tutors

Yale University





2325 Tutors