Computer Security, Importance and Scope in Organizations

被引:0
作者
Garcia Choque, Lucio [1 ]
Galindos Izaguirre, Luis Jando [2 ]
Flores Canterac, Joel Arturo [1 ]
Ogosi Auqui, Jose Antonio [1 ]
Cano Chuqui, Jorge [3 ]
机构
[1] Univ Privada San Juan Bautista, Lima, Peru
[2] Univ Privada San Juan Bautista, Chincha, Peru
[3] Univ Privada Cesar Vallejo, Lima, Peru
来源
INTELLIGENT SUSTAINABLE SYSTEMS, WORLDS4 2022, VOL 2 | 2023年 / 579卷
关键词
Computer security; Confidentiality; Authentication; Integrity; Availability and audits;
D O I
10.1007/978-981-19-7663-6_49
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The globalization of the economy has required companies to implement technology platforms that support the new way of doing business. The use of the Internet for this purpose leads to the development of computer security projects that guarantee the integrity, availability and accessibility of information. The creation of security policies is a fundamental task that involves the company's people, processes and resources. Information security allows organizations to protect their financial resources, information systems, reputation, legal status and other tangible and intangible assets. The main objective of this work is to develop a simulation model that allows evaluating the optimal level of security that society and organizations should have considering aspects related to risk reduction and obtaining business benefits.
引用
收藏
页码:521 / 529
页数:9
相关论文
共 50 条
  • [21] 'DNA-proofing' for computer systems - a new approach to computer security?
    Louwrens, CP
    Von Solms, SH
    INFORMATION SECURITY FOR GLOBAL INFORMATION INFRASTRUCTURES, 2000, 47 : 121 - 129
  • [22] Design of a Computer Security Teaching and Research Laboratory
    Duffany, Jeffrey L.
    Cuz, Afredo
    SIGCSE 12: PROCEEDINGS OF THE 43RD ACM TECHNICAL SYMPOSIUM ON COMPUTER SCIENCE EDUCATION, 2011, : 678 - 678
  • [23] Invisible watchmen: Network administrators and computer security
    Chateauraynaud, Francis
    Trabal, Patrick
    ANNALS OF TELECOMMUNICATIONS, 2007, 62 (11-12) : 1293 - 1311
  • [24] Computer security model for a public connection medium
    Carrion-Barco, Gilberto
    Sanchez-Chero, Manuel-Jesus
    Del Castillo Castro, Consuelo Ivonne
    Campos Flores, Freddy William
    Timana Alvarez, Marcos
    REVISTA DE LA UNIVERSIDAD DEL ZULIA, 2021, 12 (32): : 344 - 357
  • [25] Why Teach Computer Security to Medical Students?
    Ferreira, Ana M.
    Cruz-Correia, Ricardo
    Costa-Pereira, Altamiro
    MEDINFO 2007: PROCEEDINGS OF THE 12TH WORLD CONGRESS ON HEALTH (MEDICAL) INFORMATICS, PTS 1 AND 2: BUILDING SUSTAINABLE HEALTH SYSTEMS, 2007, 129 : 1469 - 1470
  • [26] Lessons Learned on Machine Learning for Computer Security
    Arp, Daniel
    Quiring, Erwin
    Pendlebury, Feargus
    Warnecke, Alexander
    Pierazzi, Fabio
    Wressnegger, Christian
    Cavallaro, Lorenzo
    Rieck, Konrad
    IEEE SECURITY & PRIVACY, 2023, 21 (05) : 72 - 77
  • [27] The Clifford Paterson Lecture, 2002 computer security?
    Needham, R
    PHILOSOPHICAL TRANSACTIONS OF THE ROYAL SOCIETY OF LONDON SERIES A-MATHEMATICAL PHYSICAL AND ENGINEERING SCIENCES, 2003, 361 (1808): : 1549 - 1555
  • [28] Automatic Challenge Generation for Teaching Computer Security
    Ladeira, Ricardo de la Rocha
    Obelheiro, Rafael R.
    2018 XLIV LATIN AMERICAN COMPUTER CONFERENCE (CLEI 2018), 2018, : 774 - 783
  • [29] STATISTICAL ANALYSIS OF SECURITY ATTRIBUTES OF COMPUTER SYSTEMS
    Jozwiak, Ireneusz J.
    Laskowski, Wojciech
    INTERNATIONAL JOURNAL OF RELIABILITY QUALITY & SAFETY ENGINEERING, 2007, 14 (06) : 569 - 577
  • [30] Building an Active Computer Security Ethics Community
    Dittrich, David
    Bailey, Michael
    Dietrich, Sven
    IEEE SECURITY & PRIVACY, 2011, 9 (04) : 32 - 40