Computer Security, Importance and Scope in Organizations

被引:0
作者
Garcia Choque, Lucio [1 ]
Galindos Izaguirre, Luis Jando [2 ]
Flores Canterac, Joel Arturo [1 ]
Ogosi Auqui, Jose Antonio [1 ]
Cano Chuqui, Jorge [3 ]
机构
[1] Univ Privada San Juan Bautista, Lima, Peru
[2] Univ Privada San Juan Bautista, Chincha, Peru
[3] Univ Privada Cesar Vallejo, Lima, Peru
来源
INTELLIGENT SUSTAINABLE SYSTEMS, WORLDS4 2022, VOL 2 | 2023年 / 579卷
关键词
Computer security; Confidentiality; Authentication; Integrity; Availability and audits;
D O I
10.1007/978-981-19-7663-6_49
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The globalization of the economy has required companies to implement technology platforms that support the new way of doing business. The use of the Internet for this purpose leads to the development of computer security projects that guarantee the integrity, availability and accessibility of information. The creation of security policies is a fundamental task that involves the company's people, processes and resources. Information security allows organizations to protect their financial resources, information systems, reputation, legal status and other tangible and intangible assets. The main objective of this work is to develop a simulation model that allows evaluating the optimal level of security that society and organizations should have considering aspects related to risk reduction and obtaining business benefits.
引用
收藏
页码:521 / 529
页数:9
相关论文
共 50 条
  • [31] Automatic security policy enforcement in computer systems
    Adi, Kamel
    Hamza, Lamia
    Pene, Liviu
    COMPUTERS & SECURITY, 2018, 73 : 156 - 171
  • [32] Built-in Security Computer: Deploying Security-First Architecture Using Active Security Processor
    Meng, Dan
    Hou, Rui
    Shi, Gang
    Tu, Bibo
    Yu, Aimin
    Zhu, Ziyuan
    Jia, Xiaoqi
    Wen, Yu
    Yang, Yun
    IEEE TRANSACTIONS ON COMPUTERS, 2020, 69 (11) : 1571 - 1583
  • [33] Computer Security Competitions: Expanding Educational Outcomes
    Eagle, Chris
    IEEE SECURITY & PRIVACY, 2013, 11 (04) : 69 - 71
  • [34] Implementation of computer security at nuclear facilities in Germany
    Lochthofen, Andre
    Sommer, Dagmar
    PROGRESS IN NUCLEAR ENERGY, 2015, 84 : 103 - 107
  • [35] The balancing act between computer security and convenience
    Ektare, Mayuresh
    Yang, Yanxia
    HUMAN-COMPUTER INTERACTION, PT 1, PROCEEDINGS: INTERACTION DESIGN AND USABILITY, 2007, 4550 : 731 - +
  • [36] Why Computer Security Courses Are Failing in Community Colleges and the Pitfalls to Avoid: A Retrospect of Seven Years of Being a Computer Security Educator
    Basham, Matt
    JOURNAL OF APPLIED SECURITY RESEARCH, 2007, 2 (04) : 55 - 64
  • [37] The Computer Security of Public/Open Computer Spaces: Feedback of a Field Study in Europe
    Filiol, Eric
    PROCEEDINGS OF THE 10TH EUROPEAN CONFERENCE ON INFORMATION WARFARE AND SECURITY, 2011, : 106 - 112
  • [38] Computer Crimes, Computer Security and Computer Law: Phenomenon's Dynamics Notes from the Russian Chair of Computer Law
    Baturin, Yuri
    2017 INTERNATIONAL WORKSHOP ON ENGINEERING TECHNOLOGIES AND COMPUTER SCIENCE (ENT), 2017, : 3 - 7
  • [39] Dealing with the complexities when implementing information security practices in healthcare organizations
    Gottberg, Heitor
    Pisa, Ivan Torres
    HEALTHINF 2008: PROCEEDINGS OF THE FIRST INTERNATIONAL CONFERENCE ON HEALTH INFORMATICS, VOL 1, 2008, : 205 - 208
  • [40] Human errors and violations in computer and information security: The viewpoint of network administrators and security specialists
    Kraemer, Sara
    Carayon, Pascale
    APPLIED ERGONOMICS, 2007, 38 (02) : 143 - 154