Computer Security, Importance and Scope in Organizations

被引:0
作者
Garcia Choque, Lucio [1 ]
Galindos Izaguirre, Luis Jando [2 ]
Flores Canterac, Joel Arturo [1 ]
Ogosi Auqui, Jose Antonio [1 ]
Cano Chuqui, Jorge [3 ]
机构
[1] Univ Privada San Juan Bautista, Lima, Peru
[2] Univ Privada San Juan Bautista, Chincha, Peru
[3] Univ Privada Cesar Vallejo, Lima, Peru
来源
INTELLIGENT SUSTAINABLE SYSTEMS, WORLDS4 2022, VOL 2 | 2023年 / 579卷
关键词
Computer security; Confidentiality; Authentication; Integrity; Availability and audits;
D O I
10.1007/978-981-19-7663-6_49
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The globalization of the economy has required companies to implement technology platforms that support the new way of doing business. The use of the Internet for this purpose leads to the development of computer security projects that guarantee the integrity, availability and accessibility of information. The creation of security policies is a fundamental task that involves the company's people, processes and resources. Information security allows organizations to protect their financial resources, information systems, reputation, legal status and other tangible and intangible assets. The main objective of this work is to develop a simulation model that allows evaluating the optimal level of security that society and organizations should have considering aspects related to risk reduction and obtaining business benefits.
引用
收藏
页码:521 / 529
页数:9
相关论文
共 50 条
  • [41] Ethically-social approach to computer security problem
    Cetnarowicz, K
    Rojek, G
    COMPUTING AND INFORMATICS, 2005, 24 (04) : 351 - 370
  • [42] Empiracal study of students' computer security practices/perceptions
    Teer, Faye P.
    Kruck, S. E.
    Kruck, Gregory P.
    JOURNAL OF COMPUTER INFORMATION SYSTEMS, 2007, 47 (03) : 105 - 110
  • [43] Developing a Mental Model for use in the Context of Computer Security
    Liljestrand, Isaiah
    Gonzales, Marcelo
    Shin, Dongwan
    SAC '19: PROCEEDINGS OF THE 34TH ACM/SIGAPP SYMPOSIUM ON APPLIED COMPUTING, 2019, : 2336 - 2339
  • [44] Understanding users' keystroke patterns for computer access security
    Guven, A
    Sogukpinar, I
    COMPUTERS & SECURITY, 2003, 22 (08) : 695 - 706
  • [45] Using Nature to best Clarify Computer Security and Threats
    Oreku, George S.
    Mtenzi, Fredrick J.
    EIGHTH IEEE INTERNATIONAL CONFERENCE ON DEPENDABLE, AUTONOMIC AND SECURE COMPUTING, PROCEEDINGS, 2009, : 702 - 707
  • [46] Factors Influencing College Students' Use of Computer Security
    Pendegraft, Norman
    Rounds, Mark
    Stone, Robert W.
    INTERNATIONAL JOURNAL OF INFORMATION SECURITY AND PRIVACY, 2010, 4 (03) : 51 - 60
  • [47] Towards a Robust Computer Security Layer for the LIN Bus
    Paez, Felipe
    Kaschel, Hector
    2021 IEEE IFAC INTERNATIONAL CONFERENCE ON AUTOMATION/XXIV CONGRESS OF THE CHILEAN ASSOCIATION OF AUTOMATIC CONTROL (IEEE IFAC ICA - ACCA2021), 2021,
  • [48] Computer Security Incident Response Team Development and Evolution
    Ruefl, Robin
    Dorofee, Audrey
    Mundie, David
    Householder, Allen D.
    Murray, Michael
    Perl, Samuel J.
    IEEE SECURITY & PRIVACY, 2014, 12 (05) : 16 - 26
  • [49] Research on Computer Security Focus and Its Key Technologies
    Wang, Miao
    2018 4TH INTERNATIONAL CONFERENCE ON EDUCATION, MANAGEMENT AND INFORMATION TECHNOLOGY (ICEMIT 2018), 2018, : 568 - 571
  • [50] Design and Testing of a Computer Security Layer for the LIN Bus
    Paez, Felipe
    Kaschel, Hector
    SENSORS, 2022, 22 (18)