Warning: Use of undefined constant referer - assumed 'referer' (this will throw an Error in a future version of PHP) in /usr/home/essaywo/public_html/essays on line 102

Warning: Use of undefined constant host - assumed 'host' (this will throw an Error in a future version of PHP) in /usr/home/essaywo/public_html/essays on line 105

Warning: Cannot modify header information - headers already sent by (output started at /usr/home/essaywo/public_html/essays:102) in /usr/home/essaywo/public_html/essays on line 106

Warning: Cannot modify header information - headers already sent by (output started at /usr/home/essaywo/public_html/essays:102) in /usr/home/essaywo/public_html/essays on line 109
Computer Security And The Law - School Essays

Computer Security And The Law


I. Introduction
You are a computer administrator for a large manufacturing company. In
the middle of a production run, all the mainframes on a crucial network grind to
a halt. Production is delayed costing your company millions of dollars. Upon
investigating, you find that a virus was released into the network through a
specific account. When you confront the owner of the account, he claims he
neither wrote nor released the virus, but he admits that he has distributed his
password to "friends" who need ready access to his data files. Is he liable for
the loss suffered by your company? In whole or in part? And if in part, for how
much? These and related questions are the subject of ...

Want to read the rest of this paper?
Join Essayworld today to view this entire essay
and over 50,000 other term papers

in the development of computer security law and
public policy. This paper is meant to help bridge to gap between technical and
legal computer security communities.

II. THE TECHNOLOGICAL PERSPECTIVE

A. The Objectives of Computer Security

The principal objective of computer security is to protect and assure
the confidentiality, integrity, and availability of automated information
systems and the data they contain. Each of these terms has a precise meaning
which is grounded in basic technical ideas about the flow of information in
automated information systems.

B. Basic Concepts

There is a broad, top-level consensus regarding the meaning of most
technical computer security concepts. This is partly because of government
involvement in proposing, coordinating, and publishing the definitions of basic
terms[2]. The meanings of the terms used in government directives and
regulations are generally made to be consistent with past usage. This is not to
say that there is no ...

Get instant access to over 50,000 essays.
Write better papers. Get better grades.


Already a member? Login

said to be "comprised." Confidentiality is the most
advanced area of computer security because the U.S. Department of Defense has
invested heavily for many years to find way to maintain the confidentiality of
classified data in AIS [4]. This investment has produced the Department of
Defense trusted computer system evaluation criteria[5], alternatively called
the Orange Book after the color of it's cover. The orange book is perhaps the
single most authoritative document about protecting the confidentiality of data
in classified AIS.

Integrity measures are meant to protect data form unauthorized
modification. The integrity of an object can be assessed by comparing it's
current ...

Succeed in your coursework without stepping into a library.
Get access to a growing library of notes, book reports,
and research papers in 2 minutes or less.


CITE THIS PAGE:

Computer Security And The Law. (2004, September 24). Retrieved April 23, 2024, from http://www.essayworld.com/essays/Computer-Security-And-The-Law/14874
"Computer Security And The Law." Essayworld.com. Essayworld.com, 24 Sep. 2004. Web. 23 Apr. 2024. <http://www.essayworld.com/essays/Computer-Security-And-The-Law/14874>
"Computer Security And The Law." Essayworld.com. September 24, 2004. Accessed April 23, 2024. http://www.essayworld.com/essays/Computer-Security-And-The-Law/14874.
"Computer Security And The Law." Essayworld.com. September 24, 2004. Accessed April 23, 2024. http://www.essayworld.com/essays/Computer-Security-And-The-Law/14874.
JOIN NOW
Join today and get instant access to this and 50,000+ other essays


PAPER DETAILS
Added: 9/24/2004 06:20:32 PM
Category: Computers
Type: Premium Paper
Words: 4533
Pages: 17

Save | Report

SHARE THIS PAPER

SAVED ESSAYS
Save and find your favorite essays easier

SIMILAR ESSAYS
» COMPUTER CRIME Hackers And Secu...
» Computer Crime In The 1990's
» Internet, Its Effects In Our Li...
» Computer Security
» Computer Crime
» Money And Information
» Money And Information
» The Computer Underground.
» The Computer Underground
» The Necessity Of Computer Secur...
Copyright | Cancel | Contact Us

Copyright © 2024 Essayworld. All rights reserved