Computer Security And The Law

I. Introduction
You are a computer administrator for a large manufacturing company. In
the middle of a production run, all the mainframes on a crucial network grind to
a halt. Production is delayed costing your company millions of dollars. Upon
investigating, you find that a virus was released into the network through a
specific account. When you confront the owner of the account, he claims he
neither wrote nor released the virus, but he admits that he has distributed his
password to "friends" who need ready access to his data files. Is he liable for
the loss suffered by your company? In whole or in part? And if in part, for how
much? These and related questions are the subject of ...

Want to read the rest of this paper?
Join Essayworld today to view this entire essay
and over 50,000 other term papers

in the development of computer security law and
public policy. This paper is meant to help bridge to gap between technical and
legal computer security communities.


A. The Objectives of Computer Security

The principal objective of computer security is to protect and assure
the confidentiality, integrity, and availability of automated information
systems and the data they contain. Each of these terms has a precise meaning
which is grounded in basic technical ideas about the flow of information in
automated information systems.

B. Basic Concepts

There is a broad, top-level consensus regarding the meaning of most
technical computer security concepts. This is partly because of government
involvement in proposing, coordinating, and publishing the definitions of basic
terms[2]. The meanings of the terms used in government directives and
regulations are generally made to be consistent with past usage. This is not to
say that there is no ...

Get instant access to over 50,000 essays.
Write better papers. Get better grades.

Already a member? Login

said to be "comprised." Confidentiality is the most
advanced area of computer security because the U.S. Department of Defense has
invested heavily for many years to find way to maintain the confidentiality of
classified data in AIS [4]. This investment has produced the Department of
Defense trusted computer system evaluation criteria[5], alternatively called
the Orange Book after the color of it's cover. The orange book is perhaps the
single most authoritative document about protecting the confidentiality of data
in classified AIS.

Integrity measures are meant to protect data form unauthorized
modification. The integrity of an object can be assessed by comparing it's
current ...

Succeed in your coursework without stepping into a library.
Get access to a growing library of notes, book reports,
and research papers in 2 minutes or less.


Computer Security And The Law. (2004, September 24). Retrieved March 19, 2019, from
"Computer Security And The Law.", 24 Sep. 2004. Web. 19 Mar. 2019. <>
"Computer Security And The Law." September 24, 2004. Accessed March 19, 2019.
"Computer Security And The Law." September 24, 2004. Accessed March 19, 2019.
Join today and get instant access to this and 50,000+ other essays

Added: 9/24/2004 06:20:32 PM
Category: Computers
Type: Premium Paper
Words: 4533
Pages: 17

Save | Report


Save and find your favorite essays easier

Network Security And Firewalls
What To Do?: Terrorism And The ...
Euthanasia And The Law
Cyberspace And The American Dre...
Social Security In The Future? ...
Internet Security
The Autumn And The Fall Of Leav...
COMPUTER CRIME Hackers And Secu...
The Necessity Of Computer Secur...
Security, Commerce And The Int
Copyright | Cancel | Contact Us

Copyright © 2019 Essayworld. All rights reserved