Computer Security.
Date Submitted: 12/16/2004 18:13:21
As governments, organizations, and individuals increasingly rely on desktop, and laptop computers, other connected devices (handheld, smart phone, Blackberry, etc) and the Internet they lose control of the information processing that was present in the traditional data center. As the control of computing information moves to the personal computer and remote sites via networking, it is essential that managers understand the threats to this information and create security plans that will meet this new challenge.
Is this Essay helpful? Join now to read this particular paper
and access over 480,000 just like this GET BETTER GRADES
and access over 480,000 just like this GET BETTER GRADES
Online December 5, 2002 < http://news.com.com/2100-1023-208562.html?tag=rn >
3.The Department of Homeland Security. "Information Analysis and Infrastructure Protection." The White House. Online December 5, 2002 <http://www.whitehouse.gov/deptofhomeland/sect6.html>
4.The Sans Institute." How to Eliminate the Ten Most Critical Internet Security Threats, The Experts' Consensus." Sans Institute. June 25, 2001. Online December 5, 2002 <http://www.sans.org/topten.htm>
5.Purpura P. Philip. Security and Loss Prevention. Butterworth-Heinemann, 1998. (373-375).
Need a custom written paper? Let our professional writers save your time.