1,464
10
Essay, 1 pages (150 words)

Identifying and exploring security essentials

Criminal laws have a more direct connection with the security profession than the civil laws. The world today faces many types of crimes in this age of the computer. The number of hackers driven by the urge to steal and embezzle funds is on the rise. In addition, computer crimes get more sophisticated with hackers working in organized groups to steal credit information, military secrets, funds, and information pertaining to personal identity. Due to the prevalence of such crimes, IT security professionals spend much time dealing with the criminal aspects of the legislation than civil issues.
Civil laws have limited connection to the security profession. It is because many civil cases concern intellectual property laws, which include trade secrets, trademarks, patents and copyrights. In several instances, these civil laws serve to protect the value of the corporation and other professional may handle them. The aspects governed by civil laws were vital before the computer age. However, they do not engage security experts intensely in the contemporary issues facing firms today. Therefore, the criminal aspects of the law directly touch on the security profession in the modern world of IT.

Thank's for Your Vote!
Identifying and exploring security essentials. Page 1
Identifying and exploring security essentials. Page 2

This work, titled "Identifying and exploring security essentials" was written and willingly shared by a fellow student. This sample can be utilized as a research and reference resource to aid in the writing of your own work. Any use of the work that does not include an appropriate citation is banned.

If you are the owner of this work and don’t want it to be published on AssignBuster, request its removal.

Request Removal
Cite this Essay

References

AssignBuster. (2022) 'Identifying and exploring security essentials'. 3 October.

Reference

AssignBuster. (2022, October 3). Identifying and exploring security essentials. Retrieved from https://assignbuster.com/identifying-and-exploring-security-essentials-essay-samples-2/

References

AssignBuster. 2022. "Identifying and exploring security essentials." October 3, 2022. https://assignbuster.com/identifying-and-exploring-security-essentials-essay-samples-2/.

1. AssignBuster. "Identifying and exploring security essentials." October 3, 2022. https://assignbuster.com/identifying-and-exploring-security-essentials-essay-samples-2/.


Bibliography


AssignBuster. "Identifying and exploring security essentials." October 3, 2022. https://assignbuster.com/identifying-and-exploring-security-essentials-essay-samples-2/.

Work Cited

"Identifying and exploring security essentials." AssignBuster, 3 Oct. 2022, assignbuster.com/identifying-and-exploring-security-essentials-essay-samples-2/.

Get in Touch

Please, let us know if you have any ideas on improving Identifying and exploring security essentials, or our service. We will be happy to hear what you think: [email protected]