StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...

Adoption of Computer Security - Research Paper Example

Cite this document
Summary
This report "Adoption of Computer Security" discusses computer security usage via the use of firewalls, anti-virus, offensive defense, and anti-spyware software applications. This research has provided very vital pieces of information that are quite important…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER98.3% of users find it useful
Adoption of Computer Security
Read Text Preview

Extract of sample "Adoption of Computer Security"

Download file to see previous pages

In this research, a proposal of an offensive defense comprising of a corporate partnership with successful cyber defense software companies to provide a united front against malware is of the highest preference. The initial capital investment of free anti-virus software to users would be offset in time by added security and stability. The key to which is the integration of the social subsystem in order to execute such a strategy. Computer users’ basic lack of knowledge on the dangers that lie within the network system, such as the use of weak passwords or just trusting any e-mails sent to their mailboxes actually makes it easier for hackers to gain access to the vulnerable computers over the networked systems.

Presently, the web is a host of viruses, worms, Trojan horses, making unsecured computer devices or computers that their protective software is not up-to-date easier to pull down through the introduction of malwares into the systems.Solutions therein are to ensure a safe and secure system administration. Situation Analysis This project rolls out several ambitious although critical objectives that are directed towards laying out the central concepts for the current situations in regards to computer security of the stand-alone or interconnected devices; to come up with the best definitions that cover the logic encompassed by insecurity consequences over the unprotected computer systems; and the subsequent establishment of a set of foundations that the thereafter work can be built upon.

Organizations and individuals whose operations extensively dependent on the use of computers and their services do describe their needs for information security under major concepts of integrity, secrecy, availability, and accountability of their required information. Therefore, every computer user has to make prompt decisions on what security as a measure means to him/ her. It is from this description of the user’s needs for security with his/ her personal computer of organizations’ computers that security policies are established; and hence, a system that effectively meets those needs is termed as a secure system (Venkatesh, V. et al., 2003, pp. 425-478.).

In computer security, it is important to take note that technology is never enough for a trusted system.

...Download file to see next pages Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Computer Security Essay Example | Topics and Well Written Essays - 7500 words”, n.d.)
Computer Security Essay Example | Topics and Well Written Essays - 7500 words. Retrieved from https://studentshare.org/information-technology/1480053-computer-security
(Computer Security Essay Example | Topics and Well Written Essays - 7500 Words)
Computer Security Essay Example | Topics and Well Written Essays - 7500 Words. https://studentshare.org/information-technology/1480053-computer-security.
“Computer Security Essay Example | Topics and Well Written Essays - 7500 Words”, n.d. https://studentshare.org/information-technology/1480053-computer-security.
  • Cited: 0 times

CHECK THESE SAMPLES OF Adoption of Computer Security

Systems Upgrade for an Accounting Firm

Hardware Requirements of ComputersWith respect to the accounting firm in subject, it is undeniable that the smaller firm use old computer systems in conducting their accounting practices.... At this juncture, the essay will evaluate on the hardware needs of the small firm in terms of recommended computer models.... In their earlier research, Kenneth, James and Mansfield (2012) found out that Mac computers feature as the leading products in terms of superiority, quality and reliability In order to upgrade the accounting firm, every employee will have to work with a Mac desktop computer....
6 Pages (1500 words) Essay

How the Computer Forensics Type of Technology Applied to Detect Crime

The crimes include the misuse of computer systems, attacks on computer systems, using a computer system to work against another system, failure of a computer system, and the list continues.... The paper 'How the computer Forensics Type of Technology Applied to Detect Crime' presents the areas of police agencies, courts, and other correctional institutions, that define the crime and justice concepts, which have also been affected by the technological revolution....
5 Pages (1250 words) Case Study

Computer Security

This paper presents a detailed overview of computer security.... The paper gives detailed information about the computer security.... This paper discusses how computer security has become an important issue for the companies.... In view of the fact that the word computer security is employed regularly; however, the framework of a computer system is defenseless to a number of threats except the system is linked with more computer systems using some sort of network arrangement....
9 Pages (2250 words) Research Paper

Data Privacy and Security

This essay "Data Privacy and Security" presented some of the important features of computer security those need to be maintained for the sake of effective security management.... In view of the fact that the use of computer networks has turned out to be persistent, the thought of computer security system extended to point out problems covered in the way of networked use of computers and data resources.... In view of the fact that the use of computer networks, particularly the Internet (the largest network of the networks), has turned out to be persistent, the thought of computer security system has extended to point out problems covered in the way of networked use of computers and their information and data resources (Kinkus, 2002)....
8 Pages (2000 words) Essay

Concepts of IT Security

This coursework "Concepts of IT security " describes an essential aspect that the company must deal with it seriously.... This paper outlines the legal measures to increase its system security and to create security training and awareness for its employees.... nbsp;… This paper is going to give an analysis of the security background carried out by Enigma security Services analyst about a particular company....
10 Pages (2500 words) Coursework

Amazons Elastic Compute Cloud Service

hellip; High security and privacy are necessary to earn customers' trust for the online products offered, especially with increased incidences of cybercrimes and related consequences.... To achieve this, the paper will describe the EC2 service and issues related to innovations and design such as software vulnerabilities, privacy risks, and security threats.... Users run the machine by selecting resource configurations, login in the form of specified credentials, a security group, and data center regions where the machine runs....
8 Pages (2000 words) Case Study

Effective Protect Computer Systems from Computer Viruses

hellip; The main function of computer viruses is to reproduce, interfere, distort, delete, and corrupt normal computer operations.... There are different categories of computer viruses and they enter computer systems using varied ways and attach to components of a computer's operating and file systems.... Computer viruses are destructive in nature and as technology advances so have the nature and the complexity of computer viruses (Filiol, 2005)....
8 Pages (2000 words) Term Paper

Principles of Computer System Design: Security

… The paper "Principles of Сomputer System Design: security" is a wonderful example of a book report on design and technology.... The paper "Principles of Сomputer System Design: security" is a wonderful example of a book report on design and technology.... Malware such as Key loggers are difficult to evade, but using simple tricks and ways of obfuscating passwords are plausible intervention to the security problem Key loggers pose (Gawrock and International Conference Future of Trust in Computing, 2008)....
6 Pages (1500 words) Book Report/Review
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us