StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Computer security - Assignment Example

Cite this document
Summary
The main purpose of the Common Vulnerabilities and Exposures site is to provide a platform that provides synchronized information on all vulnerabilities in the information security sector. Its goal is to make it easy to share information on these vulnerability capabilities. This…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER93.4% of users find it useful
Computer security
Read Text Preview

Extract of sample "Computer security"

College: Computer Security What is the basic purpose behind the CVE? The main purpose of the Common Vulnerabilities and Exposures site is to provide a platform that provides synchronized information on all vulnerabilities in the information security sector. Its goal is to make it easy to share information on these vulnerability capabilities. This would involve giving common names to problems in the public domain including vulnerability repositories, tools, and services.Describe the convention used for the identifiers of the CVE reports found on the site.

Identifiers for CVE reports are unique identities that are allocated to publicly known vulnerabilities to information security. Each identifier, therefore, represents a single vulnerability. The CVE numbering authority assigns a CVE Identifier Number to information on the potential exposure or security vulnerability as soon as it becomes available to the public. Vulnerabilities can, therefore, be distinguished from each other using these identifiers (Common Vulnerabilities and Exposures).About how many CVE entries are currently in their database (as of 09/10/12)?

The database at CVE currently has about 58345 entries.Approximately how many of these involve a "buffer overflow"? 8159 entries include a buffer overflowHow many of all the CVE entries mention Internet Explorer? 1243 entries mention Microsoft Window’s ‘Internet Explorer’ web browser in their data.How many mention SQL?The number of entries that mention SQL in the CVE database is approximately 20822.Works CitedCommon Vulnerabilities and Exposures. Frequently Asked Questions, 5 July 2012. Web.

16 Sept 2012.

Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Computer security Assignment Example | Topics and Well Written Essays - 250 words”, n.d.)
Computer security Assignment Example | Topics and Well Written Essays - 250 words. Retrieved from https://studentshare.org/information-technology/1603226-computer-security
(Computer Security Assignment Example | Topics and Well Written Essays - 250 Words)
Computer Security Assignment Example | Topics and Well Written Essays - 250 Words. https://studentshare.org/information-technology/1603226-computer-security.
“Computer Security Assignment Example | Topics and Well Written Essays - 250 Words”, n.d. https://studentshare.org/information-technology/1603226-computer-security.
  • Cited: 0 times

CHECK THESE SAMPLES OF Computer security

Justification of Hacking into Websites

This research presents the justification of hacking, computer security firms' ethics that promote hacking, and the social responsibilities of media firms such as Gawkers Media LLC.... By hacking, they claim, it becomes possible for computer security firms to prevent or rectify any damaging security leaks.... hellip; This paper illustrates that in June 2004, Apple suffered an embarrassment when a security breach exposed personal details of its iPad's owners....
5 Pages (1250 words) Essay

Net-centric Computing and Information Systems

UTORIAL #1: COMPUTER SECURITYA brief description of the tutorialThe tutorial studied addressed the most integral concepts of today's world: ‘computer security'.... Ever since the advent of the concept of connecting computing devices over a network the concept of computer security has risen.... The tutorial skillfully describes the concept of computer security breach and tells how viruses, worms and Trojan horses are a threat to the security of the data and the computing systems themselves....
2 Pages (500 words) Essay

How Safe Is Your Computer

Anti-virus software should be regularly updated because new viruses come into existence; thus, latest versions of computer security The computer era presents a plethora of advantages for individuals and organizations.... computer security is a fundamental issue in this age of information technology.... Another essential form of security for one's computer is to secure one's wireless network.... There is however a great need to protect one's computer in order to maximize its potential benefits....
1 Pages (250 words) Case Study

If computer security is the answer, what is the problem, and how can computer security solve that problem

This branch mainly deals with data protection from various adverse effects including theft or obliteration through national disasters… A recent study asserts that computer security entails various methodologies, which are used to protect certain information from unauthorized events (Gollmann 2011).... This paper will discuss how computer security is regarded as the answer.... This essay will computer security computer security Introduction computer security is defined as a branch of computer technology, which is applied to networks, and the general use of computers (Vacca 2009)....
2 Pages (500 words) Essay

Discussion question

The safe keeping of hardware even includes security of computers where information computer security vs.... Information security computer security vs.... This part of information security is recognized as computer security where professionals try to secure computers from being manipulated in order to obtain ensure that the information that is secured on these computers remain safe (Smith, 2000, p.... In the case of computer security, professionals try to secure various parts of a particular computer as on these parts the information of individuals and organizations is secured....
1 Pages (250 words) Essay

Week 2 Academic Paper

To be precise, the main point behind is about monitoring and surveillance of computer security threats.... On this… In general, this paper provides a considerable enlightenment on how to perform improvised computer security auditing and surveillance capabilities on Academic paper review - computer security Threat Monitoring and Surveillance It is vital to that this paper providesa significant set of concepts on how a computer system can be exposed to either internal or external security threats....
1 Pages (250 words) Assignment

Computer Security and Protecting Its Data and Information: Proper Measures and Strategies

hellip; According to Halibozek (2008), the most common risks to computer security include and not limited to computer viruses, hackers, and crackers, vandalism, environment, and depreciation.... Computer systems face many challenges that make them vulnerable security risks.... Their main disadvantage is that they are vulnerable to information security risks that may result in loss or damage of important information.... This essay describes computer systems and the relevant measures and plans which can be used to secure the computer systems....
7 Pages (1750 words) Research Paper

Arguments for and Against Outsourcing Computer Security Services

One of the many reasons that a firm should outsource computer security services is the costs involved with… There are numerous costs associated with this, including costs of the IT infrastructure necessary, technical support, training, software licenses, and costs of compliance with public authorities, not to mention operations and The paper "Arguments for and Against Outsourcing computer security Services" is a delightful example of an essay on information technology....
3 Pages (750 words) Research Paper
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us