computer security - Essay Example

Only on StudentShare

Extract of sample
computer security

Once an individual clicks on the link, it directs to a website where a malware software and virus is downloaded into the individual computer, in addition to downloading and installing a spyware that captures sensitive information from the computer (US CERT, 2012). Thus, blended threat is fatal than other forms of threat, since it entails the damage of an individual’s computer, while at the same time allowing for the track of sensitive information by the attackers, who can later use it for their benefit. Additionally, blended threats are more difficult to combat, since any activity on the link sent by the attacker will definitely cause harm to the computer in one way or the other (Trend Micro, 2008). Mobile threats With the increase in technology advancement, mobile technology has not been left out. Sophisticated mobile devices are being produced each day, allowing the users to access information from the internet at the click of their phone button. This has motivated the cyber criminals to venture into targeting mobile devices, where they have developed files that are easily transferrable through email, MMS, Bluetooth and even text messages (Trend Micro, 2008). ...
Download paper


Computer security Grade Course (24th, Nov. 2012) Computer security Computers have always been a major target for security threats. Thus, the issue of computer security is very diverse such that it is not easy to cover. This is because, the threats to computer security range from cyber crimes, to computer crimes and internet crimes, as well as computer privacy issues…
Author : miller41

Related Essays

Computer security
Once, one comes to terms with this astounding fact that then comes in the concept of computer security. Simply speaking the purpose of the computer security is to look to it that the data residing within the computers remains safe and sound. The arrangements for computer security within organizations look to it that no harm gets done to the computers owned by the organizations and the information saved in those computers remains inaccessible to the unwanted people and organizations (Gollmann, 1999, p. 9). Most of the computer security systems have been designed with the help of the logical...
6 pages (1506 words) Term Paper
Computer Security and Biometrics
It is evidently clear from the discussion that due to recurrent technological developments, information and communication technology frequently diverts in new dimensions. The research and development in the context of information and communication technology is very effective. Moreover, the new and advanced form of technology has also facilitated vulnerabilities and threats to be more intelligent. Organizations require advanced protection and security from these threats and vulnerabilities. In order to protect information assets, organizations emphasize on implementing logical and physical...
10 pages (2510 words) Research Paper
Computer Security
Characteristics of the attacker Motivation The motivation is to view encrypted files within the limited 9 days’ time frame after which the information loses relevance to the attacker. Access The attacker has only access to physical location of the workstation though the time is limited to only 43 minutes. Skills and risk aversion The attacker is risk averse and has idea on file encryption techniques. The attacker is not mindful of the legal and ethical ramifications of the operation but he is not willing to attain his goal through violent means. Basic Attack tree Possible attacks Special...
8 pages (2008 words) Essay
Cryptography and Computer Security
virus from which the computer needed protection. Issues continued to arise but the most serious problem came with the introduction of internet. Internet gave birth to many problems because the internet gave rise to many virtual access points. Access points are an entrance to every sort of information and along with the information that enters virus and other malwares can easily enter. This opened a gateway to many virus and unwanted material into the computer. In order to protect the computer from such threats many techniques and methods were adopted and up till now new techniques and soft...
9 pages (2259 words) Essay
Computer Security
The network also makes it possible to share resources like printers and hard drives. This therefore reduces costs for of having to buy these resources. Proposed client-tier architecture The application architecture that I better and promises better security is that of 3-tier architecture. In this aspect the server will be installed in a data center with the server of the server program. Three-tier architecture has various layers with various functions. 3-tier architecture. The 3-tier client/server architecture was introduced to eradicate the problems that were associated with 2-tier...
4 pages (1004 words) Essay
Computer Security
In this research a proposal of an offensive defense comprising of a corporate partnership with successful cyber defense software companies to provide a united front against malware is of the highest preference. The initial capital investment of free anti-virus software to users would be offset in time by added security and stability. The key to which is integration of the social subsystem in order to execute such a strategy. Computer users’ basic lack of knowledge on the dangers that lie within the network system, such as the use of weak passwords or just trusting any e-mails sent to their...
30 pages (7530 words) Essay
Attacking Cryptography "Computer Security"
Operating Systems store information about commonly used programs and through the network, programs such as KeePass can read encrypted files, posing a serious attack to cryptography as a data protection technique. Even so, the challenge for KeePass is that it operates for a limited duration beyond which it does not have the capability to read encrypted files. A number of encrypted data files stored in the various cache locations are at risk of attacks by such malicious program as KeePass. These programs can study the number of times a cryptographic system used the same cache locations (Dong &...
6 pages (1506 words) Essay
Got a tricky question? Receive an answer from students like you! Try us!