StudentShare solutions
Triangle menu

Computer security - Essay Example

Nobody downloaded yet

Extract of sample
Computer security

Once an individual clicks on the link, it directs to a website where a malware software and virus is downloaded into the individual computer, in addition to downloading and installing a spyware that captures sensitive information from the computer (US CERT, 2012). Thus, blended threat is fatal than other forms of threat, since it entails the damage of an individual’s computer, while at the same time allowing for the track of sensitive information by the attackers, who can later use it for their benefit. Additionally, blended threats are more difficult to combat, since any activity on the link sent by the attacker will definitely cause harm to the computer in one way or the other (Trend Micro, 2008). Mobile threats With the increase in technology advancement, mobile technology has not been left out. Sophisticated mobile devices are being produced each day, allowing the users to access information from the internet at the click of their phone button. This has motivated the cyber criminals to venture into targeting mobile devices, where they have developed files that are easily transferrable through email, MMS, Bluetooth and even text messages (Trend Micro, 2008). ...
They are eventually transferred to other mobile devices through texts, MMS and Bluetooth and cause the same harm to the other devices. Phishing scam This refers to major malware campaigns that have been launched to target individual computers, which occur in the form of the attackers sending electronic greeting cards that contain malware (Trend Micro, 2008). The attacker have also developed attack files inform of attractive and enticing free screensavers, which contains malware files. Once an individual downloads and installs the screensaver, the malware in transferred to the individual’s computer, where they cause its malfunction (US CERT, 2012). Additionally, phishing scams have been developed inform of credit card information applications or online shopping advertisements that seek to capture individual’s credit card information, for theft purposes (Trend Micro, 2008). Measures to protect individual’s computer from these attacks Maintaining update anti-virus and anti-malware Computer security calls for the vigilance of the individual using the computer. Therefore, notwithstanding that anti-viruses and anti-malware do not fully protect the computer from external threats, it essential to maintain them updated and activated at all times. This is because; they play a great role in protecting the computer from certain external threats, leaving the computer owner with few threats to tackle (US CERT, 2012). Therefore, the computer owner should consistently upgrade their anti-virus and anti-malware to the recent versions, which include more protective features (Vacca, 2009). Use of firewall Configuring and maintaining firewall in place is essential. Firewall is the most recognized form of protection of a computer from external software attacks, since ...Show more

Summary

Computer security Grade Course (24th, Nov. 2012) Computer security Computers have always been a major target for security threats. Thus, the issue of computer security is very diverse such that it is not easy to cover. This is because, the threats to computer security range from cyber crimes, to computer crimes and internet crimes, as well as computer privacy issues…
Author : miller41
Computer security essay example
Read Text Preview
Save Your Time for More Important Things
Let us write or edit the essay on your topic
"Computer security"
with a personal 20% discount.
Grab the best paper

Check these samples - they also fit your topic

Computer Security
He plans to do it single handedly within 9 days. Security Assumption Physical location access is restricted to only 43 minutes, which is far less time to carry access the encrypted files. Also it is assumed the AES encryption method deployed by Alice is secure enough to restrict unauthorized access to the encrypted file as well as the fact that the password used is strong enough to warrant random guess (Eran Tromer, 2008).
8 pages (2000 words) Essay
Computer security
There is no such thing has 100% security, although one can get close to it. The case study provides an example of how security lapses can occur and expose the system’s vulnerabilities. This paper looks into the threats and vulnerabilities that the event exposed and examines the security principles that were broken.
6 pages (1500 words) Essay
Computer Security
In simple terms we can define vulnerability disclosure when a public announcement regarding a software flaw is made. Which brings us to the argument against the sharing for information as it mostly leads to vulnerability. Rahul Telang, Sunil Watta, in ‘Impact of Software Vulnerability Announcements on the Market Value of Software Vendors – an Empirical Investigation’ draw that very conclusion through a thorough research based on a collection of date from various sources.
3 pages (750 words) Essay
Computer Security
Computer networking has been developed over the years and this has brought many advantages in the today's business society. With computer networks, it is possible to share resources and information. Information can be stored in a common location and this location be put in a network where everyone who can access the network will have the chance to access it and therefore save them the trouble of having to look for that information and carry it using external storage devices.
4 pages (1000 words) Essay
Computer Security
As the severity of cyber threats become increasingly more sophisticated because of the alternating reasons behind hacking, so are the set strategies to aid in combating them. Current techniques to provide digital security are executed with a woefully inadequate strategy, considering a frighteningly short time horizon.
30 pages (7500 words) Essay
Computer Security
Both of the studies featured in this essay are similar in the sense that these studies are aimed towards enhancing computer security in organizations. However, the studies differ in the study goals and scope, methodology and analysis. The importance of computer security has been emphasized by two expert studies.
9 pages (2250 words) Essay
Computer security
The articles state that these firms have realized that commonly installed open software from Oracle Corporation makes PCs vulnerable to hacker hits. In response, there is no means of protecting users. Additionally, the articles say that computer scholars
1 pages (250 words) Essay
Computer security
In March 2011, Oracle experienced this crisis when its Website was hacked by Cernaianu Manole Razvan (Lennon, 2012). This made the users of the
1 pages (250 words) Essay
Computer security
The report stipulates that computer security licensing, is indeed an antisocial behavior that harbors social cohesion. However, it has contributed efficiently to reducing computer fraud over the years.
6 pages (1500 words) Essay
Computer Security
First, I discovered that I was a bit careless with storage of my personal computer which is portable since I often leave it on top of the table when out of the house and whenever I carry it around or when travelling I normally left
1 pages (250 words) Essay
Hire a pro to write
a paper under your requirements!
Win a special DISCOUNT!
Put in your e-mail and click the button with your lucky finger
Your email
YOUR PRIZE:
Apply my DISCOUNT
Comments (0)
Click to create a comment