Got a tricky question? Receive an answer from students like you! Try us!

computer security - Essay Example

Only on StudentShare
College
Essay
Information Technology
Pages 3 (753 words)

Summary

Computer security Grade Course (24th, Nov. 2012) Computer security Computers have always been a major target for security threats. Thus, the issue of computer security is very diverse such that it is not easy to cover. This is because, the threats to computer security range from cyber crimes, to computer crimes and internet crimes, as well as computer privacy issues…

Extract of sample
computer security

Once an individual clicks on the link, it directs to a website where a malware software and virus is downloaded into the individual computer, in addition to downloading and installing a spyware that captures sensitive information from the computer (US CERT, 2012). Thus, blended threat is fatal than other forms of threat, since it entails the damage of an individual’s computer, while at the same time allowing for the track of sensitive information by the attackers, who can later use it for their benefit. Additionally, blended threats are more difficult to combat, since any activity on the link sent by the attacker will definitely cause harm to the computer in one way or the other (Trend Micro, 2008). Mobile threats With the increase in technology advancement, mobile technology has not been left out. Sophisticated mobile devices are being produced each day, allowing the users to access information from the internet at the click of their phone button. This has motivated the cyber criminals to venture into targeting mobile devices, where they have developed files that are easily transferrable through email, MMS, Bluetooth and even text messages (Trend Micro, 2008). ...
Download paper
Not exactly what you need?

Related Essays

Computer security
Once, one comes to terms with this astounding fact that then comes in the concept of computer security. Simply speaking the purpose of the computer security is to look to it that the data residing within the computers remains safe and sound. The arrangements for computer security within organizations look to it that no harm gets done to the computers owned by the organizations and the information…
6 pages (1506 words)
Computer Security and Biometrics
Introduction Due to recurrent technological developments, information and communication technology frequently diverts in new dimensions. The research and development in the context of information and communication technology is very effective. Moreover, the new and advanced form of technology has also facilitated vulnerabilities and threats to be more intelligent. Organizations require advanced…
10 pages (2510 words)
Computer Security
Characteristics of the attacker Motivation The motivation is to view encrypted files within the limited 9 days’ time frame after which the information loses relevance to the attacker. Access The attacker has only access to physical location of the workstation though the time is limited to only 43 minutes. Skills and risk aversion The attacker is risk averse and has idea on file encryption…
8 pages (2008 words)
Cryptography and Computer Security
virus from which the computer needed protection. Issues continued to arise but the most serious problem came with the introduction of internet. Internet gave birth to many problems because the internet gave rise to many virtual access points. Access points are an entrance to every sort of information and along with the information that enters virus and other malwares can easily enter. This opened…
9 pages (2259 words)
Computer Security
The network also makes it possible to share resources like printers and hard drives. This therefore reduces costs for of having to buy these resources. Proposed client-tier architecture The application architecture that I better and promises better security is that of 3-tier architecture. In this aspect the server will be installed in a data center with the server of the server program. Three-tier…
4 pages (1004 words)
Computer Security
In this research a proposal of an offensive defense comprising of a corporate partnership with successful cyber defense software companies to provide a united front against malware is of the highest preference. The initial capital investment of free anti-virus software to users would be offset in time by added security and stability. The key to which is integration of the social subsystem in order…
30 pages (7530 words)
Attacking Cryptography "Computer Security"
Operating Systems store information about commonly used programs and through the network, programs such as KeePass can read encrypted files, posing a serious attack to cryptography as a data protection technique. Even so, the challenge for KeePass is that it operates for a limited duration beyond which it does not have the capability to read encrypted files. A number of encrypted data files stored…
6 pages (1506 words)