StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

System Security - Essay Example

Cite this document
Summary
System security over the last twenty years has gone through a tremendous series of ups and downs where the focus of providing security is to minimize uncertainty by measuring the probability of a threat event.
Initially the secure and financial data were not on the internet…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER94.4% of users find it useful
System Security
Read Text Preview

Extract of sample "System Security"

___________ Grade _____________ d: 2008-12-21 System Security System security over the last twenty years has gone through a tremendous series of ups and downs where the focus of providing security is to minimize uncertainty by measuring the probability of a threat event. Initially the secure and financial data were not on the internet directly so at that time the most common threat to a computer system or to a land environment was the virus attack. Criminal minded geniuses were designing the virus to destroy a system partially or completely.

This provided an edge to the antivirus companies to scan, remove, and protect from virus attacks. The virus attack can only be possible to a system via removable storage devices (zip drive, jazz drive, and floppy drive) which mean a system can be protected from such attacks if the external removable devices are pre-scanned before its usage. During the current era of globalization, every LAN is connected to the biggest LAN i.e., internet one way or the other. Nearly all the financial institutions and government bodies have connected their systems over the internet to give their authorized users an ease of access from any part of the world.

On one hand this has alleviated the boundaries between different countries and made communication possible in real-time between two ends of the world but on the other hand it has given an edge to the cyber criminals to breach through the complex systems by finding its loopholes. Due to the threat of hacking, none of the national security and financial data is safe from these cyber criminals unless well protected by using different pro-active techniques such as: 1) Data encryption 2) Firewalls 3) Identifying the loopholes in the current system and creating a patch for it.

The encryption technique has been successfully used for data transfer between two ends over the internet because even if the data is tapped by a hacker, he cannot decrypt it since he is inaccessible to the public key for decryption. The firewall softwares are used to guard against the brute force attacks and access from an invalid domain but due to the loopholes which exist in the current operating systems these firewall softwares occasionally fail. Up till now the hackers are usually focusing on financial institutions for the monetary benefits, but in the future these hackers could also be used to manipulate the national security data and the personal ids to wage any degree of chaos as desired.

This situation is expected only because we have created the space for this threat by ourselves by storing every personal data and information over the internet, having mobiles in our pockets to be tracked down anywhere. Chip and other biometric technologies have also made our lives miserable for loosing the privacy and monitoring our body functions throughout the year (Levant, http://www.rense.com/general64/freewill.htm). What can be worst than the situation when humans start becoming slaves to the governmental bodies – being implanted and analyzed with RFID chips.

Work CitedLevant Nancy, Accessed from

Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“System Security Essay Example | Topics and Well Written Essays - 500 words”, n.d.)
System Security Essay Example | Topics and Well Written Essays - 500 words. Retrieved from https://studentshare.org/miscellaneous/1550781-system-security
(System Security Essay Example | Topics and Well Written Essays - 500 Words)
System Security Essay Example | Topics and Well Written Essays - 500 Words. https://studentshare.org/miscellaneous/1550781-system-security.
“System Security Essay Example | Topics and Well Written Essays - 500 Words”, n.d. https://studentshare.org/miscellaneous/1550781-system-security.
  • Cited: 0 times

CHECK THESE SAMPLES OF System Security

Domain Name System Security Extensions

An author of the present paper intends to introduce the concept of Domain Name System Security Extensions.... The Domain Name System Security Extensions (DNSSEC) endeavors to include security, whereas upholding backward compatibility.... hellip; The initial design of the Domain Name System (DNS) did not comprise of security, but it was devised to be a scalable dispersed system.... With no DNS, the Internet would fail instantly, thus it must be properly maintained and the proper security system put in place to secure it from people with bad intentions....
9 Pages (2250 words) Essay

Information and System Security

Information and System Security Information security means protecting information and information systems from un ized access, use, disclosure,disruption, modification, or destruction.... Information security means protecting information and information systems from unauthorized access, use, disclosure, disruption, modification, or destruction.... The terms information security, computer security and information assurance are frequently used interchangeably....
2 Pages (500 words) Essay

What is System Security

This paper is going make an in-depth analysis of all that surrounds System Security.... System Security is an integral component in modern day computing as it prevents against data being stolen by third parties and also the risk of data destruction and manipulation.... hellip; According to the research findings, it can, therefore, be said that with computing being an integral element in modern-day operations, the emphasis has turned to computer System Security....
11 Pages (2750 words) Term Paper

Information System Security Plans

A nation can protect itself from threats and reach the top echelons only if its security system is made optimal and effective without any chance of loopholes.... This is where the role of a security plan assumes significance.... A foolproof security plan for the nation's federal… cies and other governmental organizations can enable it to function securely and efficiently thereby giving the nation an ‘edge' over other nations.... That is, once agencies' security structures and critical information are secured, they can operate without any threats, Then, with todays rapidly changing political, economic, and importantly technical environment increasing the threat for the federal agencies, it becomes paramount for those agencies to adopt a strong security plan....
5 Pages (1250 words) Research Paper

System Security Threats and Vulnerabilities

The paper "System Security Threats and Vulnerabilities" describes that the web-based service would be achieved through distributed interactivity.... omputer security is based on the following elements: Computer security supports the organization's mission; Computer security is an integral element of management;...
8 Pages (2000 words) Assignment

Methods Available for Maintaining Computer System Security

The paper "Methods Available for Maintaining Computer System Security" states that the computer system has reached an invaluable stage.... Therefore, computer security is a must in every field.... Computer security can be achieved in different ways such as by using an anti-malware program, by using cryptography technique to encrypt the data, and also various other methods.... Therefore, a total solution for any computer security system has to meet the three requirements like integrity, secrecy or confidentiality, and availability....
8 Pages (2000 words) Coursework

Information System Security Plans

According to research findings of the paper “Information System Security Plans”, the greatest impact on the system comes from performances of individuals.... The basic document in the security process has been the IT since it defines features and controls of the System Security.... hellip; The desire to have the applications in place has been pushed by the recent attacks that initiated the need to ensure the highest level of information security practices....
5 Pages (1250 words) Coursework

Future of Operating System Security

… The paper “Future of Operating System Security” is a great variant of an essay on information technology.... The paper “Future of Operating System Security” is a great variant of an essay on information technology.... When operating system together with its components are well architected, designed, and structured, the ensuing system offers solid security and steers clear of possible single failure points; therefore, the essay seeks to provide critical insight about the future of operating System Security....
8 Pages (2000 words) Essay
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us