StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

If computer security is the answer, what is the problem, and how can computer security solve that problem - Essay Example

Cite this document
Summary
This branch mainly deals with data protection from various adverse effects including theft or obliteration through national disasters…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER97.9% of users find it useful
If computer security is the answer, what is the problem, and how can computer security solve that problem
Read Text Preview

Extract of sample "If computer security is the answer, what is the problem, and how can computer security solve that problem"

Computer Security Computer Security Introduction Computer Security is defined as a branch of computer technology, which is applied to networks, and the general use of computers (Vacca 2009). This branch mainly deals with data protection from various adverse effects including theft or obliteration through national disasters (Bryant & O’Hallaron 2010). A recent study asserts that computer security entails various methodologies, which are used to protect certain information from unauthorized events (Gollmann 2011).

This paper will discuss how computer security is regarded as the answer. This essay will also explain the problem related to computer security and the possible solution of this predicament. As stated above, computer security deals with several issues, which are related to technology (Wong & Yeung 2009). Facebook is one of the most popular social network site globally (Kirkpatrick 2010). However, there are several security issues that pose a danger to the users. It is quite clear that Facebook has fallen victim to various security issues such as hacking, hoax applications, counterfeit product pages and affiliate spam among other issues (Stoll 2011).

The number of facebook hackings has continually increased in the recent years. There are numerous aspects that make Facebook more prone to hacking since, most individuals usually post their personal information (Sterling 1993). Ways of preventing hackingThis information enables the hackers steal the personal identity of the account (Reese 2008). Therefore, it is much easier to protect account hacking using computer security. There are several methodologies that can be employed to impede hackers from accessing a facebook account.

These methodologies include using a strong password, logging out after finishing, changing the password more often and using an anti-spyware software (Erickson 2008). Using complicated passwords is one of the best ways to deal with facebook security issues. In fact, individuals are advised to use complicated passwords, which hackers are not able to retrieve (Kabay & Bosworth 2011). This will ensure that their personal information and that of their friends is protected against any alterations.

Facebook users are also supposed to logout immediately they are done using the social network (Tipton & Krause 2012). This is because another individual can download malware and key loggers which affect privacy terms of the account (Burger 1991).Changing the password more often also reduces the chances of the account being hacked (Mitnick, Simon & Wozniak 2011). This toughens the ability of the hackers to find out the password. However, it is advisable to note the password somewhere so that it is easy to remember.

Antivirus software and an anti-spyware are of significance to any social networker (Cole & Ring 2006). These programs are liable for tracking down the web browsing history of an individual. Furthermore, most experts have proven it is not advisable to use Internet Explorer when browsing based on several security problems related to this program (Pemberton 2010). Internet Explorer does not prevent cross-site linking, therefore; dangerous links are able to pop up (Gutwirth, Poullet, Hert & Leenes 2011).

ConclusionIn conclusion, an individual should make sure that the security settings on his or her social network profile are intact (Innovention Lab 2009). The methods used in computer technology are extremely different from other computer technologies (Graves 2008). In most cases, the problems related to computer security are encountered on the internet as depicted in the information.ReferencesBryant, R & O’Hallaron, D 2010, Computer systems: a programmer’s perspective, Addison Wesley Press, California.

Erickson, J 2008, Hacking: the art of exploration, No Starch Press, Northern California.Gollmann, D 2011, Computer security, Wiley Press, New York.Graves, M 2008, Computer technology encyclopedia, Cengage Press, Mason.Gutwirth, S, Poullet, Y, Hert, P & Leenes, R 2011, Computers, privacy and data protection: an element of choice, Springer Press, New York.Innovention Lab, 2009, Internet password organizer (R): mate, CreateSpace Independent Publishing Platform, United States. Kabay, M & Bosworth, S 2011, Computer security handbook, Wiley Press, New York.

Kirkpatrick, D 2010, The facebook effect: the inside story of the company that is connecting the world, Simon & Schuster Press, New York.Mitnick, K, Simon, W &Wozniak, S 2011, Ghost in the wires: my adventures as the world’s most wanted hacker, Little, Brown and Company Publishers, New York. Pemberton, R 2010, My website password organizer: one place to organize every website login and password, CreateSpace Independent Publishing Platform, United States.Reese, R 2008, Personal internet accounts organizer: one place to organize every login and password, CreateSpace Independent Publishing Platform, United States.

Stoll, C 2011, Cuckoo’s egg: tracking a spy through the maze of computer espionage, Pocket books, New York. Tipton, H & Krause, M 2012, Information security management handbook, Auerbach Publishers, California. Vacca, J 2009, Computer and information security handbook, Morgan Kaufmann Publishers, United States. Wong, A & Yeung, A 2009, Network infrastructure security, Springer Press, New York.

Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“If computer security is the answer, what is the problem, and how can Essay”, n.d.)
If computer security is the answer, what is the problem, and how can Essay. Retrieved from https://studentshare.org/miscellaneous/1602027-if-computer-security-is-the-answer-what-is-the-problem-and-how-can-computer-security-solve-that-problem
(If Computer Security Is the Answer, What Is the Problem, and How Can Essay)
If Computer Security Is the Answer, What Is the Problem, and How Can Essay. https://studentshare.org/miscellaneous/1602027-if-computer-security-is-the-answer-what-is-the-problem-and-how-can-computer-security-solve-that-problem.
“If Computer Security Is the Answer, What Is the Problem, and How Can Essay”, n.d. https://studentshare.org/miscellaneous/1602027-if-computer-security-is-the-answer-what-is-the-problem-and-how-can-computer-security-solve-that-problem.
  • Cited: 0 times

CHECK THESE SAMPLES OF If computer security is the answer, what is the problem, and how can computer security solve that problem

How does the academic study of problem solving and thinking relate to everyday life

Two, what is the nature of the goal?... Similarly, the difficulty of solving problems differs in degree depending on the nature of the problem.... Moreover, problem solving has two aspects: The answer that which solve the problem, and the solution procedure by which way the answer is known (Robertson 2001, p.... One, what knowledge does the problem require – would it be “knowledge-lean” or “knowledge-rich” problems (p....
5 Pages (1250 words) Essay

Adoption of Computer Security

This report "Adoption of computer security" discusses computer security usage via the use of firewalls, anti-virus, offensive defense, and anti-spyware software applications.... Situation Analysis This project rolls out several ambitious although critical objectives that are directed towards laying out the central concepts for the current situations in regards to computer security of the stand-alone or interconnected devices; to come up with the best definitions that cover the logic encompassed by insecurity consequences over the unprotected computer systems; and the subsequent establishment of a set of foundations that the thereafter work can be built upon....
31 Pages (7750 words) Research Paper

Web Security: Applications, and Tools

the answer to web security is broader than just technology.... Web security is a branch of Information Security that deals with the security of websites, web applications, and web services.... Web security is a branch of Information Security that deals with the security of websites, web applications, and web services.... hen web application security is mentioned, there is an inclination to at once think about hackers defacing web sites and bombarding web sites with rejection of service attacks....
6 Pages (1500 words) Essay

Solving Problems of Multiple Identities

This paper ''computer security'' tells that Solving problems of multiple identities is done under effective identity management.... hellip; The MPS staff members are faced with multiple identities resulting due to the different job roles they play, but they can make use of Claims-based identity and the Role-Based Access Control (RBAC) to solve the problem.... he Metropolitan Police Services can utilize this technology for a successful operation of its activities without comprising the security of sensitive information in the police service....
8 Pages (2000 words) Essay

Computer Networking Management

In a computer network management system, there should be a method for getting computer programs ready for execution, in relation to particular network devices.... In reality, each organization is different and different computer networks must be developed to fit any particular organization and its structure.... This can be achieved by connecting groups of computers in a network, so that the data can be accessed immediately by various when data is entered into one computer, no matter the distance from the originating computer....
22 Pages (5500 words) Essay

Who Are the Hackers and What Do They Do

And have many variant points on their work and how it affects the normal human community.... Crackers are the ones who love to look into people's personal accounts all over the world by getting past security passes.... But their presence has been marred by a similar, but little known class of separate computer geeks known as crackers.... Even the Encarta dictionary tells about the difference between them: “cracker is someone who is a computer user, and who gains unauthorized access, to a computer or system data, belonging to someone else, and the hacker is somebody who is interested or skilled in computer technology and programming....
8 Pages (2000 words) Case Study

Web Security Importance

The paper "Web Security Importance " states that Web security is not an instant success story but, instead, requires the ongoing implementation of countermeasures that try to curb any malpractices that may pose a threat to secure information transfer.... eb security is a branch of Information Security that deals with the security of websites, web applications, and web services.... Several experts have come up with different tools such as SWEET that provide a better environment for the training and management of security operations on the web....
12 Pages (3000 words) Coursework

The Subject Area of Monte Carlo Methods in Financial Mathematics

nbsp;The prices of security derivatives which are complex are mainly signified as high dimensional integrals.... Second, the securities types and their associated offspring of security derivatives are complex.... This term paper "The Subject Area of Monte Carlo Methods in Financial Mathematics" discusses the application of Monte Carlo methods in recent developments in financial mathematics....
19 Pages (4750 words) Term Paper
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us