Wednesday, June 19, 2019

Computer Security Essay Example | Topics and Well Written Essays - 7500 words

Computer Security - Essay ExampleIn this research a proposal of an offensive defense comprising of a corporate partnership with successful cyber defense software companies to provide a united front against malware is of the highest preference. The initial expectant investment of free anti-virus software to expenditurers would be offset in time by added certification and stability. The key to which is integration of the social subsystem in order to sue such a strategy. Computer users basic lack of knowledge on the dangers that lie within the network system, such as the use of weak passwords or just trusting any e-mails sent to their mailboxes actually crystallises it easier for hackers to gain access to the vulnerable computers over the networked systems. Presently, the web is a host of viruses, worms, Trojan horses, making unbarred computer devices or computers that their protective software are not up-to-date easier to pull down through introduction of malwares into the system s. Solutions there in are to figure safe and secured system administration. Situation Analysis This project rolls out several ambitious although critical objectives that are directed towards laying out the central concepts for the true situations in regards to computer security of the stand alone or interconnected devices to come up with the best definitions that covers the logic encompassed by insecurity consequences over the defenseless computer systems and the subsequent establishment of a set of foundations that the thereafter work can be build upon. Organizations and individuals whose operations extensively dependent on the use of computers and their services do describe their needs for information security under major concepts of integrity, secrecy, availability and accountability of their required information. Therefore, every computer user has to make prompt decisions on what security as a measure means to him/ her. It is from this description of the users needs for secur ity with his/ her individualal computer of organizations computers that security policies are established and hence, a system that effectively meets those needs is termed as a secure system (Venkatesh, V. et al., 2003, pp. 425-478.). In computer security, it is important take telephone line that technology in never enough for a trusted system. Any business organization must ensure that its secure program takes into account some other managerial controls, means of recovery from security breaches, and also full awareness and acceptance of people who are entrusted with the use of such devices (Weirich, D., and Sasse, M. A., 2001, pp. 137-143.). This idea of recognizing a person is brought about by the fact that security cannot be attained in an environment where people are not of full commitment in achieving a secure computer operation as a goal. Security continues to sap vital resources and manpower from the Information Technology (IT) departments. Rather than focusing on the forc e of knowledge management, IT professionals are increasingly swamped with cyber security tasks. Profits from cyber-crime are shifting the threat from board teenagers to well financed professionals. A security survey analysis reason that as break-ins morph from prank to business, profit-driven attackers

No comments:

Post a Comment