Sunday, November 3, 2019
Computer Security Essay Example | Topics and Well Written Essays - 7500 words
Computer Security - Essay Example In this research a proposal of an offensive defense comprising of a corporate partnership with successful cyber defense software companies to provide a united front against malware is of the highest preference. The initial capital investment of free anti-virus software to users would be offset in time by added security and stability. The key to which is integration of the social subsystem in order to execute such a strategy. Computer usersââ¬â¢ basic lack of knowledge on the dangers that lie within the network system, such as the use of weak passwords or just trusting any e-mails sent to their mailboxes actually makes it easier for hackers to gain access to the vulnerable computers over the networked systems. Presently, the web is a host of viruses, worms, Trojan horses, making unsecured computer devices or computers that their protective software are not up-to-date easier to pull down through introduction of malwares into the systems. Solutions there in are to ensure safe and sec ured system administration. Situation Analysis This project rolls out several ambitious although critical objectives that are directed towards: laying out the central concepts for the current situations in regards to computer security of the stand alone or interconnected devices; to come up with the best definitions that covers the logic encompassed by insecurity consequences over the unprotected computer systems; and the subsequent establishment of a set of foundations that the thereafter work can be build upon. Organizations and individuals whose operations extensively dependent on the use of computers and their services do describe their needs for information security under major concepts of integrity, secrecy, availability and accountability of their required information. Therefore, every computer user has to make prompt decisions on what security as a measure means to him/ her. It is from this description of the userââ¬â¢s needs for security with his/ her personal computer o f organizationsââ¬â¢ computers that security policies are established; and hence, a system that effectively meets those needs is termed as a secure system (Venkatesh, V. et al., 2003, pp. 425-478.). In computer security, it is important take note that technology in never enough for a trusted system. Any business organization must ensure that its secure program takes into account other managerial controls, means of recovery from security breaches, and also full awareness and acceptance of people who are entrusted with the use of such devices (Weirich, D., and Sasse, M. A., 2001, pp. 137-143.). This idea of recognizing a person is brought about by the fact that security cannot be attained in an environment where people are not of full commitment in achieving a secure computer operation as a goal. Security continues to sap vital resources and manpower from the Information Technology (IT) departments. Rather than focusing on the efficiency of knowledge management, IT professionals ar e increasingly swamped with cyber security tasks. Profits from cyber-crime are shifting the threat from board teenagers to well financed professionals. A security survey analysis concluded that as break-ins morph from prank to business, profit-driven attackers
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.