StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

SHORT written - Assignment Example

Cite this document
Summary
According to (Turner & Gelles 2003), threat is any likely occurrence whether or not malicious to breach the security of the system by taking advantage of its known or unknown vulnerabilities. It may be caused by the attacker gaining unauthorized access to stored information…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER94.6% of users find it useful
SHORT written assignment
Read Text Preview

Extract of sample "SHORT written"

Assignment, E-commerce al Affiliation Assignment, E-commerce According to (Turner & Gelles 2003), threat is any likely occurrence whether or not malicious to breach the security of the system by taking advantage of its known or unknown vulnerabilities. It may be caused by the attacker gaining unauthorized access to stored information. Secondly, causing denial of service to authorized users and finally, causing the alteration of information to mislead the users or cause the system to behave incorrectly There are various computer threats; viruses, Trojans, worms, and spyware to mention but a few.

These computer threats can have negative impacts on your computer system and a person’s life. The damaging effects of ignoring these threats are deadly. They range from a virus corrupting files and even deleting everything on a hard drive. Trojans for example are capable of disabling antivirus software and removing firewalls exposing your computer to serious risks. Spywares are capable of causing your computer to crash as well as collecting personal information and changing configuration settings.

These threats are designed to gather information from users that are mainly used to commit fraud and identity theft (Turner & Gelles 2003). There are various methods can be used by organizations to identify threats and act on them before they can cause damages. Primarily, the organization can establish a corporate policy to only allow approved devices on the network and to have those devices running on the latest version of antivirus. Secondly, the policy should allow only the administrators to install and run applications.

Thirdly, the organization can invest in software tools that aid in auditing computer activity and detecting the presence of tampering and damage. Lastly, the organization should make computer security education a prerequisite to any computer user. This will help users to know how best to protect their systems and detect any unusual activities. Reference.Turner, J. T., & Gelles, M. G. (2003). Threat assessment: A risk management approach. New York: Haworth Press.

Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“SHORT written assignment Example | Topics and Well Written Essays - 250 words”, n.d.)
SHORT written assignment Example | Topics and Well Written Essays - 250 words. Retrieved from https://studentshare.org/e-commerce/1631793-short-written-assignment
(SHORT Written Assignment Example | Topics and Well Written Essays - 250 Words)
SHORT Written Assignment Example | Topics and Well Written Essays - 250 Words. https://studentshare.org/e-commerce/1631793-short-written-assignment.
“SHORT Written Assignment Example | Topics and Well Written Essays - 250 Words”, n.d. https://studentshare.org/e-commerce/1631793-short-written-assignment.
  • Cited: 0 times

CHECK THESE SAMPLES OF SHORT written assignment

Different Management Structures and Human Resource Development

Since this assignment has to deal with the personnel which are basically a social society of people, a manager need to learn to know the psychology of various people.... After an intensive and extensive interview With Mr.... Mohammed Ali who works a Human resource manager with Dubai public department a lot were learnt from this… This interview was carried out on the basis of face to face in the manager's office after working out an appointment with the relevant authorities....
5 Pages (1250 words) Assignment

The assignment is a short paper written in the style of a letter to the editor in the Wall Street Journal

I salute Doug Cameron, who highlighted the issue of the Pentagon's move to encourage military contractors to invest more of their private funds in developing better arms.... The article titled Pentagon's Weapons Push Faces Skeptics appeared in your magazine on 22nd September,… Cameron acknowledged that encouraging military contractors to broaden their research focused on advancing the United States' military abilities is a worthy cause....
1 Pages (250 words) Assignment

Understanding the Quran

This assignment "Understanding the Quran" discusses reading and reciting the Qur'an that is also said to bless people and give them hope for a better tomorrow.... nbsp;(Quran 38:29)”The Qur'an is the most well-known and well-written piece of Arabic literature which is said to have been sent in the form of a message to Prophet Muhammad by the angel Gabriel or Jibra'eel, through the verbatim of Allah....
10 Pages (2500 words) Assignment

Interview with a Social Worker

Smith noted that they are written in her job description, but she would gladly provide me with a list.... This paper ''Interview with a Social Worker'' tells that it was extremely interesting for author to interview a real-life social worker since that would allow me to combine theory and practice....
5 Pages (1250 words) Assignment
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us