Nobody downloaded yet

Computer Security - Essay Example

Comments (0) Cite this document
Summary
Q: What is the true loss and cost of spam? Why have systemic spam responses not been adopted? Argue for how would spam have to cost and to whom to end it. How would this change the infrastructure? How has spam already changed the infrastructure? With the advancement of technology an the internet being used for a multitude of purposes we can see how important a role the internet plays in the lives of individuals as well as corporations by viewing the estimate of about 50 billion messages being sent per day by the current volume of emails sent worldwide…
Download full paperFile format: .doc, available for editing
GRAB THE BEST PAPER92.7% of users find it useful
Computer Security
Read TextPreview

Extract of sample "Computer Security"

Download file to see previous pages These measures although controversial and undefined currently in their basic emphasis and in all certainty aim to reduce free access, ease of use, timeliness and the completely cost effective advantages that attract such a high level of abuse to the facility. This in itself is a true loss with legitimate users caught in the cross fire and being on the receiving end of all the barriers that are proposed to the easy usage of email and web access. The core problem with spam is that it bears the senders almost no cost to send the spam. The network service providers and the recipients bear the cost. Hence the cost associated with spam weighs down on the receivers in terms of reduced convenience and higher cost resulting from the proposed proof of work that aims to alter the economics of spam, by requiring that the send commit to a per-email cost. There are many reasons why a systemic spam response has not been adopted. This is mainly because the proposed responses lack in suitable aspects and hence cannot be generally adopted as a counter for the issue at hand. This issue being largely the enabling factor that spam is cheap to send. The most original and highly examined model to deter spam is the proof-of-word model. This comprises a set of proposals, in which email senders would be required to pay money, perform a resource-intensive computation, perform a series of memory operations, or post a bond for each message sent. The working assumption of this model was to deter spam by making it uneconomic to send a large number of messages, while enabling legitimate users to send small number of messages. Hence proof of work reverses the cost model of email by charging the sender instead of the user. All these components of the proof of work model seem promising however a uniform POW mechanism will not. Firstly because if it is expensive enough to stop spammers it must be so expensive that it will also stop legitimate users. Infact, the cost to a spammer would have to be a magnitude higher than the cost to a legitimate user because spammers face very different production costs due to spambots. The model does not accommodate these variable magnitudes. Second it is proposed that POW might work if it is combined with anti spam efforts such as reputation systems and per-email spam identification mechanisms. However criticism of this approach is based on the fact that these efforts suffer from penalizing new IP addresses and discarding incorrectly identified email which is a type of effort difficult to balance and will result in either new entrants being not allowed to send email, or each ne IP address will be allowed to send enough email that spam remains profitable. Changes to the current infrastructure are necessary to counter spam. It is suggested in various researches that unsolicited bulk email is such a problem on the internet mainly because the current economic framework and the basic infrastructure for email handling does little to discourage it. It ...Download file to see next pagesRead More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Computer Security Essay Example | Topics and Well Written Essays - 750 words - 5”, n.d.)
Retrieved from https://studentshare.org/environmental-studies/1414672-computer-security
(Computer Security Essay Example | Topics and Well Written Essays - 750 Words - 5)
https://studentshare.org/environmental-studies/1414672-computer-security.
“Computer Security Essay Example | Topics and Well Written Essays - 750 Words - 5”, n.d. https://studentshare.org/environmental-studies/1414672-computer-security.
  • Cited: 0 times
Comments (0)
Click to create a comment or rate a document

CHECK THESE SAMPLES OF Computer Security

Computer security

...? Computer Security of the of the Concerned August 31, Computer Security Introduction The Information Revolution and the accompanying developments in hardware and software research have changed forever the way businesses, economies, institutions and organizations interact and conduct business with each other. With the digitization of the world economies, the wealth of the world is no more confined to banks and security vaults, but has also come to reside in the servers and computers scattered across corporations and financial institutions, in the form of bits and bytes. It would not be wrong to say that much of the wealth of the world today exists today in a digitized form (Gollmann, 1999, p. 6). Once, one comes to terms... with this...
6 Pages(1500 words)Term Paper

Computer Security

...? Computer security Threat Modeling Attack goals The attack goal in to access and view sensitive encrypted files stored in Alice’s laptop located in her workspace. Attacker The attacker is Charlie who can only access the physical location within 43 minutes only. He plans to do it single handedly within 9 days. Security Assumption Physical location access is restricted to only 43 minutes, which is far less time to carry access the encrypted files. Also it is assumed the AES encryption method deployed by Alice is secure enough to restrict unauthorized access to the encrypted file as well as the fact that the password used is strong enough to warrant random guess (Eran...
8 Pages(2000 words)Essay

Computer Security

...the basic design and deployment of computer systems, which form a major chunk of the issue. These misguided incentives begin with what economists call a moral hazard effect which resulted in a landslide of fraud. Other incentives include consumer’s lack of prioritizing on security measures which resulted in their minimum spending on software security. This is referred to by economists as ‘The tragedy of the commons’ with consumer’s unwilling to spend on measures that did not directly benefit them. Third is the failure in privacy and prolonged regulatory issues due to poor allocation of online risks. Last is the ability of these incentives to affect defense and offense strategies. With...
3 Pages(750 words)Essay

Computer Security

...?Differences in the two papers with respect to approaches and conclusions The paper ed by MacCarthy on Information Security Policy in the U.S. Retail Payments Industry is a thorough analysis of the security policies which incorporates and evaluates the legal doctrines embraced by the players in the industry with regards to information security. The information security policies are evaluated as an economical idea; incorporating the impact of externalities which create inefficiencies and undermine incentives for investments in information security. The paper carefully examined the impact of various acts and laws such as PCI (Payment Card Industry...
3 Pages(750 words)Essay

Computer security

...?Assessment Computer Security Program Matriculation number Word Count: 1526 words Contents 3 Introduction 4 IdentifyingThreats and Vulnerabilities 4 Examination of the Security Principles Broken 4 Recommendations 5 References 7 Abstract Computer security refers to the minimization of vulnerabilities to assets and resources. There is no such thing has 100% security, although one can get close to it. The case study provides an example of how security lapses can occur and expose the system’s vulnerabilities. This paper looks into the threats and vulnerabilities that the event exposed and examines the...
6 Pages(1500 words)Essay

Computer Security

...personal information revelation behavior of millions of people to friends as well as complete strangers. Millions of people around the world use social networks like Friendster, MySpace, Facebook to communicate, find friends, dates and jobs – and in doing so they wittingly reveal highly personal information about themselves to everyone. With the burst in advertising of these social networks most of them now days encourage users to reveal highly personal information. This includes their dates of birth, cell phone numbers, addresses and highly confidential health information. The weak structural design of social networks in terms of security and access controls is cleverly concealed by a false sense of...
2 Pages(500 words)Essay

Computer Security

...?Q: Return to the discussion of how spam has or has not changed the infrastructure. Has this changed your perspective? What could incent ISPs to improve detection in terms of architecture and disclosure? How might that empower attackers? My perspective has greatly changed when I look at the effect that spam has had on the infrastructure of technology. Spam, spyware, identity and data theft are a form of technological abuse that have brought along noticeable shifts in the technological infrastructure. Spyware the term loosely describes a new class of computer software that may track user activities online and offline, provide targeted advertising and engage in other types of activities that users describe as invasive or undesirable... , out of...
2 Pages(500 words)Essay

Computer Security

...? Adoption of Computer Security: An Investigation into the effects of Computer Security Threats, And the effective Measures and Applications that canbe used for protection Within various online Business Environments Name Institution Abstract The current drastic growth in the popularity of the Internet and in the continuous use of the wired and wireless communication protocols between computers have made this subject of computer security quite relevant and crucial to investors on computers and their applications. As the severity of cyber threats become increasingly more sophisticated because of the alternating reasons behind hacking, so are the set strategies to aid in combating them. Current techniques to provide digital security... are...
30 Pages(7500 words)Essay

Computer security

...A Report on Computer security for Oracle Inc Report of the Topic The topic reports that computer security is an essential aspect that Oracle Corporation emphasizes to the users to enable them avoid cases of hacking. Oracle Corporation is the world’s principal software company for the database enhancement. The article is significant since it exposes aspects about hacking as a grave offense that can affect the reliability and status of an individual or an organization. In March 2011, Oracle experienced this crisis when its Website was hacked by Cernaianu Manole Razvan (Lennon, 2012). This made the users of the Website encounter difficulty in accessing data from their...
1 Pages(250 words)Essay

Computer security

...COMPUTER SCIENCES AND INFORMATION TECHNOLOGY ID, LAST A report on computer security licensing Computer sciences and information technology Name Student number Course code and title Date Executive Summary The report seeks to discuss computer security licensing as well as its contribution to technology to date. The report also attempts to study if the removal and elimination of the computer security measures lead to a step-down in the incidence of computer fraud. Similarly, the report discusses if it is ethical to teach solutions to the computer problems. The report...
6 Pages(1500 words)Essay
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.

Let us find you another Essay on topic Computer Security for FREE!

Contact Us