StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Secure Computer System - Essay Example

Cite this document
Summary
In the essay “Secure Component System” the author classifies the occurrences as an incident or disaster. If an occurrence is a disaster, he determines whether or not business continuity plans would be called into play. A hacker gets into the network and deletes files from a server…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER96.8% of users find it useful
Secure Computer System
Read Text Preview

Extract of sample "Secure Computer System"

Firewalls are the most common security measures for computer networks. Certain mechanisms are put in place in order to provide adequate security to protect resources on the trusted network against potential access by attackers. There are numerous mechanisms in network security, one of which is the DMZ or Demilitarized Zone. DMZ is a network which is semi-protected and is common to medium scale to large scale enterprise (Pickering, 2009). DMZ has two (2) disadvantages: First, the firewall can be created to pass trusted'' services within the application gateway(s), thus, subverting the policy.

The trusted'' services which get passed all around the application gateway typically end up being in contact with the site systems. Another disadvantage is placed on the routers for the provision of security. Packet filtering routers seemed complex to configure and errors could disclose the whole site to security holes (Wack, 2009). Added by Pickering (2003), the application proxy firewalls usually require frequent software updating to run the latest versions of the proxy code. This is important particularly when new exploits are detected, needs to be blocked, and in the event when problems emerge interactions between the proxy as well as widely deployed applications.

Meaning, when the proxy is found actually breaking.3. Using a Microsoft XP or 2000 system, open Internet Explorer. Open Internet Options under the Tools menu. Examine the contents of the Security and Privacy tabs. How can these tabs be configured to provide: a) content filtering, and b) protection from unwanted items like cookies Some actions that Microsoft XP or 2000 system allows a user to do in order to configure content, filtering and protection from unwanted items like cookies are 1. To personalize Windows XP settings for each user; and also 2.

To assign the user to create accounts and passwords in the computer to control the users who can access the system. In other words, users who are not the "administrators" will have no access, unable to change critical system files or delete it. 

Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(Secure Computer System Essay Example | Topics and Well Written Essays - 500 words, n.d.)
Secure Computer System Essay Example | Topics and Well Written Essays - 500 words. https://studentshare.org/information-technology/1532317-secure-computer-system
(Secure Computer System Essay Example | Topics and Well Written Essays - 500 Words)
Secure Computer System Essay Example | Topics and Well Written Essays - 500 Words. https://studentshare.org/information-technology/1532317-secure-computer-system.
“Secure Computer System Essay Example | Topics and Well Written Essays - 500 Words”. https://studentshare.org/information-technology/1532317-secure-computer-system.
  • Cited: 0 times

CHECK THESE SAMPLES OF Secure Computer System

Secure Computer Systems

The "risk-based approach" in the Standards, as amended, addresses: adding consideration of the size and scope of the business, amount of resources, nature and quantity of data collected or stored, and the need for security when creating an information security program; removing a number of specific provisions for the written information security program, all of which will now be "guidance" only; specifying that all (not just encryption) computer system security requirements should be included in the written information security program "to the extent technically feasible"; adding and amending some definitions, including making the definition of encryption "technology-neutral....
2 Pages (500 words) Term Paper

What is System Security

hellip; According to the research findings, it can, therefore, be said that with computing being an integral element in modern-day operations, the emphasis has turned to computer system security.... This paper is going make an in-depth analysis of all that surrounds system security.... system security is an integral component in modern day computing as it prevents against data being stolen by third parties and also the risk of data destruction and manipulation....
11 Pages (2750 words) Term Paper

Meat Production Business in Ukraine

The main topic of this research paper is the situation at the Ukrainian meat market.... By the report published by Invest Ukraine (2012), Ukraine meat market is comparatively steady as compare to the agricultural market.... hellip; In accordance with the report of Food & Agricultural Organization (2014), the gross value of Ukraine's domestic meat market was USD 4....
21 Pages (5250 words) Research Paper

Business Strategies

As a result, most companies do not see the importance of investing large sums of money in order to have a good protection system against information trespassing.... In other words, the security aspect of the business can also be referred to as computer information security, wherein information held by the company is protected from misuse by another.... The author takes into account the security aspect of the business, its role, the possible internet attacks, secure operating systems....
16 Pages (4000 words) Coursework

Methods Available for Maintaining Computer System Security

The paper "Methods Available for Maintaining computer system Security" states that the computer system has reached an invaluable stage.... The need for computer system increased multifold with the advent of the internet.... The internet has brought with it several threats to the computer system.... In the process related to denial of service, an adversary looks for preventing someone from using any feature of a computer system....
8 Pages (2000 words) Coursework

Computer Security

nbsp;Due to the amazing efficiency of a computer system, every business feels the need to utilize computer technology within the business infrastructure to enhance its operational performance.... nbsp;Therefore, computer system security is considered to be the vital aspect of any organization.... Frequently these hackers like to get control over company's computer system in order to initiate devastating attacks over further computers.... omputer security can be perceived as the procedure of averting as well as identifying illegal exploitation of a company computer system....
9 Pages (2250 words) Research Paper

BYOD-Polcies for Mitigation of Data Loss

The purpose of the paper "BYOD-Polcies for Mitigation of Data Loss" is to describe the state of affairs as it exists.... This will involve highlighting all the data mitigation strategies that have been put in place and, most importantly, to analyze how the various recommended strategies are effective in reducing data losses....
8 Pages (2000 words) Research Proposal

Building a Secure Computer System

The author of this current paper "Building a Secure Computer System" will try to expound on the various ways that can be used so as to maintain a secure system that may vary from strong passwords and some other rules that will enhance security.... Therefore, it is essential to keep a good security system that will enhance that the data is not perceptible to malicious users.... Group policy objectives assist the user or an administrator to a system to keep the system secure such that no irresponsible or malicious individuals get access to the data....
9 Pages (2250 words) Lab Report
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us