StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Draft Standard for the Guide on Computer Security - Essay Example

Cite this document
Summary
The paper "Draft Standard for the Guide on Computer Security" states that it is worth noting that a number of security organizations counseled users to instantly render Java programs inoperative. This applied to the software installed through their internet browsers…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER91.2% of users find it useful
Draft Standard for the Guide on Computer Security
Read Text Preview

Extract of sample "Draft Standard for the Guide on Computer Security"

The articles “Quick! Disable or uninstall Java from your PC before it’s too late” and “Java update leaves PCs open to hackers, experts warn” provide a report on computer security organizations advising personal computer (PC) consumers to render Java software inoperative in their browsers [2].

The articles state that these firms have realized that commonly installed open software from Oracle Corporation makes PCs vulnerable to hacker hits. In response, there is no means of protecting users. Additionally, the articles say that computer scholars have recognized codes that attack machinery by making use of a newly unearthed error in the newest adaptation of Java. From this analysis, it has been deduced that PCs could be attacked without their users’ awareness by an effortless visit to any website that has been infiltrated by hackers.   Summary Finkle and By Anoop noted that researchers have realized a code that attacks PCs by taking advantage of a newly discovered error in the newest installation of Java. A subsequent piece program called “Poison Ivy,” its release allowed hackers to gain authority over the infected PC. PCs are vulnerable to infection without the users’ awareness merely by a visit to any website that has been infiltrated by hackers.   Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Computer security Essay Example | Topics and Well Written Essays - 250 words”, n.d.)
Computer security Essay Example | Topics and Well Written Essays - 250 words. Retrieved from https://studentshare.org/information-technology/1603759-computer-security
(Computer Security Essay Example | Topics and Well Written Essays - 250 Words)
Computer Security Essay Example | Topics and Well Written Essays - 250 Words. https://studentshare.org/information-technology/1603759-computer-security.
“Computer Security Essay Example | Topics and Well Written Essays - 250 Words”, n.d. https://studentshare.org/information-technology/1603759-computer-security.
  • Cited: 0 times

CHECK THESE SAMPLES OF Draft Standard for the Guide on Computer Security

Information Security Risk Assessment Framework

A Risk-Management Approach to computer security.... Binary view of security raised computer security risks to modelers during the first generation of computers.... Information Management & computer security Vol.... (2009) Security Metrics Foundations for computer security.... Information Technology reporting and metrics has two issues that are paramount: regular reporting and effective IT security metrics.... A formalized IT security reporting framework is necessary for adoption by a regulated institution....
15 Pages (3750 words) Annotated Bibliography

Network Security Policy

This case study ''Network security Policy'' shall also draft a procedure that will be responsive to the requirement of the Network security Policy.... The information security policy will provide a potent shield against threats, mitigation of vulnerabilities, and resolution of the weaknesses while providing the framework for the build-up of its information technology infrastructure (Andress).... The information security policy will also provide the strategic parameters and guiding principles of the operation of CMS that is geared towards securing information assets (Whitman and Mattord)....
9 Pages (2250 words) Case Study

Wireless Security

In 1990, a committee was formed to come up with a standard for WLANs that would operate at a speed of one and 2Mbps.... Wireless security.... However, despite its popularity, there are many security threats that are associated with the wireless technology, thereby preventing them from being widely spread.... Because the earlier mechanisms used in wireless security did not adequately provide defense against such attacks, WLANs provided an avenue for attackers to access an organization's network and take away important information (Us-cert....
7 Pages (1750 words) Research Paper

Networking and Management

The paper "Networking and Management" tells us about computer networks.... A computer network can also be seen as a collection of Personal computers and other related devices which are connected, either with cables or wirelessly, so that they can share information and communicate with one another.... computer networks vary in size.... In computer networking, the integrated services (IntServ) architecture is an architecture that specifies the elements for the guaranteeing of quality of service (QoS) on the network....
16 Pages (4000 words) Essay

Security Program

security planning is one of most important risk management initiatives in modern organizations.... security planning must be seen in the context of wider organizational policies.... Many aspects of security planning will be taken care of by, for example, the IT department or its equivalent.... However, high level security provision on its own is not enough; the systems have to work in practice.... The Data Protection Principle makes this clear, by requiring that security measures be 'technical and organizational'....
7 Pages (1750 words) Case Study

Information systems security incident

o fulfill this mission the operational framework for security of the software,hardware and data associated with information systems is defined based on ISO 17799.... CONOP outlines the key players, their roles and responsibilities in the event of information security incident.... The CONOP is defined to control the information & financial loss, for business continuity, security policy review and security awareness program.... o fulfill this mission the operational framework for security of the software, hardware and data associated with information systems is defined based on ISO 17799....
8 Pages (2000 words) Essay

Hardening Computer Networks

This policy can be accessed through a series of steps such as computer configuration->Windows Settings->security Settings->security options.... FIPS 140-2 standard defines some of the basic security requirements for a computer system running Microsoft Operating systems (such as Windows).... An organization can deal with these security threats by adopting an appropriate security procedure.... There are numerous guidelines and security measures that can be adopted by organizations to secure their computer networks (Nash, 1999; Shelly, Cashman, & Vermaat, 2005; Singhal, 2013)....
7 Pages (1750 words) Essay

Information Assurance and Computer Security

This report "Information Assurance and computer security" discusses protecting the internet and computer system of an organization as essential for the survival of the organization.... This is because the computer system contains so much information about the company.... The most common method of protecting the computer system of a company is the use of firewalls and antivirus systems.... These are software developed with the intention of protecting the computer system of the company from an an-authorized entry, and against various viruses....
6 Pages (1500 words) Report
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us