StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Computer Security Threats - Essay Example

Cite this document
Summary
As the paper "Computer Security Threats" tells, computer security threats are capable of interfering with the normal functioning of computer systems. Among these sources of threats include malicious codes, industrial espionage, malicious hackers, incidences of employee sabotage, etc…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER91.9% of users find it useful
Computer Security Threats
Read Text Preview

Extract of sample "Computer Security Threats"

This summary covers sub-factors within the malicious code. Examples of these factors are viruses, worms, Trojan horses, logic bombs, blended threats e.t.c.

A computer virus is a code segment that is capable of replicating by possibly attaching copies of it to existing executable files, implying that viruses can exist in a computer without infecting the system; not unless one opens or runs the malicious program. It is majorly spread by sharing infected files through emails and removable disks.

A worm, on the other hand, is a self-replicating program or algorithm which has the capability of creating copies of it and thereafter executing without the requirement of a host program or user interventions. Just like in the case of viruses, worms exploit the use of network services to propagate themselves to other hosts systems within the network topology. 

A Trojan horse is a program that performs the desired task, however, which also includes unexpected functions. After installation or running of the Trojan horse, it gets activated and starts to alter the desktops by adding ridiculous active desktop icons; deleting files and destroying other information on the systems, and creating a backdoor on the computer systems to offer malicious users the easy lee-ways into the system. The unique feature that explicitly distinguishes it from worms and viruses is that it does not actually replicate/ reproduce by infecting other files.

A Blended threat is rather more sophisticated in the sense that it bundles the worst known features or viruses, worms, Trojan horses, and malicious codes. For its aided transmission, it can exploit the server and the linked internet vulnerabilities to initiate, and thereafter transmit by spreading its attacks to other various systems interlinked within the network structure. Blended threats are characterized by unique features such as:

  1. Being capable of causing malfunctions to the infected systems or network structures.
  2. They also propagate through the systems by means of multiple methods.
  • These attacks can also be detected from multiple points, hence making it hard for their trace.
  1. The extensively overexploits the possible vulnerabilities that are within the systems or the network topologies.

So as to save the face of technological inventions and innovations, the computer gurus have devised measures to help in managing and protecting against these computer threats. These include the use of computer firewalls, installation of up-to-date Antivirus setups, and ensuring tight security and restricted access to the computer and network systems.

Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Summaries Essay Example | Topics and Well Written Essays - 500 words - 1”, n.d.)
Summaries Essay Example | Topics and Well Written Essays - 500 words - 1. Retrieved from https://studentshare.org/information-technology/1618349-summaries
(Summaries Essay Example | Topics and Well Written Essays - 500 Words - 1)
Summaries Essay Example | Topics and Well Written Essays - 500 Words - 1. https://studentshare.org/information-technology/1618349-summaries.
“Summaries Essay Example | Topics and Well Written Essays - 500 Words - 1”, n.d. https://studentshare.org/information-technology/1618349-summaries.
  • Cited: 0 times

CHECK THESE SAMPLES OF Computer Security Threats

Information Security

McFarlane (2010) asserts, “There is no doubt that network administrators are today dealing with much more sophisticated network and Computer Security Threats than they did a few years ago”.... Network security is a strategy that is used to protect computer networks from different sorts of threats by identifying the potential threats to the networks and then applying the most appropriate measures to combat the identified threats....
5 Pages (1250 words) Research Paper

Personal Data Protection

For us to address and ensure protection of personal data, we need to introduce institutional and behavioral changes so as to fully tackle Computer Security Threats, reputation risks, and heightening the legislation on data security.... There are indeed thousands of solutions to data security available in the technology market but still protection of personal data is very difficult.... We have quite common security breaches despite having a wide assortment of technical answers such as personal firewalls, network firewalls, solutions to operating system patching, antiviruses, intrusion detection or prevention systems, anti-spyware, and security management systems....
3 Pages (750 words) Assignment

Threats to Computer Security

The following are the major, recent Computer Security Threats: Blended threats This refers to a combination of spyware and malware attacks on a computer.... 2012) Computer security Computers have always been a major target for security threats.... computer security Grade Course (24th, Nov.... Thus, the issue of computer security is very diverse such that it is not easy to cover.... This is because, the threats to computer security range from cyber crimes, to computer crimes and internet crimes, as well as computer privacy issues....
3 Pages (750 words) Essay

Network Security

The non-malicious “attacks” usually come from users and employees who are not trained on computers or are not aware of various Computer Security Threats.... Overview of Network Security Fundamentals, security threats, and Issues Whenever a network is connected to the Internet it is potentially subjected to attacks from malicious programs such as viruses, Trojans, and spyware.... threats can originate from two primary sources: humans and nature....
3 Pages (750 words) Case Study

Why Is the Computer Security Important

The basic purpose of this research is to identify the latest security threats.... Thesis StatementEffective computer security measures can help reduce security threats.... will also conduct surveys and interviews with the people who have suffered from these security threats.... In the essay 'Why Is the computer security Important?... The basic purpose of the research is to discuss computer security issues and their solutions....
2 Pages (500 words) Essay

Week 2 Academic Paper

To be precise, the main point behind is about monitoring and surveillance of Computer Security Threats.... To be precise, the main point behind is about monitoring and surveillance of Computer Security Threats.... On this basis, it goes ahead to addressing major types of Computer Security Threats along with proposals on different mitigation techniques.... It is vital to note that this paper provides a significant set of concepts on how a computer system can be exposed to either internal or external security threats....
1 Pages (250 words) Assignment

The Application of Biometric Technology and the Convenience

he prevailing publicity regarding biometric is largely attributed to its application in the public sector; nevertheless, biometric security technologies evolved owing to the proliferation of Computer Security Threats.... Biometric technology has been used in offering better security and convenience when controlling access to facilities as well as other tangible resources.... The main reason propelling the use of biometric technology for tighter border control is that the conventional security approaches never offer adequate level of security....
5 Pages (1250 words) Essay

Personal Computing Situation Security Assessment

This essay "Personal Computing Situation security Assessment" presents a security assessment that conducted on my personal computing situation with regards to the different gadgets, computers, and cloud storage servers.... The security assessment will be done on computing items.... My computing items such as the home computer, personal laptop, phone, hard disk, and even the network may be prone to different security risks as compared to and the cloud storage service....
8 Pages (2000 words) Essay
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us