Nobody downloaded yet

Security Report - Essay Example

Comments (0) Cite this document
Malware refer to malicious ware; and it involves software used in disrupting computer functions or operations, get sensitive computer information, and gain access in private computer networks. It appears in many forms, for example; software form, code, scripts and active…
Download full paperFile format: .doc, available for editing
GRAB THE BEST PAPER94.8% of users find it useful
Security Report
Read TextPreview

Extract of sample "Security Report"

Download file to see previous pages However, there are many cases where malware is found in genuine software like company software; and the malware can be used maliciously in gathering marketing data. Software like firewalls, antivirus and antimalware are installed in computers to prevent malware attacks.
The school administrators and teachers, on detecting malware attacks on school computers, should take steps to adopt the damage and adopt ways of minimizing the malware attacks in future. Assessing the damage involves three steps; preparation, investigation and assessment. In preparation stage; the administrators should avoid using the browser of affected computers; this is because malware usually spreads through browser vulnerabilities and opening infected web page can damage the computer further.
The investigation stage involves identification of the malware type; this can easily be done through the study of malware categories in the server configuration and SQL injection (Cashell & Webel, 2004). In assessment stage the administrators should consider the damage done, for example; data theft of computer files corruption.
The school administrators should inform members of the public on the malware attacks cases; through the appropriate communication or media channels. The public should also be informed of the type and magnitude of malware attack. Malware attack on school computers can be motivated by financial reasons, data theft or the innovative nature of students. The public must be told of the appropriate measures put in place to investigate the malware damage; and their trust can be achieved through explaining the measure adapted to prevent further attacks in future.
There are software programs which have been made for the main purpose of combating malware; the school administrators should ensure that this antimalware software is installed in all official computers. Other preventing measures involve; backup measures and recovery measures. Antimalware ...Download file to see next pagesRead More
Cite this document
  • APA
  • MLA
(“Security Report Essay Example | Topics and Well Written Essays - 1500 words”, n.d.)
Security Report Essay Example | Topics and Well Written Essays - 1500 words. Retrieved from
(Security Report Essay Example | Topics and Well Written Essays - 1500 Words)
Security Report Essay Example | Topics and Well Written Essays - 1500 Words.
“Security Report Essay Example | Topics and Well Written Essays - 1500 Words”, n.d.
  • Cited: 0 times
Comments (0)
Click to create a comment or rate a document


CB Hart Law Firm: An Information Security Report

...?Running Head: CB HART LAW FIRM: AN INFORMATION SECURITY REPORT CB Hart Law Firm: An Information Security Report Insert Date: CB Hart Law Firm Executive summary The company being a Law firm involves handling of important information on cases that determines the verdicts before the judges. However, such crucial information requires a lot of care to enhance information integrity. However, having acquired three more companies, the CB Hart Law Firm has to increase the level of security. All the branches could be joined through an intranet so ease information sharing. However, the system administration should enhance security and if possible train employees on the data and information handling security procedures to reduce intrusion... with or...
10 Pages(2500 words)Essay

Research report on Internet Security

...?Research Report on Internet Security Table of Contents Introduction 3 History of Internet Security Threats 3 General Internet Security Threats 5 Phishing 5 Identity Theft 6 Malware (Viruses, Worms, Trojan Horses, Spyware) 6 Denial of Service Attack 7 National Internet Security Threats 8 International Internet Security Threats 9 The Future of Internet Security Threats 11 Antivirus Software 13 Firewalls 13 Avoiding Unsecured Wi-Fi 14 Other Measures 14 Conclusion 15 References 16 Introduction In the present day context, internet has become an important component of the regular life of people. Through internet, people can...
12 Pages(3000 words)Research Paper

Report for security mangment

...? Security Management of Wal-Mart First Last of Table of Contents Introduction………………………………………………………………………………………..3 Wal-Mart IT Services: Aligned to the Needs of the Business and Needs of the Customers…….3 Level of Strategic Alignment Based on Luftman Levels………………………………………….6 Measures Can Be Planned in Order to Improve the Strategic Business-IT Alignment…………...8 Conclusion………………………………………………………………………………………...9 References……………………………………………………………………………………..…11 Introduction Wal-Mart is one of the largest retailers and public corporations in the world in terms of sales and revenue. This 40-year old company was founded by Sam Walton in 1962 which dominated the local market of the United States, and began to trade stocks on the...
9 Pages(2250 words)Essay

Report ( Trade to Flobal Security )

...?Report on the Political Crisis in Cote d’Ivoire – the Mission of the ECOWAS Commission Mediation Team Rationale and Reason for visiting As members of the Economic Community of West African States (ECOWAS) Commission, we have a core mandate to “improve the living conditions of the citizenry, ensure economic growth and create an environment conducive to development and integration” (ECOWAS Community Computer Centre, 2007). To ensure this among all member countries, there is the need for various member countries to enjoy high level of political stability and peace. It is only in such an atmosphere that the citizenry can go about their daily businesses to ensure economic growth. This is to establish that economic growth and...
6 Pages(1500 words)Essay

Report on security (read attachmment)

...? Report on Access Control Biometric Security System Dynamic Air Parts plc has a large manufacturing complex within a square kilometre area. It has 3000 workers which makes security a top priority,for the running of its parts supplies business. As the senior managers have planned to improve the company`s security system, the current swipe card system is required to be replaced. Management has decided to use Biometric-based smart card system with either Fingerprint or Vein Recognition systems. As a document from specialist security consultancy company, this report will assist Dynamic Air Parts plc to take a descion best suited to their...
8 Pages(2000 words)Essay

Security Analysis Report of Kellogg (stock ticker K)

...June 13, Security Analysis Report of Kellogg (stock ticker K Introduction The purpose of this paperis to study the stock of Kellogg by analyzing the 5 year financial history of the firm. This research aims to find out whether one should buy, sell or hold the company’s stock. The financial report from 2006 to 2010 includes five years, which need to be examined in order to know the stock movements in Kellogg. The company Kellogg is a leading producer and distributor of cereals, which was founded in the year 1906. The company’s name is listed on the New York Stock Exchange and the Dow Jones Stock Exchange. “The most common deciding factors used in the market to attempt to anticipate future...
14 Pages(3500 words)Research Paper

Security Assessment Report

...SAFETY AND SECURITY Report on safety and security of VISHNU DEVI DEVELOPERS ASSIGNMENT There are many factors that aid a company land on the path of success. One of the important factors is its Safety and Security. This is as important as the human scull which protects the brain from both internal and external foreign body. A survey is conducted based on the parameters to particularly observe on a private organization named VISHNU DEVI DEVELOPERS PVT LTD. The survey is based on all round security concerns the company is adopting. Some suggestions are given where ever necessary. The following are the various security departments the...
3 Pages(750 words)Assignment

Computer security proposal report

... ID # Computer Security Proposal Outline In the past few years, the computer security has turned out to be a well-known term for the business organizations as well as individuals who use computers. Basically, computer security is a commonly used term which encompasses a wide variety of information and computing information processing capabilities. Without a doubt, business organizations that heavily rely on networks and computer systems to carry out on a daily basis business operations and transactions as well as access vital information with regard to their data as a significant element of their overall assets. In simple words, computer security is the way of securing and identifying unlawful or illegal use of personal computer... . In this...
2 Pages(500 words)Assignment

Forensics and security report

...Forensics and security report Introduction As defined by Landoll , security assessment is a means to enhance information technology security of an organization. The major aim of carrying out security assessment is often to determine an organization’s maturity level and enable it discover its organizational, legal as well as technical risks. This implies specifically detecting the major vulnerabilities/weak points within the protection system. The assessment then concludes with an enhancement plan whose activation facilitates the development of a protection system hence an improvement in terms of the organization security level. It is...
6 Pages(1500 words)Essay

Security Governance Report

...Security Governance Report 0. Overview ISACA is a globally functioning IT consulting company, which aims at delivering its services to governance professionals around the world. The company currently serves approximately 140,000 professionals from the global platform and is therefore, concerned with business-to-business services only (ISACA, 2015). In accordance to its operational area, the organization is observed to provide much significance in upholding its enterprise security plans to deliver a secure channel of governance to its client. In this report, the policies and the procedures practiced by ISACA will be critically reviewed to identify its...
8 Pages(2000 words)Assignment
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.

Let us find you another Essay on topic Security Report for FREE!

Contact Us