StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Computer Security Challenges - Essay Example

Cite this document
Summary
The paper "Computer Security Challenges" describes that vulnerabilities in risk management are simply conditions that may result in an attack by impending threats. Maram et.al further suggests that vulnerabilities are attributes that are easily exploited by the threats…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER99% of users find it useful
Computer Security Challenges
Read Text Preview

Extract of sample "Computer Security Challenges"

I found out that there were several problems with the installation settings of my external mouse and the webcam. Fourthly, my operating system was not properly configured with all of the software I had on my computer. And lastly, I discovered that my antivirus was not up to date.

When mitigating risk, does not necessarily mean fully eliminating the threat but an effort towards minimizing the impending risks. It is therefore a step taken by a person who fully becomes aware of the existing risks and decides to find ways of preventing or minimizing the chances of such risks occurring.

I can mitigate my risks on my personal computer by first ensuring that I leave my personal computer somewhere hidden whenever I am out of the house and also ensuring that I fully attend to my computer bag whenever I carry my computer around or when am traveling. Secondly, ensuring that I use WPA2 encryption on my internet access point and also configure my computer with a firewall to ensure that I am not hacked. Third, I would also perform a proper installation for my hardware devices; the mouse and the webcam. Fourth, I would ensure that my operating system is properly configured with all the software on my computer. And lastly, I would ensure that I install antivirus software that would keep my computer safe from viruses from external hard disks and flash disks and one that automatically performs regular updates to remain strong. Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Computer Security Essay Example | Topics and Well Written Essays - 250 words - 2”, n.d.)
Computer Security Essay Example | Topics and Well Written Essays - 250 words - 2. Retrieved from https://studentshare.org/information-technology/1657988-computer-security
(Computer Security Essay Example | Topics and Well Written Essays - 250 Words - 2)
Computer Security Essay Example | Topics and Well Written Essays - 250 Words - 2. https://studentshare.org/information-technology/1657988-computer-security.
“Computer Security Essay Example | Topics and Well Written Essays - 250 Words - 2”, n.d. https://studentshare.org/information-technology/1657988-computer-security.
  • Cited: 0 times

CHECK THESE SAMPLES OF Computer Security Challenges

Computer laws in US. Computer Fraud and Abuse Act

Computer professional therefore should ensure that there are frameworks put in place to protect and face these challenges through laws.... The challenges with the initial structure of CFAAA was that to successfully prosecute fraud charges, one must provide evidence that the suspect gained unauthorized access into the computer system (CFAA, 1986).... Penalties under CFAA Offense Minimum sentence Maximum sentence Getting national security information 10 year 20 years Unauthorized access in government computer 1 year 10 years Knowing access and damage 1 year 10 years Knowing access and reckless damage 5 years 20 years Trafficking in passwords 1 year 10 years Extortion involving threats of damage computer 5 years 10 years Theofel v....
5 Pages (1250 words) Research Paper

Why Is the Computer Security Important

In the essay 'Why Is the computer security Important?... The basic purpose of the research is to discuss computer security issues and their solutions.... Thesis StatementEffective computer security measures can help reduce security threats.... ackgroundThe concept of computer security is not a new idea.... Up till now, computer security has remained a serious challenge for business organizations as well as individuals....
2 Pages (500 words) Essay

The Role and Challenges of Technology in CSR

The author of the paper "The Role and challenges of Technology in CSR" will begin with the statement that сorporate social responsibility entails the voluntary activities of the businesses that aim at meeting the social, ethical, and environmental needs of the society.... However, technology encounters challenges such as loss of security, privacy, unethical practices, unemployment, and high costs of access.... The paper will reflect on the role and challenges of technology in CSR....
7 Pages (1750 words) Essay

Amazons Elastic Compute Cloud Service

High security and privacy are necessary to earn customers' trust for the online products offered, especially with increased incidences of cybercrimes and related consequences.... To achieve this, the paper will describe the EC2 service and issues related to innovations and design such as software vulnerabilities, privacy risks, and security threats.... Users run the machine by selecting resource configurations, login in the form of specified credentials, a security group, and data center regions where the machine runs....
8 Pages (2000 words) Case Study

Challenges of Distributed Computing Environments

This literature review "challenges of Distributed Computing Environments" discusses distributed computing systems that are growing quickly in the last years, with the emphasis on the large development of applications and the other key impacts of internet and wireless technologies on the industry....
10 Pages (2500 words) Literature review

Challenge of Removing Computer Security and Encouraging Ethical Teaching

The paper "Challenge of Removing computer security and Encouraging Ethical Teaching" is a good example of an information technology report.... The paper "Challenge of Removing computer security and Encouraging Ethical Teaching" is a good example of an information technology report.... The paper "Challenge of Removing computer security and Encouraging Ethical Teaching" is a good example of an information technology report.... This report wades into the heart of challenges encompassing software licensing and further explores the ethical perspective held by some people....
8 Pages (2000 words)

Computer Security Measures and the Impact of Licensing to Sharing of Information

One cannot be so sure that ethical teaching is the solution to Computer Security Challenges.... The paper "computer security Measures and the Impact of Licensing to Sharing of Information" is a great example of a report on information technology.... The paper "computer security Measures and the Impact of Licensing to Sharing of Information" is a great example of a report on information technology.... The paper "computer security Measures and the Impact of Licensing to Sharing of Information" is a great example of a report on information technology....
6 Pages (1500 words)

Computer Attacks and Internet Security

his article discusses the issues of computer security concerning the threats that are encountered by the users when operating the computers.... Statistical methods in computer security, 20 (5), 1-21.... his article discusses the issues of computer security about the threats that are encountered by the users when operating the computers.... Statistical methods in computer security, 20 (5), 1-21.... discusses the effects and the challenges posed by hackers on the internet....
5 Pages (1250 words) Annotated Bibliography
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us