StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...

Computer Security Analyses - Essay Example

Cite this document
Summary
The main objective of this research paper is to elucidate several issues, and highlight their importance, as an urgent matter of business and industrial policy. For this assignment, several important issues, concerning computer security threat perceptions, have been taken up and possible solutions suggested encountering any potential problems.
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER91.4% of users find it useful
Computer Security Analyses
Read Text Preview

Extract of sample "Computer Security Analyses"

Download file to see previous pages

As we increasingly depend on sophisticated internet and networks, the threat perceptions will also correspondingly increase, posing a potential danger to the overall security of data and information. As and when, there are reports of computer security breaches and vulnerabilities, system administrators and business managers tend to publish the vulnerabilities that have affected the system. Full disclosures are provided with an idea to fix the problems; most of the disclosures are done to find a viable solution to the problem, as many business managers, tend believe that there will be someone, who can suggest a good solution.

But, many experts may not agree with the full disclosure of vulnerabilities to the public, as they feel that, they may increase the "window of exposure" (Bruce Schneier, 2000). This analysis attempts to find out issues that are concerned with full disclosures and their impact on the overall security of an organization. Experts believe that Global Internet threats are undergoing a profound transformation from attacks designed solely to disable infrastructure, to those that also target people and organizations.

They also opine that, behind these new attacks, is a large pool of compromised hosts sitting in homes, schools, businesses, and governments around the world. These systems are infected with a bot that communicates with a bot controller and other bots, to form what is commonly referred to as a zombie army or botnet. This analysis report is created to highlight the importance of botnets and zombies, in internet technology and their real-time impact on the security apparatus of an internet network.

Every piece of electronic document contains some form of metadata that is embedded within the document, and such data usually contains confidential and potentially embarrassing information, that could be shared with an unintended audience. This paper also attempts to find out how metadata could jeopardize the confidentiality of a document creator, and the ways that could be deployed to prevent transmission of such sensitive user data to the general public. Biometrics is a modern tool for authentication and this

...Download file to see next pages Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Computer Security Analyses Essay Example | Topics and Well Written Essays - 3750 words”, n.d.)
Retrieved from https://studentshare.org/miscellaneous/1508713-computer-security-analyses
(Computer Security Analyses Essay Example | Topics and Well Written Essays - 3750 Words)
https://studentshare.org/miscellaneous/1508713-computer-security-analyses.
“Computer Security Analyses Essay Example | Topics and Well Written Essays - 3750 Words”, n.d. https://studentshare.org/miscellaneous/1508713-computer-security-analyses.
  • Cited: 0 times

CHECK THESE SAMPLES OF Computer Security Analyses

A Critical Analysis of Computer Network Security Methods

The paper "A Critical Analysis of Computer Network security Methods" tells us about information technology.... Salient components of IPsec are AH (Authentication Header) and ESP (Encapsulating security payload).... AH consists of next header information (8 bits), payload length information (8 bits), identification for security association (32 bits), sequence number (ordering sequence of datagrams, 32 bits), variable authentication data containing ICV ( Integrity check value) or MAC and reserved 16 bits for future expansion (Stallings, William, 494 and Forouzan, Behrouz A....
21 Pages (5250 words) Essay

Why Is the Computer Security Important

In the essay “Why Is the computer security Important?... hellip; The basic purpose of the research is to discuss computer security issues and their solutions.... Thesis StatementEffective computer security measures can help reduce security threats.... ackgroundThe concept of computer security is not a new idea.... Up till now, computer security has remained a serious challenge for business organizations as well as individuals....
2 Pages (500 words) Essay

The Security of the Computer Network and Computer System

The focus of this paper "The security of the Computer Network and Computer System" is on the use of computers and the internet.... n addition to numerous security tools and programs that one can install into their computer and used to keep the system secure, it is advisable to take an interest in hacking methods, so that one knows when their system is under threat.... nbsp; The safety of one's a computer, network, or personal information needs to be protected by viruses, identity thieves, malware, and any other form of threat....
10 Pages (2500 words) Assignment

Understanding Cryptography

hellip; However, they have a great concern with regard to information and data security. This is where cryptography is used to secure and enhance security of data and Cryptography is somehow omnipresent going beyond the conventional environments such as banking systems, government communications among others (Christoff, 2009).... It also analyzes protocols and mechanisms that are related to information security aspects including data integrity, confidentiality, non-repudiation and authentication (Paar & Pelzl, 2010)....
8 Pages (2000 words) Essay

Methods Available for Maintaining Computer System Security

Therefore, computer security is a must in every field.... computer security can be achieved in different ways such as by using an anti-malware program, by using cryptography technique to encrypt the data, and also various other methods.... Therefore, a total solution for any computer security system has to meet the three requirements like integrity, secrecy or confidentiality, and availability.... This separation can be achieved by involving three subproblems as a part of computer security i....
8 Pages (2000 words) Coursework

Computer Security

The paper gives detailed information about the computer security.... This paper presents a detailed overview of computer security.... This paper discusses how computer security has become an important issue for the companies.... In view of the fact that the word computer security is employed regularly; however, the framework of a computer system is defenseless to a number of threats except the system is linked with more computer systems using some sort of network arrangement....
9 Pages (2250 words) Research Paper

Concepts of IT Security

This coursework "Concepts of IT security " describes an essential aspect that the company must deal with it seriously.... This paper outlines the legal measures to increase its system security and to create security training and awareness for its employees.... nbsp;… This paper is going to give an analysis of the security background carried out by Enigma security Services analyst about a particular company....
10 Pages (2500 words) Coursework

The Strategies Applied in Computer Security

Some of the main objectives for the application of computer security in any Information Technology based environment include safeguarding information and the available properties free from theft cases, natural disasters corruption.... The strategies or methodologies applied in computer security usually differ from the rest of computer technologies since it involves the prevention of unethical computer behavior, rather than just enabling the required computer behaviors (Layton 119)....
8 Pages (2000 words) Assignment
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us