Nobody downloaded yet

Secure Computer System - Essay Example

Comments (0) Cite this document
A computer security incident can be a result of a computer virus, a system intruder, other malicious code, a sabotage from an insider or an outsider. The term may also cover to broadly describe incidents which resulted from rigorous malicious technical activity, and as expert replies, could produce severe damage (National Institute of Standards and Technology Technology Administration, 1997).
Download full paperFile format: .doc, available for editing
GRAB THE BEST PAPER96% of users find it useful
Secure Computer System
Read TextPreview

Extract of sample "Secure Computer System"

Download file to see previous pages Firewalls are the most common security measures for computer networks. Certain mechanisms are put in place in order to provide adequate security to protect resources on the trusted network against potential access by attackers. There are numerous mechanisms in network security, one of which is the DMZ or Demilitarised Zone. DMZ is a network which is semi-protected and is common to medium scale to large scale enterprise (Pickering, 2009).
DMZ has two (2) disadvantages: First, the firewall can be created to pass trusted'' services within the application gateway(s), thus, subverting the policy. The trusted'' services which get passed all around the application gateway typically end up being in contact with the site systems. Another disadvantage is placed on the routers for the
provision of security. Packet filtering routers seemed complex to configure and errors could disclose the whole site to security holes (Wack, 2009). Added by Pickering (2003), the application proxy firewalls usually require frequent software updating to run the latest versions of the proxy code. This is important particularly when new exploits are detected, needs to be blocked, and in the event when problems emerge interactions between the proxy as well as widely deployed applications. Meaning, when the proxy is found actually breaking.

3. Using a Microsoft XP or 2000 system, open Internet Explorer. Open Internet Options under the Tools menu. Examine the contents of the Security and Privacy tabs. How can these tabs be configured to provide: a) content filtering, and b) protection from unwanted items like cookies
Some actions that Microsoft XP or 2000 system allow a user to do in order to configure content, filtering, and protection from unwanted items like cookies are: 1. To personalize Windows XP settings for each user; and also 2. To assign user to create accounts and passwords in the computer to control the users who can access on the system. In other words, users who are not the "administrators" will have no access, unable to change critical system files or delete it. The system may also be upgraded by logging off from a regular user account, then, logging back in as ...Download file to see next pagesRead More
Cite this document
  • APA
  • MLA
(“Secure Computer System Essay Example | Topics and Well Written Essays - 750 words”, n.d.)
Retrieved from
(Secure Computer System Essay Example | Topics and Well Written Essays - 750 Words)
“Secure Computer System Essay Example | Topics and Well Written Essays - 750 Words”, n.d.
  • Cited: 0 times
Comments (0)
Click to create a comment or rate a document

CHECK THESE SAMPLES OF Secure Computer System

Secure Computer System - Case Studies

...Running Head: SECURE COMPUTER SYSTEM - CASE STUDIES Secure Computer System-Case Studies College: 432 Assume that you converted a section of the general office space into a server room. Describe the factors that you would consider when planning for each of the following a.walls and doors b.physical access control c.Fire detection d.Fire suppression e.heating,ventilating and air conditioning f.power quality and distribution Factors considered when converting a section of general office space to server room; firstly, the walls should not be close to exterior walls which could be damp because of containing water. Exterior walls...
11 Pages(2750 words)Case Study

Secure Computer Systems

...With the growing incidents of PII data theft and negligence in securing PII data. Stringent measures must be taken by the federal government and concerned government agencies. There should be frequent checks on the PII data security, in banks and hospitals apart from government agencies who store PII data in huge volumes .Partnerships with , major software companies like IBM (windows) and data security firms like RSA will help in reducing potential PII theft as security measures will be introduced during the software development stage. Quote .* "Improving data protection reduces risks associated with breaches and will enhance confidence in the government's ability to...
2 Pages(500 words)Essay

Secure Computer Systems Essay

...Secure Computer Systems (Computer Science) - Article of the Name of the Concerned Professor September 20, 2009 Secure Computer Systems (Computer Science) - Article Data security and privacy have emerged as primary concerns in the contemporary era of digitized economies and corporate operations. This issue has grabbed the attention of governments around the world. In the last decade, even in the US, the government has imposed many security and privacy related regulations on the...
6 Pages(1500 words)Essay

Computer system Network Security

...Network Security Network security is essential component as now-a-days information is computers are connected worldwide. Information is wealth for organisations. The computer systems are linked both internally and externally. The computers receive and send unlimited information2. Information lost is regarded as financial loss. As organisations are implementing paperless media and computerizing data the need for securing data at various stages become essential. Data is stored in various modes both online and offline1. The data stored online and offline opens up a threat by falling trap to potential hackers who intrude into our systems or network The issue of computer security first arose in the 1970s as individuals began to break... into...
5 Pages(1250 words)Essay

Computer Science Information System

...Case Study: of the Situation: From the case study of a fitness center, we derive at the following assumptions There are 5 centers around the metropolitan. 2. There are in total 650 members and 30 members at each location. 3. This system will be used by both members and fitness consultants to track participation in various fitness activities, such as free weights, volleyball, swimming, stair climbers, and yoga and aerobic classes. The DSS system will be implemented in the form of a client server model with an interface, possibly a computer visual display unit, at all the five centers and will act as a platform to the prospective and current members and consultants. They are able to...
3 Pages(750 words)Essay

Computer Information System

...Introduction In the world right now where technology has taken great leaps to reach a height that was never expected the use of computers in every business has almost become a necessity. Organizations operating across the globe find it important to use databases and huge computer networks to link their work around the world. Every organization looks for the best technology that is available to them according to their needs. Reasons for using Databases The need for having computers and databases helping organizations in business has been the result of some factors that I would like to mention here Competition Increase profits Expanding business globally Environment friendly...
3 Pages(750 words)Essay

Computer System Infomation

...Has Google identified the people, organization, and technology issues associated with its problem and solutions What are these issues Google is now transforming from a mere search engine technology company to, what its competitors perceive as, a full-fledged software company. The two important issues now confronting Google are, how to retain leadership in the core business it operates in and how it should prepare itself to be successful in the new areas of business it is entering into now. Technology Google has realized that even for its core product, the search engine, competition is emerging. Apart from giant like Microsoft, there are a couple of smaller players also who could come out with products that better google. Google... Google...
2 Pages(500 words)Essay

Computer System Crash

...may not be recoverable. However, there are several means by which data can secured, so that even if it cannot be recovered after a system crash, it can be accessed on a different machine. The most popular forms of external storage are USB mass storage devices, and external hard drives. The latter are usually able to store as much data as a PC, but the device can be connected and disconnected from a computer, and so data backed up using such devices will be safe in the event of a crash. Therefore, the most important rules are, firstly, to save all data regularly, and secondly, to save it in at least two ways, one of which should be on an external storage device. When a crash does...
1 Pages(250 words)Assignment

Picture Archive computer system

...Running head: PICTURE ARCHIVE AND COMMUNICATION SYSTEM Picture Archive and Communication System PACS: purpose and goals The picturearchiving and communication system (PACS) is prevalent in the field of medicine and can be defined as the imaging technology that provides efficient storage facility with easy access to images from various machine types. Almost all possible imaging instruments like computed and digital radiography, mammograms, ultrasound, computed tomography, magnetic resonance, etc have incorporated the use of PACS. It uses the Digital Imaging and Communications in Medicine (DICOM) format to store and share images. A standard regulation that...
2 Pages(500 words)Essay

Computer-Based information system

...Computer-based information systems of AT&T Telecommunication Company Computer-based information systems of AT&T Telecommunication Company For the last two decade, it had been considerably challenging for companies as well as individuals to get organizations that are willing and capable of providing both telephone and telegraph systems. Businesses were looking for an information system that would be able to carry out their telephone services, telegraphs and more importantly a system that would manage their information system. Successful attempts to offer these services led to the establishment of the...
2 Pages(500 words)Essay
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.

Let us find you another Essay on topic Secure Computer System for FREE!

Contact Us