StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Computer System Safety Standard - Research Paper Example

Cite this document
Summary
The paper "Computer System Safety Standard" focuses on the critical analysis of the major issues on the standard of computer system safety. System safety involves specific safety standards within given constraints in operation. It involves risk management and avoidance of injury…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER92.3% of users find it useful
Computer System Safety Standard
Read Text Preview

Extract of sample "Computer System Safety Standard"

System Safety System safety involves specific safety standard within given constraints in operation. It involves risk management and avoidance from injury or any kind of damages to a working system, that is, a computer system. A system is a set of detailed or programmed processes and methods that follow or abide by a set of routines or procedures in order to carry out a given task, and, therefore, carry it to the end (Leveson 33). The safety of a system will also involve protection of a system from processes that may cause it to crush. Computer System Safety System safety generally involves the security and reliability elements within a computer. Today, people, organizations, and companies are all technologically advancing, and information technology is a backbone of these advancements. All these technological changes are controlled potentially by a computer, making a computer system the most delicate device in the world, and, therefore, a lot has been done to make computers more reliable and safe by implementing security measures that protect their environs (Leveson 38). These computers are all controlled by systems incorporated in them. These systems have general security measures. Computer system safety includes software protection, processes safety, site safety, and the computer security itself. Software safety is provided by a complex of security measures against programs that affect a system. It involves recognizing and neutralizing security threats and prevention measures against substances affecting normal operation of computer software. These threats include: a) Trojan horse It is when software disguised as something else is installed in a system with the awareness of a system manager. The Trojan horses contain either a trigger that sets itself when a specific event reaches or occurs in a system or a back door which allows entry of different users into a system when Trojan-infected software is in use. b) Viruses Viruses constitute the most common threat for a system. They work by replicating themselves and then spreading into a system’s sub-system. Through this entry, they attack and destroy the host system. c) Worms They attack and consume available resources quietly, overloading a system and finally making it dysfunctional. They work by reproducing and spreading as wide as possible in a system so as to achieve their goal, and they are always developed for only a certain type of system. Worms are primarily aimed at high or large systems to collect data and feed it to unauthorised users. (Storey 27) d) Websites This happens when malicious websites that support security holes and use them in certain technologies in a network trigger an organizations web browser to do and perform unauthorised functions and entry in the system. e) Hacking It was originally referred to as computer system and programming language learning process, but, after abuse of this, hacking now involves the practice of entry into a computer system by bypassing the recommended ways with different motives. f) Logic bombs This is a portion of software or a program that lies dormant for some time till specific program logic is triggered or activated (Storey 28). It can either wait for a particular file or mail to arrive in a system over the internet, and, if it sees the message, it activates the code, or it is triggered by a timer set activator, that is, the event occurs when a certain set time arrives. g) Malicious code This is a code intended to destroy or damage a computer system or steal information from it. It is also known as malware, and it is a form of a virus (Storey 28). Prevention of System Threats a) Limiting exposure to system threats by introducing risk management and, consequently, minimizing the risk exposure of a system; b) Ensuring that a system and sensitive data located in it remain secure by safeguarding a system against data loss and crime. c) Using of the firewall to prevent foreign and suspicious files into a system from the internet. d) Authenticating users, to ensure that only the official or authorized users receive access to a system. e) Use of IP security protocol and secure socket layer (SSL) that are encryption and network protocols respectively keeping the system from hacking (Daniels 32). f) Use of passwords and encryption of data within a system to prevent unauthorized access or entry into it. g) Using of antivirus to prevent a system from being attacked by viruses and malware. h) Use of digital signatures and packet filters to prevent a system from receiving foreign files and documents from the internet. i) Use of proxy servers and network address translators to prevent a system from unknown mails and hide the private IP addresses from users of the internet (Daniels 32). Computer system safety also involves development and implementation of a system’s security. During these processes, such measures are required as data protection on storage, keeping of maintenance, and testing documents (Dunn 50). Here, the safety of the developing system correctness relies heavily on information collection, analysis of the collected data, designing of a system, and, lastly, how the records are kept or stored. Then there is the maintenance process, during which a system undergoes renovation and changes to fit with the changes in its environment and demands, so that it will be reliable to the current users and the system’s beneficiaries. Its reliability increases the system safety and safety of users of the system. During the testing phase of the system, this happens when the system is already done with the design phase. Testing is done to approve and verify that a system can perform according to its requirements and specifications; a system undergoes tests, so that its owners can ensure it will be safe and secure. During the implementation process, a system’s safety is the main agenda because all the factors and measures are deployed, passwords and antivirus are installed, and introduction of firewalls and all required security measures is performed (Dunn 51). Process Safety A process is simply a task. Process safety denotes distinctive standards put in place to engineer the general format and instructions to be followed when developing a certain thing. Process safety is creating a path to follow in production of a product in an industry. In computer, process safety involves many areas of computer usage. These areas include launching and running programs, developing software, securing an already processed process, and storing the process in a system (Dunn 77). All these processes have general instruction to follow and, therefore, share common security measures. The process safety will involve the following objectives: a) Convenience Allows a computer system to be convenient and, consequently, to properly accomplish its role, providing safety. b) Ability to transform Attacks on a system always come in different forms. The system should have the ability to accommodate changes of the environment to counterattack the new forms of interruptions from attacks. c) Efficiency Allow the processes to run efficiently in a system, avoiding interruption and crushing. Efficiency also entails the ability of a system to safely and correctly process a task and produce the expected results. Services provides by system safety on process safety. a) Error detection management and the response to notification about errors; at that, both the internal and external errors are considered. b) Control of the processes. Execution of a process should take place or occur on a safe platform. c) Resources management. A system should manage the available resources so as not to be misused and allow the required resources to be used (Storey 92). System safety achievements as regards process safety: a) Information security and safety; b) Resource management and scheduling; c) Process management and memory management; d) Process structure and design. In process safety within a computer environs, tasks are controlled by threads, which are the executable states of a process. For a process to be safe, the threads need to be executed properly and securely without interruptions like traps and blockage of a thread from execution or performing its function. The threads are controlled by the kernel and the microkernel that make sure the process is executed to the end (Ross 104). Conclusion on a Computer System Safety A computer is a well established electronic device that is controlled by an operating system that controls the operation of the computer. This system relies heavily on the safety measures to be more reliable and efficient. System safety measures are implemented forms of protecting a system from external and internal factors (Ross 86). Works Cited Daniels, B. K. Achieving Safety And Reliability With Computer Systems. London: Elsevier Applied Science, 1987. Print. Dunn, William R. Practical Design Of Safety-Critical Computer System. New York: Reliability Press, 2002. Print. Leveson, Nancy G. Safeware: System Safety And Computers. Washington: Addison-Wesley Proffessional, 1995. Print. Ross, Charles W. Computer Systems For Occupational Safety And Health Management. Massachusetts : M. Dekker, 1991. Print. Storey, Neil. Safety-Critical Computer System. Washington: Addison-Wesley, 1996. Print. Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“System safety Research Paper Example | Topics and Well Written Essays - 1500 words”, n.d.)
Retrieved from https://studentshare.org/miscellaneous/1595378-system-safety
(System Safety Research Paper Example | Topics and Well Written Essays - 1500 Words)
https://studentshare.org/miscellaneous/1595378-system-safety.
“System Safety Research Paper Example | Topics and Well Written Essays - 1500 Words”, n.d. https://studentshare.org/miscellaneous/1595378-system-safety.
  • Cited: 0 times

CHECK THESE SAMPLES OF Computer System Safety Standard

Technology and Human Error in Aviation

It may ensure airport and aircraft safety against accidents, unpleasant incidents, and delays; and give automatic weather reports so as to warn pilots of the coming weather conditions.... They need to be rewarded when they follow safety rule and the lack of tangible reward for this individual will tend him to twist or break rules.... Thus, every sector in the aviation system must find all facets where computers may be leveraged on to their advantage....
14 Pages (3500 words) Term Paper

Systems Management and Security of Standard Chartered Bank

The company that is the subject of this research is standard Chartered, one of the leading international organizations in the banking sector.... To sum up, the quest to provide premium service and a flawless IT security is an ongoing battle as constant changes need to be made by ascertaining, evaluating and monitoring the current trend of the security environment thus enabling standard Chartered Bank to stay one step ahead of the competition and criminals who are always on the lookout for vulnerabilities in the online banking system....
8 Pages (2000 words) Essay

Computer versus Paper Charting for Nurses

Another reason for the standard of clear documentation is the possibility of the legal use of the record.... For example, these records are frequently investigated for insurance clams and when medical care is being referred to or questioned by the legal system, the chart contents are frequently cited in court.... his essay compares computer and paper charting methods and also discusses in detail the history of charting technology; reveal medication errors in computerized and non-computerized charting, illegibility of orders and double charting, and accuracy....
7 Pages (1750 words) Essay

Standard Operating Preocedure For Sales/Customer Services, Manufacturing And Quality Control Of Desktop Computer Systems

standard OPERATING PROCEDURE PAGE OF 7 ---------------------------------------------------------------------------------------------------------------- ... UBJECT: standard OPERATING PREOCEDURE FOR SALES/CUSTOMER SERVICES, MANUFACTURING AND QUALITY CONTROL OF DESKTOP COMPUTER SYSTEMS ... ISO 9001:2008 is a compulsory standard for all suppliers in this project.... standard OPERATING PROCEDURE ... The quality department will be responsible for ensuring the highest standard are met and that the built computers run without any hitch....
3 Pages (750 words) Assignment

Electromagnetic Compatibility: Railway Signalling System

While EN 50121 is the main standard laid for the railways, there are subgroups of this standard that cater to various aspects of the railways' operation.... While safety Integrity Level standards require that the test and verification should be carried out by a team independent of the developers of the software, a verification report is needed which states that the software has passed the required tests.... EMC on the face of it may not be specifically safety-related, but it certainly forms the important part of safety regulations for all the railway systems....
6 Pages (1500 words) Term Paper

InterContinental Hotels Group Computer System Update

The paper "InterContinental Hotels Group computer system Update" discusses the characteristics of the hardware and software (including functionality details) that the hotel should purchase to satisfy the requirements, instructions on how to set up the computer, including all the installations.... There are different form factors manufactured by various designers, but all of them fit in standard cases, depending on the structure of the computer system.... Therefore, in upgrading the computer system, we have to consider the computer system required....
8 Pages (2000 words) Assignment

Fire Safety in Tunnels and the Effects of Ventilation

This literature review "Fire safety in Tunnels and the Effects of Ventilation" presents fast growth in computer technology and hardware development that has led to the simulation of hectic and complex technological and scientific problems.... The model is also used to show that, an engineering consultant on fire protection may effectively predict results using a computer model (Forney, 2004)....
10 Pages (2500 words) Literature review

Computer Mediated Clinical Consultations

During the last four decades, the use of computers in health care has increasingly become the standard (Benson, 2002a).... Their use improves certain elements of consultation as they improve the integrity of medical records, in addition to the increase in patient safety, and accuracy of prescriptions.... It further examines medical records and their roles, the introduction of computers in supporting clinical consultations, as well as the impact of Computer-mediated clinical consultations on patient care and the health system....
6 Pages (1500 words) Essay
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us