StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

If computer security is the answer, what is the problem, and how can computer security solve that problem - Essay Example

Comments (0) Cite this document
Summary
This branch mainly deals with data protection from various adverse effects including theft or obliteration through national disasters…
Download full paperFile format: .doc, available for editing
GRAB THE BEST PAPER93.8% of users find it useful
If computer security is the answer, what is the problem, and how can computer security solve that problem
Read TextPreview

Extract of sample "If computer security is the answer, what is the problem, and how can computer security solve that problem"

Computer Security Computer Security Introduction Computer Security is defined as a branch of computer technology, which is applied to networks, and the general use of computers (Vacca 2009). This branch mainly deals with data protection from various adverse effects including theft or obliteration through national disasters (Bryant & O’Hallaron 2010). A recent study asserts that computer security entails various methodologies, which are used to protect certain information from unauthorized events (Gollmann 2011). This paper will discuss how computer security is regarded as the answer. This essay will also explain the problem related to computer security and the possible solution of this predicament.
As stated above, computer security deals with several issues, which are related to technology (Wong & Yeung 2009). Facebook is one of the most popular social network site globally (Kirkpatrick 2010). However, there are several security issues that pose a danger to the users. It is quite clear that Facebook has fallen victim to various security issues such as hacking, hoax applications, counterfeit product pages and affiliate spam among other issues (Stoll 2011). The number of facebook hackings has continually increased in the recent years. There are numerous aspects that make Facebook more prone to hacking since, most individuals usually post their personal information (Sterling 1993).
Ways of preventing hacking
This information enables the hackers steal the personal identity of the account (Reese 2008). Therefore, it is much easier to protect account hacking using computer security. There are several methodologies that can be employed to impede hackers from accessing a facebook account. These methodologies include using a strong password, logging out after finishing, changing the password more often and using an anti-spyware software (Erickson 2008).
Using complicated passwords is one of the best ways to deal with facebook security issues. In fact, individuals are advised to use complicated passwords, which hackers are not able to retrieve (Kabay & Bosworth 2011). This will ensure that their personal information and that of their friends is protected against any alterations. Facebook users are also supposed to logout immediately they are done using the social network (Tipton & Krause 2012). This is because another individual can download malware and key loggers which affect privacy terms of the account (Burger 1991).
Changing the password more often also reduces the chances of the account being hacked (Mitnick, Simon & Wozniak 2011). This toughens the ability of the hackers to find out the password. However, it is advisable to note the password somewhere so that it is easy to remember. Antivirus software and an anti-spyware are of significance to any social networker (Cole & Ring 2006). These programs are liable for tracking down the web browsing history of an individual. Furthermore, most experts have proven it is not advisable to use Internet Explorer when browsing based on several security problems related to this program (Pemberton 2010). Internet Explorer does not prevent cross-site linking, therefore; dangerous links are able to pop up (Gutwirth, Poullet, Hert & Leenes 2011).
Conclusion
In conclusion, an individual should make sure that the security settings on his or her social network profile are intact (Innovention Lab 2009). The methods used in computer technology are extremely different from other computer technologies (Graves 2008). In most cases, the problems related to computer security are encountered on the internet as depicted in the information.
References
Bryant, R & O’Hallaron, D 2010, Computer systems: a programmer’s perspective, Addison Wesley Press, California.
Erickson, J 2008, Hacking: the art of exploration, No Starch Press, Northern California.
Gollmann, D 2011, Computer security, Wiley Press, New York.
Graves, M 2008, Computer technology encyclopedia, Cengage Press, Mason.
Gutwirth, S, Poullet, Y, Hert, P & Leenes, R 2011, Computers, privacy and data protection: an element of choice, Springer Press, New York.
Innovention Lab, 2009, Internet password organizer (R): mate, CreateSpace Independent Publishing Platform, United States.
Kabay, M & Bosworth, S 2011, Computer security handbook, Wiley Press, New York.
Kirkpatrick, D 2010, The facebook effect: the inside story of the company that is connecting the world, Simon & Schuster Press, New York.
Mitnick, K, Simon, W &Wozniak, S 2011, Ghost in the wires: my adventures as the world’s most wanted hacker, Little, Brown and Company Publishers, New York.
Pemberton, R 2010, My website password organizer: one place to organize every website login and password, CreateSpace Independent Publishing Platform, United States.
Reese, R 2008, Personal internet accounts organizer: one place to organize every login and password, CreateSpace Independent Publishing Platform, United States.
Stoll, C 2011, Cuckoo’s egg: tracking a spy through the maze of computer espionage, Pocket books, New York.
Tipton, H & Krause, M 2012, Information security management handbook, Auerbach Publishers, California.
Vacca, J 2009, Computer and information security handbook, Morgan Kaufmann Publishers, United States.
Wong, A & Yeung, A 2009, Network infrastructure security, Springer Press, New York. Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“If computer security is the answer, what is the problem, and how can Essay”, n.d.)
If computer security is the answer, what is the problem, and how can Essay. Retrieved from https://studentshare.org/miscellaneous/1602027-if-computer-security-is-the-answer-what-is-the-problem-and-how-can-computer-security-solve-that-problem
(If Computer Security Is the Answer, What Is the Problem, and How Can Essay)
If Computer Security Is the Answer, What Is the Problem, and How Can Essay. https://studentshare.org/miscellaneous/1602027-if-computer-security-is-the-answer-what-is-the-problem-and-how-can-computer-security-solve-that-problem.
“If Computer Security Is the Answer, What Is the Problem, and How Can Essay”, n.d. https://studentshare.org/miscellaneous/1602027-if-computer-security-is-the-answer-what-is-the-problem-and-how-can-computer-security-solve-that-problem.
  • Cited: 0 times
Comments (0)
Click to create a comment or rate a document

CHECK THESE SAMPLES OF If computer security is the answer, what is the problem, and how can computer security solve that problem

Computer security

...? Computer Security of the of the Concerned August 31, Computer Security Introduction The Information Revolution and the accompanying developments in hardware and software research have changed forever the way businesses, economies, institutions and organizations interact and conduct business with each other. With the digitization of the world economies, the wealth of the world is no more confined to banks and security vaults, but has also come to reside in the servers and computers scattered across corporations and financial institutions, in the form of bits and bytes. It would not be wrong to say that much of the wealth of the world today exists today in a digitized form (Gollmann, 1999, p. 6). Once, one comes to terms... with this...
6 Pages(1500 words)Term Paper

Computer Security

...? Computer security Threat Modeling Attack goals The attack goal in to access and view sensitive encrypted files stored in Alice’s laptop located in her workspace. Attacker The attacker is Charlie who can only access the physical location within 43 minutes only. He plans to do it single handedly within 9 days. Security Assumption Physical location access is restricted to only 43 minutes, which is far less time to carry access the encrypted files. Also it is assumed the AES encryption method deployed by Alice is secure enough to restrict unauthorized access to the encrypted file as well as the fact that the password used is strong enough to warrant random...
8 Pages(2000 words)Essay

Computer Security

...the basic design and deployment of computer systems, which form a major chunk of the issue. These misguided incentives begin with what economists call a moral hazard effect which resulted in a landslide of fraud. Other incentives include consumer’s lack of prioritizing on security measures which resulted in their minimum spending on software security. This is referred to by economists as ‘The tragedy of the commons’ with consumer’s unwilling to spend on measures that did not directly benefit them. Third is the failure in privacy and prolonged regulatory issues due to poor allocation of online risks. Last is the ability of these incentives to affect defense and offense strategies. With...
3 Pages(750 words)Essay

Computer Security

...if the private sector assumes a leading role since it has the expertise to protect security risks inherent in the sector. However, he also believes that coordination problems and unequal distribution of the benefits and burdens of the system can be efficiently managed if the government heads its footstep towards the industry. Hence, the author concludes that information security in the Retail Payment Industry can be strengthened by involving the federal government as an active partner between public and private groups to establish security standards and frameworks which will protect the interests of stakeholders. The second paper...
3 Pages(750 words)Essay

Computer security

...?Assessment Computer Security Program Matriculation number Word Count: 1526 words Contents 3 Introduction 4 IdentifyingThreats and Vulnerabilities 4 Examination of the Security Principles Broken 4 Recommendations 5 References 7 Abstract Computer security refers to the minimization of vulnerabilities to assets and resources. There is no such thing has 100% security, although one can get close to it. The case study provides an example of how security lapses can occur and expose the system’s vulnerabilities. This paper looks into the threats and vulnerabilities that the...
6 Pages(1500 words)Essay

Computer Security

...?Did you change your social network setting after these readings? How can social networks disclose health information? What are the possible negativeconsequences of this? With the review of the provided literature the fact that social networking and the pleasure that one derives from being a part of a virtual community might come at a price is brought to light. To update your privacy settings or to at the very least review the privacy policies of social communities that you are members of is a necessary precaution. This is mainly due to the fact that although online social networks offer exciting new opportunities for interaction and communication but due to their vast membership and easily identifiable...
2 Pages(500 words)Essay

Computer Security

...?Q: Return to the discussion of how spam has or has not changed the infrastructure. Has this changed your perspective? What could incent ISPs to improve detection in terms of architecture and disclosure? How might that empower attackers? My perspective has greatly changed when I look at the effect that spam has had on the infrastructure of technology. Spam, spyware, identity and data theft are a form of technological abuse that have brought along noticeable shifts in the technological infrastructure. Spyware the term loosely describes a new class of computer software that may track user activities online and offline, provide targeted advertising and engage in other types of activities that users describe as invasive or undesirable... , out of...
2 Pages(500 words)Essay

Computer Security

...on the same can be built. Problem Statements With the desire to be an information rich and a paperless society, technological innovations and inventions have been set up to help in attaining this goal globally. In this effect, a major problem has risen based on the negligence of both business organizations and individuals whose operations are based on computers to use even the most basic computer security solutions available to safeguard their online transaction activities even with the current threat of quite a number of security exploits in the online computing activities. The reasons, effects, and...
30 Pages(7500 words)Essay

Computer security

...A Report on Computer security for Oracle Inc Report of the Topic The topic reports that computer security is an essential aspect that Oracle Corporation emphasizes to the users to enable them avoid cases of hacking. Oracle Corporation is the world’s principal software company for the database enhancement. The article is significant since it exposes aspects about hacking as a grave offense that can affect the reliability and status of an individual or an organization. In March 2011, Oracle experienced this crisis when its Website was hacked by Cernaianu Manole Razvan (Lennon, 2012). This made the users of the Website encounter difficulty in accessing data...
1 Pages(250 words)Essay

Computer security

...are necessary. Is it ethical to teach solutions to computer problems? Yes, it is ethical and widely acknowledged learning the solutions to computer problems. People should be trained and taught about the computer problems so as to know what it is they should anticipate when using the devices (Tompsett 2009). Similarly, they should be taught these solutions to be suspicious of people who may attempt to prank and trick them into gifting out their personal details and so that they can quest for if, they intentionally give out personal details without license or permission. Computer users and must always...
6 Pages(1500 words)Essay
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.

Let us find you another Essay on topic If computer security is the answer, what is the problem, and how can computer security solve that problem for FREE!

Contact Us