StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Computer security proposal report - Assignment Example

Comments (0) Cite this document
Summary
In the past few years, the computer security has turned out to be a well-known term for the business organizations as well as individuals who use computers. Basically, computer security is a commonly used term which encompasses a wide variety of information and computing…
Download full paperFile format: .doc, available for editing
GRAB THE BEST PAPER95.1% of users find it useful
Computer security proposal report
Read TextPreview

Extract of sample "Computer security proposal report"

ID # Computer Security Proposal Outline In the past few years, the computer security has turned out to be a well-known term for the business organizations as well as individuals who use computers. Basically, computer security is a commonly used term which encompasses a wide variety of information and computing information processing capabilities. Without a doubt, business organizations that heavily rely on networks and computer systems to carry out on a daily basis business operations and transactions as well as access vital information with regard to their data as a significant element of their overall assets. In simple words, computer security is the way of securing and identifying unlawful or illegal use of personal computer. In this scenario, there are a large number of prevention tools and techniques that help stop illegal users (as well recognized as "intruders") from getting access to any part of a computer system. In addition, detection allows us to find out whether or not someone has tried to force an entry our system, or they were successful, as well as what they may have access from the system (Armor2net Software Ltd.; Red Hat®, Inc. ; Jaeger). The basic purpose of my research is to discuss computer security issues and their solutions. In this scenario, this paper outlines the plan for the overall research. The basic purpose of this research is to identify the latest security threats. This research will also discuss solutions that can be adopted by business organizations and individuals to deal with these security threats.
Topic
What are some effective computer security threats and solutions?
Thesis Statement
Effective computer security measures can help reduce security threats.
Background
The concept of computer security is not a new idea. It has been under discussion for a long time and its history can be traced back to the first use of the computer system. Up till now, computer security has remained a serious challenge for the business organizations as well as individuals.
Student Expertise
I have been excited to learn about what actually computer security is? My interest lies in exploring some of the serious computer security issues that cause serious challenges for computer users. I also want to explore security solutions that can be adopted to deal with these issues.
Research Methodology
The primary source of data collection would be the Internet. I would research on the internet and would get information from different journals and articles to recognize the latest security issues and solutions.
I will also conduct surveys and interviews from the people who have suffered from these security threats. The basic purpose of these interviews and surveys would be to analyze some common trends and problems. The examples of these sources could be IT managers of different firms, research articles, computer professionals, the Internet and libraries.
Timeline
Table 1 outlines the plan for my research:
Table 1Timeplan
Duration
Milestone
1 month
Introduction and Primary Research
1 month
Literature Review
1 month
Data collection and Analysis
1-2 months
Performing experiments and finalizing the work
Works Cited
Armor2net Software Ltd. Why is the computer security important? 2013. 27 January 2013 .
Jaeger, Trent. Chapter1: What is Computer Security? 2011. 17 January 2013 .
Red Hat®, Inc. . 42.1.1. What is Computer Security? 2013. 18 January 2013 . Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Computer security proposal report Assignment Example | Topics and Well Written Essays - 500 words”, n.d.)
Computer security proposal report Assignment Example | Topics and Well Written Essays - 500 words. Retrieved from https://studentshare.org/miscellaneous/1613824-computer-security-proposal-report
(Computer Security Proposal Report Assignment Example | Topics and Well Written Essays - 500 Words)
Computer Security Proposal Report Assignment Example | Topics and Well Written Essays - 500 Words. https://studentshare.org/miscellaneous/1613824-computer-security-proposal-report.
“Computer Security Proposal Report Assignment Example | Topics and Well Written Essays - 500 Words”, n.d. https://studentshare.org/miscellaneous/1613824-computer-security-proposal-report.
  • Cited: 0 times
Comments (0)
Click to create a comment or rate a document

CHECK THESE SAMPLES OF Computer security proposal report

Computer security

...? Computer Security of the of the Concerned August 31, Computer Security Introduction The Information Revolution and the accompanying developments in hardware and software research have changed forever the way businesses, economies, institutions and organizations interact and conduct business with each other. With the digitization of the world economies, the wealth of the world is no more confined to banks and security vaults, but has also come to reside in the servers and computers scattered across corporations and financial institutions, in the form of bits and bytes. It would not be wrong to say that much of the wealth of the world today exists today in a digitized form (Gollmann, 1999, p. 6). Once, one comes to terms... with this...
6 Pages(1500 words)Term Paper

Computer Security

...? Computer security Threat Modeling Attack goals The attack goal in to access and view sensitive encrypted files stored in Alice’s laptop located in her workspace. Attacker The attacker is Charlie who can only access the physical location within 43 minutes only. He plans to do it single handedly within 9 days. Security Assumption Physical location access is restricted to only 43 minutes, which is far less time to carry access the encrypted files. Also it is assumed the AES encryption method deployed by Alice is secure enough to restrict unauthorized access to the encrypted file as well as the fact that the password used is strong enough to warrant random guess (Eran...
8 Pages(2000 words)Essay

Computer Security

...the basic design and deployment of computer systems, which form a major chunk of the issue. These misguided incentives begin with what economists call a moral hazard effect which resulted in a landslide of fraud. Other incentives include consumer’s lack of prioritizing on security measures which resulted in their minimum spending on software security. This is referred to by economists as ‘The tragedy of the commons’ with consumer’s unwilling to spend on measures that did not directly benefit them. Third is the failure in privacy and prolonged regulatory issues due to poor allocation of online risks. Last is the ability of these incentives to affect defense and offense strategies. With...
3 Pages(750 words)Essay

Computer Security

...associated with security breaches according to cardholders, merchants, financial institutions, cost of breaches and compliance. In addition to that, it has discussed compliance issues and identified significant data breaches that have occurred in the US Retail Payment Industry. More importantly, it has recognized and discussed critical public policy related issues with an emphasis on data notification laws and the role of Federal Trade commission in tightening up security risks. The paper has also proposed a framework to upgrade the current system with the potential Chip and PIN based dynamic network procedure which will mitigate the risks associated with security...
3 Pages(750 words)Essay

Computer security

... with greater responsibility than the junior officer. One of the security principles is that the responsibility of the employees should be made explicit (Swanson & Guttman 1996). The event shows a breach of this principle with the attitude of the duty manager representing lack of responsibility. Moreover, a password to important and valuable information of the company needs to remain the knowledge of a selected group of authorized personnel. Giving away the password to a junior officer takes away the meaning and purpose of setting a password in the first place. Recommendations I propose the following recommendations to improve the security of the computer systems and to minimize the threats and vulnerabilities. One of the foremost... ...
6 Pages(1500 words)Essay

Computer Security

...personal information revelation behavior of millions of people to friends as well as complete strangers. Millions of people around the world use social networks like Friendster, MySpace, Facebook to communicate, find friends, dates and jobs – and in doing so they wittingly reveal highly personal information about themselves to everyone. With the burst in advertising of these social networks most of them now days encourage users to reveal highly personal information. This includes their dates of birth, cell phone numbers, addresses and highly confidential health information. The weak structural design of social networks in terms of security and access controls is cleverly concealed by a false sense of...
2 Pages(500 words)Essay

Computer Security

...?Q: Return to the discussion of how spam has or has not changed the infrastructure. Has this changed your perspective? What could incent ISPs to improve detection in terms of architecture and disclosure? How might that empower attackers? My perspective has greatly changed when I look at the effect that spam has had on the infrastructure of technology. Spam, spyware, identity and data theft are a form of technological abuse that have brought along noticeable shifts in the technological infrastructure. Spyware the term loosely describes a new class of computer software that may track user activities online and offline, provide targeted advertising and engage in other types of activities that users describe as invasive or undesirable... , out of...
2 Pages(500 words)Essay

Computer Security

...are executed with a woefully inadequate strategy, considering a frighteningly short time horizon. In this research a proposal of an offensive defense comprising of a corporate partnership with successful cyber defense software companies to provide a united front against malware is of the highest preference. The initial capital investment of free anti-virus software to users would be offset in time by added security and stability. The key to which is integration of the social subsystem in order to execute such a strategy. Computer users’ basic lack of knowledge on the dangers that lie within the network system, such as the use of weak passwords or just trusting any e-mails sent to their...
30 Pages(7500 words)Essay

Computer security

...A Report on Computer security for Oracle Inc Report of the Topic The topic reports that computer security is an essential aspect that Oracle Corporation emphasizes to the users to enable them avoid cases of hacking. Oracle Corporation is the world’s principal software company for the database enhancement. The article is significant since it exposes aspects about hacking as a grave offense that can affect the reliability and status of an individual or an organization. In March 2011, Oracle experienced this crisis when its Website was hacked by Cernaianu Manole Razvan (Lennon, 2012). This made the users of the Website...
1 Pages(250 words)Essay

Computer security

...COMPUTER SCIENCES AND INFORMATION TECHNOLOGY ID, LAST A report on computer security licensing Computer sciences and information technology Name Student number Course code and title Date Executive Summary The report seeks to discuss computer security licensing as well as its contribution to technology to date. The report also attempts to study if the removal and elimination of the computer security measures lead to a step-down in the incidence of computer fraud. Similarly, the report discusses if it is ethical to teach...
6 Pages(1500 words)Essay
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.

Let us find you another Assignment on topic Computer security proposal report for FREE!

Contact Us