Computer Essay

863 words - 4 pages


Security Threat What can organizations do to keep their information secure from each threat?
Computer Virus
• Description: Virus is software which is used to contaminate a computer. The virus code is hidden within an existing program and when that program is executed, the virus code is turn on and infects other programs in the computer and other computers in the network.
• Impact: The virus may be a trouble-free that pops up a message on screen out or it can destroy data in a minute or on a particular date.
• Example: The well-known Michelangelo virus infected the computers on Michelangelo's birthday. http://www.pcmag.com/encyclopedia/term/53963/virus


• Technology (software, hardware):
Anti-virus software (such as Norton, Panda, and AVG anti-virus) has to use in every organisation.
Hardware: Firewall is used both as software as well as hardware and this mechanism is used to protect a system from network attacks, by blocking all unused ports for the system's operational purposes.
Organizational strategies (policies, leadership, training, etc.) The development of information systems security policies regarding e-mail usage and the use of software is the first step. The policy puts into written form the organization’s emphasis on the proper use of e-mail and software installation.
Organisations must provide the training to the employees so they can understand the threat involved with the opening and downloading unknown emails and programs.
Adware
Description: http://www.techterms.com/definition/adware
It is free software which is maintained by commercials.
Impact: Most adware is not dangerous to use. However some of them can act as spyware and can gather information from your computer and the visited Web sites you.
Example Web browser add-ons, like the Alexa toolbar.
http://www.oucs.ox.ac.uk/viruses/otherinfo/adware.xml
Technology
Software: Anti-spyware
Hardware: Firewalls can be helpful.
Organizational strategies (policies, leadership, training, etc.)
Training to the Employees so that they can make sure they really required a program before downloading it and for every download read licensing agreements. Beware of clickable advertisements.
http://au.norton.com/catch-spyware-before/article
Spyware
• Description: Spyware is a type of malware that is installed on a computer without the knowledge of the owner in order to collect the owner’s private information.
• Impact: Spyware can also affect the performance of computer negatively and steal user’s personal information.
http://www.pctools.com/security-news/what-is-spyware/ Data
http://searchsecurity.techtarget.com/definition/spyware
Example : Keylogger(SpyAnytime),GATOR


Technology
Software: Anti-spyware Software is required to detect, block and remove spyware. However, some anti-virus software can be used to deal with Spyware.
Hardware: Firewall can also be helpful.
Organizational strategies (policies, leadership, training, etc.) ...

Find Another Essay On computer

Computer Crimes Essay

1101 words - 4 pages Computer Crimes Computer crimes are a major issue in the world today. They are taken place in people’s home, office, and in lots of places. A person should be very cautious about the type of personal information that they enter on there someone else’s computer as well as there own. These things could come back to haunt you in the future. Criminal activity where a computer or network is the source, target, place or tool of a crime is what we

hardware computer Essay

1551 words - 7 pages Hardware Computer Information System has became popular all around the world, due to its rapid growth. In current days, almost every single person is using IS in their daily life. Information System lead to a great change in people`s life style, it is any kind of systems and it consist of six main elements which are people, hardware, software, communication network, data resources, policies and

Computer viruses

3440 words - 14 pages Research paper on Computer Virus, Computer Worms and Trojan HorseComputer VirusesFor a layman who has little knowledge about the language of computers, there is no difference among virus, worm and Trojan horse. These three concepts are often used interchangeably because they are all malicious programs that can destroy files and data and cause damage to the computers. In this sense they are similar. They are, however, different. This report aims

Computer programming

1304 words - 5 pages COMPUTER SCIENCE COMPUTER SCIENTIST/PROGRAMMER The rapid spread of computers and computer-based technologies over the past two decades has generated a need for skilled, highly trained workers to design and develop hardware and software and to make computer systems newer and more advanced ones. Computer scientist generally design computers and conduct research to improve their design or use, and develop and adapt principles for applying computers

My Computer

651 words - 3 pages When we connect to the Internet or let other people to use your PC, we must make sure that our sensitive information remains safe and secure from other people or virus. Specially, if you share files with others and connect to public network to surf Web pages you should take steps to protect your computer from harm. Because hackers can attack on your computer, by breaking into your computer through the Internet and stealing your personal

Computer Crime

1822 words - 7 pages Computer Crime Almost every major political candidate in recent history has used, and often exploited, on of the many facets of crime to attempt to convince American voters that they can feel secure and safe with the candidate at the leadership helm, coveted feelings in a tumultuous world. As a result, we have more policemen patrolling the streets, laws such as the death penalty and “three strikes your out”, proposed increases to defenses

computer development

1167 words - 5 pages As computers have become less expensive, they have been purchased by more and more families for their homes. As a result, more youths and children have started to use computers at earlier ages. Even if there is not a computer available at home, it’s guaranteed that the youth will come into contact with a computer somewhere else, such as school. This may have not been the case a couple decades ago and with that said, computers have been evolving

Computer Science

914 words - 4 pages Computer Science Computer science dates back to about 1960, although the electronic digital computer that was the object of its study was invented only two decades earlier. The field of science has grown extensively due to the development of the computer. Computers have moved into every nook and cranny of our daily lives. People use them in education, retailing, law enforcement, transportation, agriculture, homes, medicine, and an

Computer Ethics

967 words - 4 pages One of the major concerns for business currently is Computer Ethics (CE) or information ethics. Computer Ethics is a new division of ethics growing and changing at a startling rate as technology evolves. The term "Computer Ethics" can be interpreted from different perspectives. For instance, as explained by Luciano Floridi, Computer Ethics can be viewed as the efforts of professional philosophers to apply traditional ethical theories, for

computer purchase

1531 words - 7 pages When purchasing a computer, there are many things you should consider before spending the money on technology that will be obsolete in a couple of years. There are a couple of questions I would ask myself before purchasing a computer. The first question would be is the computer dedicated to just one single purpose such as home security system or is it an all-around computer that can handle any type of command and or operation you put to it from

Computer Engineers

1973 words - 8 pages Job Description:Computer engineers develop the internal parts of computers. An example of an engineer is an employee of computer giant Intel, who helps design and develop the processor chip in the computers we use in our everyday lives. They also design and develop graphics card accelerators (which allow computer monitors to display high-quality graphics quickly), and motherboards (which act as the communication interface between the CPU, memory

Similar Essays

Computer Essay

1910 words - 8 pages Future Computer Could you imagine that if computers were not created, and what would our lives be like today? However, computers are a part of human life and people cannot live without computers, especially in developed countries. From manufacturers, schools, companies, and families are equipped with computers, because computers have been invented to better our lives. In the past decade, humans were concentrating on improving computers&iexcl

Computer Essay

9709 words - 39 pages 11.7 Web Based Services 228 Exercises 228 CHAPTER 12 COMPUTER ETHICS 229 12.1 Data Security 230 12.2 Computer Crime 230 12.3 Cracking 232 12.4 Work, Family and Leisure 232 Exercises 232 1 CHAPTER I OBJECT ORIENTED CONCEPTS USING C++ 1.1 Object Oriented Programming Language A computer is a tool to solve a wide range of problems. The solutions to the problems are in the form of computer programs or application software. These programs are written

Computer Mouse Essay

734 words - 3 pages The computer mouse is an input device that uses a graphical user interface. Computers that incorporate the graphical user interface into their system are able to use the computer mouse to maneuver around the computers different applications. The mouse is used in many different applications including engineering and computer games. When using the computer mouse with the graphical user interface you move the mouse along a flat level surface. The

Computer Security Essay

540 words - 2 pages NOT TOO INDEPTH BUT COVERS BASICS -The book Computer Security written by Time Life Books, explains what computer security is, how it works, and how it affects peoples lives. Without computer security peoples private information can be stolen right off their computer.Computer security is exactly what it sounds like. It is security on a computer to prevent people from accessing a computer. It is very difficult to secure a computer for a computer
Mytha - Denganmu Cinta.mp3 | Read more | Z Nation 7.8