Thursday, May 14, 2020

Security in the Computer World - 1132 Words

INTRODUCTION The main purpose of security is to protect assets. Looking back into history, the big walls acted as a safeguard to a fortress or a kingdom. There were massive and strong doors which stopped any perpetuator from entering without permission. The same thing applies in the computer world, with the only difference being that its virtual. There are closed networks and open networks. The closed networks are available for a person who belongs to that entity. On the other hand, open networks are available for the rest of the people. Previously, networks were designed as closed for a set of people and sites which do not connect to other people. With the advent of personal computers, LANs, and the wide-open world of the Internet,†¦show more content†¦This paper generally aims at understanding the need for business security in terms of some very uncommon threats present. These threats can cause a lot of damage to the industry and thus aims at destroying the majority of crucial data of the company. This paper will show the statistics and data of some of the major threats like Pharming, Browser hijacker, Bluesnarfing and Botnet. To conclude, the threat should be taken more seriously with respect to the loss. THREATS A threat is generally defined as an object, person, or other entity that represents a constant danger to an asset. Sans described threat as â€Å"anything that would contribute to the tampering, destruction or interruption of any service or item of value†. Threats possessed to an organization or business generally aim at identity theft, financial fraud, data breach causing loss to company’s asset. Fraud tricks can be applied on online user to gain knowledge about password username mother’s maiden name birthdate etc. These information are enough to fraud into ones bank account or create a new identity. In an open WiFi zone several computers can be hacked using hacking tools. The system can even be hacked using Bluetooth technology. There are 4 general classes of threats which are possessed to an organization’s network system Unstructured threats- these threats are generally possessed by untrained individuals who use easily availableShow MoreRelatedIn the world of computer and network security, there are myriad ways to launch an attack, which,1000 Words   |  4 Pages In the world of computer and network security, there are myriad ways to launch an attack, which, from the perspective of a network, can usually be defined as traffic that has vicious intent. There are infinite computer attacks that no firewall can prevent, such as those executed locally on the machine by a malicious user. From the networks perspective, there are numerous types of attack. Attacks can be grouped into two types: brute force and precision. JuniperRead MoreCyber Security Is A Needed Profession Essay1123 Words   |  5 Pages Cyber Security is a needed profession that affects all different sizes of companies due to a wide variety of different types of threats like malicious codes like illegal yo ung adult content, malware, and spyware to computer viruses. Malware can be very serious that they have the ability to easily erase the whole entire computer to non dangerous easy fix like email viruses. We need cyber security to stop the numbers of threats around the world. There have been unprecedented rise in cyber attacksRead MoreThe Basic Internet And Its Security1420 Words   |  6 Pages4th hour April 8, 2015 The Basic Internet and Its Security What is the basic internet and how do you make it safe? Most people in the world have a computer but do not know what makes a computer a computer. Most people do not even know what device would qualify as a computer. The computer is an important part of the twenty-first century. The responsibility of computer users goes beyond internet access. The computer has basic internet and security that is needed to be followed. The internet guaranteesRead MoreNetwork Security : A Security Platform For Users, Programs, And Computer Networks1667 Words   |  7 PagesNETWORK SECURITY VIPUL KUMAR KOTHIFODA ILLINOIS INSTITUTE OF TECHNOLOGY A20357836, vkothifo@hawk.iit.edu ABSTRACT In today’s world Network Security plays a vital role to protect the underlying network infrastructure from unauthorized access, malfunction, modification and improper disclosure. Network security helps to create a security platform for users, programs, and computers. Security became a major concern with the explosion of the public internet and e-commerce, private computers and computerRead MoreA Project On Capstone Project1039 Words   |  5 Pagespower of technology and computers and all of the applications came from? Well there are a lot of computer applications like local security applications, protocols, well I am going to explain some security applications to you. There are many kinds of different security applications. I am going to explain two of different applications Linux and security policy settings. Now what are security policies? Security policy settings in Microsoft could be used as part of all of our security implementation to makeRead MoreIs Your Information Safe? Essay1567 Words   |  7 Pagesto your head, nor does he ransack your personal possessions. Just the same hes a thief. Although this thief is one youll not only never see, but you may not even realize right away that hes robbed you. The thief is a computer hacker and he enters your home via your computer, accessing personal information -- such as credit card numbers -- which he could then use without your knowledge -- at least until you get that next credit card statement. Richard Bernes, supervisor of the FBIs Hi-Tech squadRead MoreEthical Issue1171 Words   |  5 PagesIntroduction Today’s world computer crimes are internet related, and in this area carrying out law barriers are either not well defined or most of the countries they don’t have arraign cyber crime laws. Those laws deliver the absence of the safe, the only substitute is protection against apparent warning exists is to develop ones own, depend on constitutional protection, a big range, and ethics to reduce constitutional entrance. Establishing information systems are grater speed than process ofRead MoreCyber Security and Technology Essay1097 Words   |  5 PagesIntroduction In today’s world technology has evolved to the point where a large amount of information is stored in cyberspace. It is because of this type of storage people around the world have an easier time at accessing information than ever before. The time before the late 20th century gathering information was long and tedious to get a book that the library did not own would take at least a couple of weeks depending on the time period or it may not have been possible to obtain that book. ButRead MoreCyber Crimes, Moral And Ethical Implication1664 Words   |  7 PagesCyber Crimes, Moral and Ethical Implication Introduction The internet’s rapid growth and computer technology has helped people around the world over the past few years. This evolution has also enabled new forms of crime-dubbed cyber-crime. This phenomenon has greatly evoked feelings such as admiration and fear in people mind. Cyber-crime is defined as crimes committed on internet, with computers as the tool, Agathise E Joseph, June 28th 2006. It is not an â€Å"armed robbery†, not a murder but a practiceRead MoreEssay on Ethical Computer Hacking972 Words   |  4 Pagesmanipulate a computer isnt doing it on bad and evil terms, like writing a virus to deploy on a certain date to permanently delete certain file extensions. But maybe theyre the people sitting hours on end to deploy a fix for that certain virus someone else is writing, or safeguarding a local banks network to make sure that virus cannot access the banks database. Hacking can be ethical by providing the Internet world with a tightened sense of security by detect ing and preventing security flaws before

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.