Computer Security Essay

1158 words - 5 pages



Computer security is the process of detecting unauthorised use of your computer or PC . As the old saying goes “prevention is better than cure” , going by this we realise that if we learn about the possible loopholes in the security we can prevent it in the first place.
But the big question is 'why should i care about my computer security?' . We use computers for everything from banking and investing to shopping and communicating with others through email or chat programs.Although we may not consider our communiction a 'top secret' ,but you dont want others to eavesdrop on you conversations, read your mails, use your computer to attack ...view middle of the document...

Information security is concerned with three main areas:
Confidentiality – informations should be available to only those who rightfully have access to it
Integrity – information should be modified only by those who are authorized to do so
Availability—information should be accessible to those who need it when they need it
These concepts apply to home Internet users as well as businesses. Now lets take a look at the various kinds of attacks and risks on Personal computers connected to the internet.
Trogan horse program:Trogan programs are a common way to trick users to install 'Backdoor' programs. These can allow the attackers to easily access the computer without the knowlege of the user and change configuration or infect all the files.
Denial of Service:This type of attack loads your system beyond capacity so that it crashes. In most cases these attacks can be prevented through latest patches.
Cross-site scripting : In this kind of attack a web developer may attach a script to something sent to a web site such as a URL etc. When the website responds to you, the malicious script is transferred to your browser. These scripts can do damage to the system.
E-mail spoofing:Email 'spoofing' is when an e-mail message appears to have originated from one source when it actually was sent from another source.E-mail spoofing is often an attempt to trick the user into revealing sensitive information like bank info , passwords etc.E-mail spoofing can range from harmless pranks to social engineering ploys.
E-mail viruses: Viruses and other types of malicious code are often spread as attachments to e-mail message. Before oppening an attachment be sure you know the real source of that attachment. The melissa virus spread precisely because it originated from familiar address.
Chat client :Internet chat applications, such as IRC network , provide a mechanism for information to be transmitted bi-directional between computers on the internet. Chat clients provide groups of indivisual with the means to exchange dialog, web URL's , and in many cases, files of any type.
Packet sniffing: A packet sniffer is a program that captures data from information packets as they travel over the network. The data may include user names, passwords, and proprietary information that travels over the network in clear text.With perhaps hundreds or thousands of passwords captured by the sniffer ,intruders can launch widespread attacks on systems.
Physical Theft:...

Other Essays Like Computer Security

Threats to Computer Security Essay

1164 words - 5 pages Threats to Computer Security Source: An Introduction to Computer Security: The NIST Handbook National Institute of Standards and Technology Technology Administration U.S. Department of Commerce Special Publication 800-12 Computer systems are vulnerable to many threats that can inflict various types of damage resulting in significant losses. This damage can range from errors harming database integrity to fires destroying entire computer centers

Computer and Network Security Essay

1798 words - 8 pages , 2013), and the domain user or admin have a guessable password in Windows NT (CVE, 2013). In the first article it discusses the use of USB devices in the workplace. USB’s are used for transporting data from one computer to another. These allow for business requirements to be reached at a faster pace but they also pose a number of security challenges. Those challenges may be “disgruntled workers, careless users and malicious individuals” (Couture

Accounting Information System Report

2045 words - 9 pages REPORT ON REDUCING COMPUTER FRAUD Name: ZHAOJUN HU Student NO: 20137098 Class: TACC403 Accounting information system Submission date: September 20, 2013 TABLE OF CONTENTS EXECUTIVE SUMMARY i INTRODUCTION 1 IS SOFTWARE LICENSING ANTISOCIAL?..................................................................2 COMPUTER SECURITY MEASURES 3 WOULD THE REMOVAL OF COMPUTER SECURITY MASURES REDUCE THE INCIDENCE OF

Assignment Information Use Paper

671 words - 3 pages Assignment Information Use Paper The way IT is set up at my job are Internet is set with a (LAN) to (WAN). I have a workstation where I use email exchange, (LAN) server controls activate directory. Now with the LAN server with a activate directory set permission control for user and the system administrator is responsible for the performance and operation. Are Administrator sign me to a computer this is one form of security here. Another

A Comparison of Information Security Surveys

3096 words - 13 pages Running Head: A COMPARISON OF INFORMATION SECURITY SURVEYS A Comparison of Information Security Surveys Conducted by the Computer Security Institute and Ernst & Young of Public and Private Sector Organizations University of Maryland University College A Comparison of Information Security Surveys Conducted by the Computer Security Institute and Ernst & Young of Public and Private Sector Organizations Emerging technologies

Buy a Computer

626 words - 3 pages of your new computer. Memory helps you save a lot of papers,2Projects,PowerPoint's Music an a lot of other things. But a lot of memory is going to cost you, That's later. Also look at the software when buying a computer. Most computers now have free trails. Which I think is bad. You are paying a lot for the computer it can at least come with a little more program. Most computers come with games,Security Features which is also a free trail. So

Context of the Problem

796 words - 4 pages Context of the Problem Anthony Smith-Ranson Research Methods RES 531 Context of the Problem Information technology (IT) is now solidly a vital part of any organization (Stockman, Leung, Nyland, & Said, 2013). As the use of computer networks, especially the Internet, has become pervasive, the concept of computer security has expanded to denote issues pertaining to the networked use of computers and their resources (Kinkus, 2002

A Key Concept in Information Systems

1049 words - 5 pages Computer and network security has become very important to businesses, government, military, and individuals. Many companies have been compromised and personal information obtained and used without authorization. It is very important to have computer and network security to keep hackers and malware from collecting data and destroying a computer system and network. Computer security protects all of the data that is stored on your computer. Every

Computer Fraud

1037 words - 5 pages strengthening the capability to detect malicious computer activities. The Computer Security Institute discovered that security breaches had been reported in 90% of government agencies and in large cooperation’s in 2002. They also discovered that $455 million was loss due to the abuse of computers. (History of Computer Crime) Prior to the USA PATRIOT Act, The Computer Fraud and Abuse Act contained no distinct definition for a loss. In the case United

Digital Crimes

1272 words - 6 pages the greatest threat to information security for small businesses is their employees. As McCollum noted, "a company's employees typically have access to its personal computers and computer networks, and often they know precisely what business information is valuable and where to find it." The reasons for these betrayals are many, ranging from workplace dissatisfaction to financial or family difficulties. Computer crimes perpetrated by outsiders

Security Monitor

543 words - 3 pages wrongdoing or security vulnerability. Rudolfsky (1983-2010), “It will be difficult for a company to achieve information security objectives without security event monitoring. Security event monitoring is derived from the general practice of monitoring activities that occur on a computer system. Security event monitoring involves (1) recording information that represents activity and (2) analyzing recorded information to identify and respond to

Related Papers

Computer Security Essay

630 words - 3 pages Computer security has become a big issue for major organizations, but what about the ordinary person with a personal computer at home. A personal computer is use to make life easier by paying bills on-line, keeping track of personal information and allowing the average person a way to do personal business or purchases. So has life become easier by using the computer to handle those day to day routines? Many would agree that it has made life

Computer Security Essay

782 words - 4 pages Computer Network Security Alternatives Computer network security and integrity is a large concern among all types and sizes of companies. The options for solving security risks are as varied as the companies themselves. However, it is possible to break down the methods for dealing with security risks into three major categories. Companies have the option to: 1. Select best of breed products for their various security needs and assemble

Computer Network & Information Security Essay

1478 words - 6 pages Media has focused on computer security of big businesses and how they have been breached, yet individuals do not stop and think about their own personal computer safety. Information can be stolen or damaged, access of personal computers can be gained without permission, viruses and worms can enter creating problems for a user, and our computers may be susceptible to cyber-attacks from hackers. Yet most computer users are new to the technology or

Personal Computer Security Threats Essay

527 words - 3 pages Personal Computer Security Threats Johnathon Aaron DeVry Personal Computer Security Threats Like the textbook states, our computers are now in a state of “always on” due to the advent of affordable high speed internet. Although this is undoubtedly beneficial to progress it also poses a significant threat to the everyday user. For instance similarly to staying in a casino for too long, the longer you keep your computer connected to the