1. What Are the Various Types of Security Risks that Can Threaten Computers? A computer security risk is any event or action that could cause a loss of or damage to computer hardware, software data, information, or processing capability. Computer security risks include computer viruses, unauthorized access and use, hardware theft, software theft, information theft, and system failure. Safeguards are protective measures that can be taken to minimize or prevent the consequences of computer security risks. A computer virus is a potentially damaging computer program designed to affect or infect a computer negatively by altering the way it works. Unauthorized access is the use of a computer or network without permission; unauthorized use is the use of a computer or its data for unapproved or possibly illegal activities.
An individual who tries to access a computer or network illegally is called a cracker or a hacker. Hardware theft, software theft, and information theft present difficult security challenges. The most common form of software theft is software piracy, which is the unauthorized and illegal duplication of copyrighted software. A system failure is the prolonged malfunction of a computer.
The Research paper on Identity Theft Information Security 2003
Introduction There is currently a huge growing number of criminals that now do greater and more widespread damage to their victims without ever meeting them. Identity theft surfaced in the early 1990 s and turned peoples everyday transactions into a data gathering game. Bits of personal information such as bankcards, credit card accounts, income, social security numbers or just someone name, ...
2. How Does a Computer Virus Work and What Steps Can Individuals Take to Prevent Viruses? A virus spreads when users share the host program to which the virus is attached. A virus can replace the boot program with an infected version (boot sector virus), attach itself to a file (file virus), hide within a legitimate program (Trojan horse virus), or use an application’s macro language to hide virus code (macro virus).
The virus is activated when a certain action takes place (a logic bomb) or at a specific time (a time bomb).
Viruses can be prevented by installing an antivirus program, write-protecting a rescue disk or emergency disk, never starting a computer with a disk in drive A, scanning floppy disks for viruses, checking downloaded programs, and regularly backing up files.
3. How Can a Computer Be Safeguarded? An antivirus program protects a computer against viruses by identifying and removing any computer viruses found in memory. Access controls prevent unauthorized access and use by defining who can access a computer, when they can access it, and what actions they can take. Physical access controls and common sense can minimize hardware theft. A software license addresses software piracy by specifying conditions for software use. Encryption reduces information theft by converting readable data into unreadable characters.
Surge protectors power supplies guard against system failure by controlling power irregularities. 4. Why Is Computer Backup Important and How Is It Accomplished? A backup is a duplicate of a file, program, or disk that can be used if the original is lost, damaged, or destroyed. In case of system failure or the discovery of corrupted files, the backup can be used to restore the files by copying the backed up files to their original location.
Backup procedures specify a regular plan of copying and storing important data and program files. Organizations can accomplish a backup using one of, or combinations of, three methods: a full backup, which duplicates all files; a differential backup, which duplicates only files changed since the last fullback up; or an incremental backup, which duplicates only files changed since the last full or incremental backup. 5. What Are the Components of a Disaster Recovery Plan? A disaster recovery plan is a written plan describing the steps an organization would take to restore computer operations in the event of a disaster. A disaster recovery plan has four major components. An emergency plan specifies the steps to be taken immediately after a disaster strikes.
The Term Paper on Computer Files Dat Files Released
McAfee Readme. 1 st for Retail and OEM Customers Copyright 1994-1997 by McAfee Associates, Inc. All Rights Reserved. Thank you for using McAfee products.This file provides details regarding your product license and registration. For product-specific information, including new features, known issues, and frequently asked questions, please refer to WHATS NEW. TXT. License agreements and ...
A backup plan details how an organization will use backup files and equipment to resume information processing. A recovery plan stipulates the actions to be taken to restore full information processing operations. A test plan contains information for simulating different levels of disasters and recording an organization’s ability to recover. 6.
What Are Issues Relating to Information Privacy? Information privacy refers to the right of individuals and organizations to deny or restrict the collection and use of information about them. Information privacy issues include unauthorized collection and use of information and employee monitoring. Unauthorized collection and use of information involves the compilation of data about an individual from a variety of sources. The data is combined to create an electronic profile that, without an individual’s permission, may be sold to other organizations.
Employee monitoring involves the use of computers to observe, record, and review an individual’s use of a computer, including communications, keyboard activity, and Internet sites visited. 7. What Are Ethical Issues with Respect to the Information Age? Computer ethics are the moral guidelines that govern the use of computers and information systems. Unauthorized use of computer systems, software theft, and information privacy are frequently discussed ethical issues. Other important ethical issues are the responsibility for information accuracy and codes of conduct that help determine whether a specific computer action is ethical or unethical.
8. What Are Internet-Related Security and Privacy Issues? Information transmitted over networks has a higher degree of security risk than information kept on an organization’s premises. On a vast network such as the Internet, the risk is even greater. To provide secure data transmission, many Web browsers use Internet encryption methods such as Secure Socket Layers and digital signatures. The most discussed ethical issue concerning the Internet is the availability of objectionable material.
The Essay on Computer Privacy
In the information technology world today there is a problem that can ruin a company. Bad publicity and finger pointing usually precede the problem. After this the federal government steps in and regulates things. The problem I am referring to is computer privacy. This issue was non existent a few years ago however with the proliferation of computer use and Internet access the privacy of end users ...