Preview

Overview of Computer Security

Good Essays
Open Document
Open Document
1208 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Overview of Computer Security
Overview on Computer Security
In this course, you have discovered how important computers and their contents are to everyone. Safeguarding your computer and its valuable information is important. You should be aware of the threats facing by your computer and data, and take necessary measures to protect them as well. By taking some precautionary steps, you can safeguard not only your hardware, software and data, but yourself. This lesson introduces you with some of the most common threats to your privacy, data, and hardware; and how to protect yourself and your system.
Basic Security Concepts
The goal of computer security is to eliminate or protect against threats. * Threats. A threat is anything that can cause harm. In the context of computer security, a threat can be a burglar, a virus, a disaster, or a simple user error. Threat is not harmful unless it exploits an existing vulnerability. * Countermeasures. A countermeasure is any step you take to ward off a threat – to protect yourself, your data, or your computer from harm. These are meant to protect data and systems from damage. For example, regularly backing up your data is a countermeasure against the treat of data loss. A firewall is a countermeasure against hackers.
In the context of computer security the user, hardware and data may face threats at any time and we must take proper countermeasures to deal with such threats.

Threats to Users
Networks and internet have created limitless possibilities for people to work, communicate, learn, buy and sell, play games, and interact with others around the world that made it conduit for many type of threats.
1. Identity Theft. In identity theft, an ID thief impersonates someone else by using the victim’s name and personal information. A successful ID thief can obtain documents (driving license, bank account information) and conduct business transactions in the victim’s name.
2. Loss of privacy. Many companies monitor the activities of

You May Also Find These Documents Helpful

  • Powerful Essays

    Pos420 Final Paper

    • 2424 Words
    • 10 Pages

    When beginning a discussion of computer security, a number of variables come into play. From patch availability to OS popularity, antivirus offerings, user/administrator knowledge and even physical user controls, many elements must be considered to create a computing environment that is secure. While Windows and Linux each have their advantages and disadvantages, neither operating system is, at its core, more or less safe than the other from attacks and data theft. All operating systems have vulnerabilities before they ever ship, and it is up to the administrator of those systems to maintain a level of security that protects the valuable data stored on those servers.…

    • 2424 Words
    • 10 Pages
    Powerful Essays
  • Powerful Essays

    IS3110 U5L1

    • 912 Words
    • 4 Pages

    One of the most important first steps to risk management and implementing a security strategy is to identify all resources and hosts within the IT infrastructure. Once you identify the workstations and servers, you now must then find the threats and vulnerabilities found on these workstations and servers. Servers that support mission critical applications require security operations and management procedures to ensure C-I-A throughout. Servers that house customer privacy data or intellectual property require additional security controls to ensure the C-I-A of that data. This lab requires the students to identify threats and vulnerabilities found within the Workstation, LAN, and Systems/Applications Domains.…

    • 912 Words
    • 4 Pages
    Powerful Essays
  • Good Essays

    Spam – for example when using a programme like Microsoft Outlook you have an address book with all saved email addresses, viruses etc. can gain access to these and use them to send spam emails to other via emails, the recipient is then at threat.…

    • 914 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    NT2580

    • 526 Words
    • 5 Pages

    NT2580 Introduction to Information Security Unit 2 Application of Security Countermeasures to Mitigate Malicious Attacks © ITT Educational Services, Inc. All rights reserved. Learning Objective Describe how malicious attacks, threats, and vulnerabilities impact an IT infrastructure. NT2580…

    • 526 Words
    • 5 Pages
    Satisfactory Essays
  • Good Essays

    Nt1310 Unit 3

    • 541 Words
    • 3 Pages

    Do you understand how to secure your computer since you reviewed the material? Explain your answer.…

    • 541 Words
    • 3 Pages
    Good Essays
  • Better Essays

    The internet has pervaded every aspect of business and Kudler Fine Foods has used it as a tool to further their goals. Wireless technology should be the next stepping stone for Kudler to use to advance in their field, and much like most new technologies the use of wirelessly connected devices can pose a number of security concerns. The benefits of having connectivity throughout the enterprise can outweigh the security concerns that wireless technology can pose. There are certain steps that can be taken to mitigate most of the concerns of having wirelessly connected devices on the network and these steps will be touched upon along with some of the major threats.…

    • 1352 Words
    • 6 Pages
    Better Essays
  • Good Essays

    Identity theft is when someone steals another person’s identity through the internet. The identity stolen can be personal information such as account names and security numbers to use it for their own benefit. For example, a Facebook user can steal another Facebook user’s personal details by either hacking or visiting their profile, uploading their profile picture, gaining personal details and using it to create a fake account of that Facebook…

    • 769 Words
    • 4 Pages
    Good Essays
  • Powerful Essays

    The information in this paper will investigate the elements involved in computer security. Protecting information today requires more than just locking a door or filing cabinet. With data being stored electronically, it is vital that important information be protected from prying eyes. There are many different methods for protecting information that is stored on computers. These methods include everything from password and usernames to biometric devices. There are also software solutions that are used, including antivirus and anti-malware software along with firewalls. All of this is to accomplish the desired…

    • 1544 Words
    • 7 Pages
    Powerful Essays
  • Powerful Essays

    Final: Security and Network

    • 3275 Words
    • 11 Pages

    This examination is worth 20 percent of your total grade. There are five questions, and the maximum point values are included with each question.…

    • 3275 Words
    • 11 Pages
    Powerful Essays
  • Powerful Essays

     I have indicated the best options for controlling and monitoring three of the policy violations and security breaches from the list.…

    • 1066 Words
    • 5 Pages
    Powerful Essays
  • Powerful Essays

    Global technology is on the rise and being used by many on a daily basis. Companies all around the world are using technology, as well as individuals for personal use. With the rise of global technology comes the increase of cyber crimes and cyber-related threats. With so much personal information available online criminals are finding it easier than ever to access it.…

    • 1134 Words
    • 5 Pages
    Powerful Essays
  • Good Essays

    Nowadays, security software is becoming a major part of enterprise business. Software development is activity connected with advanced technology and high level of knowledge. After viewing the growing number of malicious activity, it is now imperative that we develop a plan and stick to it. There are so many threats to vulnerabilities and threats that leave systems open to malicious attacks. Whenever you sit at a computer and log onto the internet, your system, becomes vulnerable. There is now potential for malicious attacks. Knowing what to look for can prevent a lot of these attacks.…

    • 534 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    Courts

    • 350 Words
    • 2 Pages

    1ST SLIDE: Identity theft starts with the misuse of a person's personally identifying information, such as name and Social Security number, credit card numbers or other financial account information. For identity thieves, this information is as good as gold.…

    • 350 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    criminology unit 4

    • 593 Words
    • 3 Pages

    Identity theft occurs when a victim’s name, address, and other personal details are given to law enforcement officials during the commission of a crime. The victim is then mistakenly arrested. Often times, the imposter has obtained some sort of tangible, personal information from the victim, usually a driver’s license. Once the name of an innocent identity theft victim is assigned to the criminal act of the true perpetrator, it can be very difficult for the identity theft victim to convince law enforcement authorities that they are not the individual who committed the crime.…

    • 593 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Identity Theft

    • 2587 Words
    • 11 Pages

    Identity theft comes in many forms. One type of identity theft is necrolarcency the unauthorized use of checking accounts or bogus credit cards. This is when someone has the unauthorized use of your name, social security number, or credit card number. Another type of identity theft is the unauthorized use of your social…

    • 2587 Words
    • 11 Pages
    Good Essays