Cis 102 Assignment Security System

Satisfactory Essays
Computers benefit from having an all-in-one computer security system in different ways depending one which system you install to your computer. All-in-one computer security systems are programs that keep not only your computer safe but all of your personal information. Many of the all-in-one computer systems, such as Nortons or AVG, protect the user with their personal stuff by securing all user names and passwords. They also clean computers from virus’, spy-ware, Trojan horses, worms, bots and rootkits. These are all things that can compromise your personal information and could cause the computer user to loose a large amount of information once their computer freezes. Usually the only way clean a computer when this happens is wiping everything off the computer and starting over. No user wants to go through this. I have personally had this happen three or four times due to getting virus’ that took over the computer. Now, I prevent that all from happening again. Not only do these security systems prevent the virus’ of all sorts but it also prevents spyware. Spyware is how hackers are able to get all of your personal information to use at their own disposal. Many of the security devices do live checks on the websites that you are visiting or try to visit to make sure that they are safe and real sites. If the site is a joke or dangerous to your computer it will not allow you to visit that site or will warn you before you continue on. Having a security system such as Nortons and AVG allows the user to download and share files without worrying about contracting a virus from the person/program they are downloading from. The best thing for to me that security systems offer is the firewall. The firewall prevents live attacks on your computer while you are on it. I have had Nortons block several attacks to my computer. The only thing that is a downfall to computer security systems is that they can cost quite a bit depending on which you get and what all they cover. To

You May Also Find These Documents Helpful

  • Satisfactory Essays

    Cis 105 Security Systems

    • 465 Words
    • 2 Pages

    CIS 105 – Week 8 Day 7 Assignment: Security Systems With the variety of threats to worry about in regards to protecting one’s computer system, whether it is for a personal or business computer, it is very important to get some type of security protection. There are a lot of options out there in terms of what brand and what level of security an individual is looking for. The best option to protect a computer system from various threats is an all-in-one computer security system, such as…

    • 465 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Soc 102 Assignment

    • 1025 Words
    • 5 Pages

    Bryant & Stratton College Amherst Campus SOSC 102: Principles of Sociology Winter Semester Tuesday+Thursday 9:50-11:30 Adam Privitera SOSC 102 Portfolio Assignment (No. 1 of 2) Midterm Essay Assignment SOSC 102 Course Outcomes Assessed 1. Explore personal and professional identity in order to facilitate growth. 1. Identify an individual’s roles and responsibilities to self and society. 1. Identify stages and influences within life span development. 2. Explore concepts of…

    • 1025 Words
    • 5 Pages
    Satisfactory Essays
  • Better Essays

    PAD 102 ASSIGNMENT

    • 1174 Words
    • 4 Pages

    DECENTRALIZATION INTRODUCTION Decentralization has been for a long time the goal of many states around the world, especially in the African continent. The Business Dictionary defines this word as “the transfer of decision making power and assignment of accountability and responsibility for results. This transfer of power being achieved mainly through the delegation of commensurate authority to individuals or units of an organization, even those far from the headquarters. However, from (The World…

    • 1174 Words
    • 4 Pages
    Better Essays
  • Good Essays

    Cis 417 Assignment 1

    • 755 Words
    • 4 Pages

    Assignment 1: CIS 417 Professor DR. Ed Lindoo As a system forensics specialist I am here to help your business achieve goals based on security and confidentiality. Some of my basic tasks and high level investigation process is to use evidence to reconstruct past events and activities. Forensic specialist also use evidence to gain a better understanding of a crime (John R. Vacca & K Rudolph, 2011). I will also use this evidence to show possession and handling of digital data. There are many…

    • 755 Words
    • 4 Pages
    Good Essays
  • Better Essays

    CIS 515 Assignment 3

    • 1079 Words
    • 5 Pages

    Assignment 3: University Database Veronica Hocutt Strayer University Dr. Darcel Ford CIS 515 July 22, 2014 Abstract A prestigious university has recently implemented a consolidation strategy that will require it to centralize their student records. In order to move forward, the local university will need to develop a data model that will retain student records and perform various data extract transform and load (ETL) processes. As the database consultant it will be necessary to assist with the…

    • 1079 Words
    • 5 Pages
    Better Essays
  • Powerful Essays

    WEE 7 CASE STUDY 3 : Mobile Devices Security CIS 502 Theories of Security Management February 22, 2013 Mobile Devices Security By the end of 2013, there will be more mobile devices on Earth than people, a new report suggests. According to Cisco 's Visual Networking Index Global Mobile Data Traffic Forecast Update, consumers ' mobile appetite has grown a lot in the past year, and it shows no signs of slowing. In fact, Cisco predicts global mobile data traffic will increase 13-fold…

    • 2094 Words
    • 7 Pages
    Powerful Essays
  • Better Essays

    Student B. Class Assignment 2: Requirements for the Corporate Computing Function CIS 505 Communication Technologies Tech Class, Ph.D. April 28, 2013 From Table 3.1, speculate why the fifth point, “Meet information requirements of management”, is in the CIO’s list of nine (9) points: Meeting information requirements of management is a key focus for many organizations. Companies are constantly looking for ways to improve how they manage information. Information is essential for any decision…

    • 939 Words
    • 4 Pages
    Better Essays
  • Satisfactory Essays

    Java Cis Assignment 1

    • 674 Words
    • 3 Pages

    Java CIS 109 Assignment 1 A. Programming theory 1. Basic Ideas 1(a) Delimiters are used as comments. The Phrase is put in there to be shown to the user whilst programming, but is not shown when the program is to run. Those delimeters indicate comments, the compiler ignores what is inside. 1(b) “import java.io*;” means that the complier will check what libraries are necessary to compile the program, and it will simply import them. In this case, the program would not be able to run without…

    • 674 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    Cis Assignment 2

    • 393 Words
    • 2 Pages

    1. This first programmable device was devised in 1805. Joseph-Marie Jacquard invented the first truly programmable device to drive looms with instructions provided by punch cards. The punches control where the metal rods go through to produce certain patterns. "Video – Part 3” 2. During World War II, the British government developed one of the first working computers. a. The Colossus was the name of this computer used to decode Nazi communications during the war. "Page 22" b. Colossus computers…

    • 393 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    CIS 210 Assignment 1

    • 386 Words
    • 2 Pages

    CIS 210 1-22-14 Introduction Automated systems exist to ease the effort required by manual system e.g. writing a letter by hand can be easily done through several existing word processors that provide various formatting and paging options. In case of automated inventory system, the whole inventory management and re-stocking can easily be done. Moreover, there is less likelihood of errors while handling stocks and hence, less strain. Automated inventory systems provide…

    • 386 Words
    • 2 Pages
    Satisfactory Essays