Computer Security

Topics: Computer security, Computer, Visual Basic for Applications Pages: 3 (768 words) Published: February 3, 2013
Computer Security
Student Name

James works for a bank, and he spends most of his attending to bank clients and travelling. He always carries with him a laptop that contains confidential bank information. The Operating System of the laptop was last updated in May 2011. Some of the programs James uses are MS word 2007, MS Access and MS Excel. James’ computer is, however, not well secured. It does not have a firewall or an antivirus. In addition, the data in the laptop are not encrypted. Severally, James uses his laptop in a cyber café, and while travelling, he sometimes leaves it in his car un-attended. This paper will present an analysis of possible security threats that may affect James’s laptop. Possible measures to prevent any attack will also be presented.

There are several sources of computer threats. According to Fleegar (2007), the sources these threats could either be internal or external. The threats circumvent computers security without prior authorization by rightful user. Internal security risks mainly arise from viruses and physical compromise of storage system (Gasser, 2008) e.g. damaged hard disk. External security risks are mainly from a third person e.g. hacker or a thief. There are mainly three aspects of information that can be compromised. These are Confidentiality, integrity and Availability. These aspects have been discussed below with respect to aim of security, possible attacks and their sources and counter attack measures that should be employed. Confidentiality

Aim of security: To prevent un-authorized disclosure of information from a computer (Ding, 2011) Possible attacks: Reading, copying and editing information
Possible sources of attacks: cyber café hackers, criminals e.g. robbers, polymorphic viruses (Gollmann, 2008) Counter attacks: Documents should have a password, a firewall should be used to bar hackers, user account should have a password or a screen lock and data should be encrypted....

References: Amoroso, A (2009). Fundamentals of Computer Security. New York: Harcourt Brace
Byron, E
Dave, C.A. (2007). Security in Computing. New Jersey: Prentice-Hall
Ding, C
Fleeger, C.P. (2007). Security in Computing. New Jersey: Prentice-Hall
Gasser, M
Gollmann, D. (2008). Computer Security. London: Oxford UP
James, J.D
John, M. (2008). Computer security. New York: Nerd Press
Joseph, A
Mark, C. (2009). Firewalls. Chicago: Chicago UP
Martin, A (2009)
Mary, K. (2011). Computer security London: Oxford UP
Millman, D
Park, J.S. (2010). Security in a Client/Server Environment. New Jersey: Wiley & Sons
Robert, P
Van, N. (2006). Availability security. Hong Kong: HCUST
Young, E
Continue Reading

Please join StudyMode to read the full document

You May Also Find These Documents Helpful

  • Essay about Access Control and Data Security Assures
  • Information Systems and Security Essay
  • Kudler Fine Foods IT Security Report Essay
  • Security Awareness Essay
  • Android Hacking and Security Research Paper
  • Security Threats of Mobile Banking Essay
  • Multi Layered Security Plan Essay
  • security breaches Essay

Become a StudyMode Member

Sign Up - It's Free