logo

Computer Systems Security: A Review

   

Added on  2021-01-01

24 Pages6181 Words477 Views
Computer Systems Security

Table of ContentsABSTRACT.....................................................................................................................................3INTRODUCTION...........................................................................................................................4LITERATURE REVIEW................................................................................................................5TASK...............................................................................................................................................6Impact on the Normal Man ........................................................................................................8Questioners..................................................................................................................................9Importance of Risk analysis in the primary data-.....................................................................12Identifying the different application support to cryptography and encryption with primarydata- ..........................................................................................................................................14Propose An App for Normal Man /Screenshot of Applications...............................................15Create Risk chart with probability and mitigation plan with the help of primary data.............18Legal, Social and Ethical issues:...............................................................................................23CONCLUSION..............................................................................................................................23REFERENCES..............................................................................................................................24

ABSTRACTComputer system security is a process that help for providing the safety and security in the smartphones, tablets and other devices. Information technology is a leading field to expand thebusiness all over the world. It is beneficial for user to check the security options to manage theentire processing and functionality of smartphone. Computer security is the most challengingpart of organization to handle the complication in the business operations and functions.Computer system used the different techniques such as wireless network, smart phones, Wi-Fietc. cryptography techniques are beneficial for used the encryption and decryption algorithm ofproviding the safety and privacy in the computer system.

INTRODUCTIONComputer system security is the part of protection and safety for hardware system to thethefts and hackers. It is required for manage the services because it can manage the entirefunctionality of the computer system. Information technology is the fastest growing field toprovide the best services to the customers in marketplace. Computer security is the mostchallenging part of organization to handle the complication in the business operations andfunctions. Computer system used the different techniques such as wireless network, smartphones, Wi-Fi etc. these devices are basically used for the purpose of communication from onenode to another (Conti and et.al., 2018). At the time of sharing, the hacker can attack thecomputer system and can be damage the information or data that's why, it is necessary fororganization always maintain their security aspects in proper manner. In this report, It willdiscuss about the different conceptual security risk that could recognized at the time of dataprocessing. There are different type of risk generated in the information technology environmenttherefore, it is necessary to maintain their services in proper manner. Cryptography is the technique which used for the purpose of network security therefore,it can decode the data from one node to another by using this technique where the hacker can noteasily damage the data in the computers. There are different approaches describe in the reportand also discuss its applications. Sometimes, threats and unwanted software impacts on thebusiness operations and functions that's why, it is important to manage their security aspets in thecomputer system. (Ross, McEvilley and Oren, 2018). This report will discuss about the smartphones and tablet which is suitable for the normal person in the terms of security aspects. In thisway, it can easily understand the need and requirement of technology in our day to day life.Smartphones is a type of device that is applicable for data transmission and this device usedsome terminology and technologies, issues etc. Smartphones are most preferable as compare totablets because smartphone provide the calling facilities and services to the customer (Thota andet.al., 2018). Most of the organization provide their own platform to share the information to thecustomer. In this way, customer can easily access the information by using computer systemthat's why, it is necessary for protecting the hardware system because unnecessary threats andvirus affects the entire computer system. There are some threats generated which discuss in thisreport such as malware, viruses, phishing, spam etc. These are the important threats that affectingthe entire computer system. It makes sure that devices used in the computer system must used

the techniques like encryption, TCP and UDP, Decryption and IP etc (White, Fisch and Pooch,2017). These are essential technology for protecting data or hardware system against the theftand hackers. Encryption and decryption are the main component of computer security becausemany organization used this technique to provide the safety and security in their hardwaresystems(Conti and et.al., 2018). Computer security is the main part of organization that allowssecuring the business operations and also protected the information and details on the specificcomputer system that's why, security is the important aspects to manage and control the entireprocessing of system. Security is help for removing all the threats in the system and keep protectthe hardware system. This type of security is useful for provide the integrity, availability andconfidentiality for the component in the entire system. LITERATURE REVIEWAccording to the author, A New smart phone or tablet security is the main aspects of eachand every people. They always try to secure their data and information because there are manytheft damage the functionality of smart phone and can be lost the data. First of all, person canunderstand the functionality and operations of smart phones and used the different application toprotect their data in effective ways. These are the security features that applied in the smartphones to protect their data and information effectively and efficiently (Abdo and et.al., 2018). As per author, Modern Technology is to be considered as the main part of business thatapplicable in the tablets and new phones to provide the better services to user those who used thesmart phones. The information accessibility is easy for each and every people that store themobile data in the gadget collection that's why, it protects all information in proper manner. According to author, All the service that used the specific authentication security toprotect their transaction and data. It is easier process to check and enable the security features.Once enabled even some people easily access the password. According to author, Computer security terminology, technologies and issues thatapplicable in the smart phones. It is required for each and every hardware system to manage theentire functionality of mobile phones. Computer security is the main component in thesmartphones and other technology because it provides the full of security and safety in the entirefunctionality and operations. Sometimes, Many people install the various application that helpfor providing the best quality of services related the security aspects (Liu and et.al., 2018). It canbe used the different technology applicable that only provide the security in their hardware and

software system. This technology is running automatically remove all the unwanted software andthreats in the computer system. It is necessary for people to secure their computer systembecause in most of time, the important and personal data store in the system that used for managein the proper manner. TASKCommon Risk on the overall security system of computers- There are different types of common risk generated in the computer system effectively andefficiently.Hackers- Hacker is basically person those who tries to crack the password of computersystem and also exploits the hardware for particular reasons. It is terminology that used inthe computer security and damage the personal information and company data. Hackerwill use the different software that access their entire processing in quickly. It is the mostcommon technique to lost the data anywhere. Unauthorized access- unauthorized access is the happen when someone can use theserver to access the details of particular website. In this way, it is also accessed thesensitive data of another person. An organization is store the details of customers in theirofficial database (Papernot and et.al., 2018). In this way, An authorized person easilyaccess the personal information of client such as transaction details, account number, carddetails etc. It affects the entire processing of organization and many times, the firms faceloss and challenges issues. Threats- It is the most common aspects of computer security that generated at any timein the system. It mainly causes the serious damage in the hard ware that impact on theoverall operations and functions. Sometimes, threats may be affect or not because itdepends on the quality and accessibility. This is the important for people to alwaysprotect their smartphone, tablet and PC to secure through threats. It is based on the actionand event that might happen in the computer system and it is also comprises the security(Thota and et.al., 2018). Vulnerability- It is usually based on the weakness that help to exploit by the threats inthe entire system such as attackers, This is unauthorized persona that perform in thedifferent action in the other devices such as computer system, Smartphones and tabletsetc. The attacker will use the one tool or technique to connect with the system weakness

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Computer Systems Security - Assignment
|26
|6627
|321

Assignment on Computer Network and Security
|6
|1343
|177

Wireless Network Technology and Preventive Techniques
|12
|2757
|322

Wireless Network Security and Preventive Techniques
|12
|3476
|20

Wireless Communication Protocols and Technologies Used in IoT
|5
|1730
|427

COVID 19 Safety Applications and Risks
|33
|2384
|78