Analyzing Current Trends in Computer Science: A Security Perspective

Verified

Added on  2022/12/27

|9
|964
|70
Report
AI Summary
Document Page
Trends in Computer
Science
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
Table of content
INTRODUCTION
Overview of Computer security and main concern of a developer regarding security
CONCLUSION
REFERENCES
Document Page
INTRODUCTION
Computer science is the filed of study which help in providing knowledge regarding
with how to use technologies, network tool in day-to-day life. This report has been
formulated to define major trend in computer science. For this purpose, computer
security subject has been chosen. This report includes, an overview cyber security, its
types issue developer face during the time of implementation of any kind of website of
network and ways which help in protecting organization from issue related with cyber-
crime. All this information has been provided in systematic way.
Document Page
Overview of Computer security and main concern of a developer regarding security
Computer security : This term defines as the process of protecting network & system
of computers from theft, disclosing of relevant information, damages of software as
well as hardware and disruption of any kind of services provide by computers or other
electric devices. In general terms it is also known as cyber security or IT security
(Petrenko, 2018).
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
Types of computer security.
Information security: It is related with provide security to relevant or essential data from
unauthorized use of information. By using software and different types of tools personal able to
secure integrity, confidentiality and accessibility of computer system.
Application security: Provides securities to newly develop application by using different software.
There are different types of threat related with security of application which includes, injection,
denial of services, cyber-attacks, all these issues can be prevented by using software like,
firewalls’, encryption, web application, antivirus Imperva WAF and SonicWall, all these software
use to prevent issue related with application security (Amran, Zaaba, and Mahinderjit Singh, K.,
2018).
Document Page
Issue developer face regarding with cyber security.
Cyber-attack: It is defined as deliberating exploitation of network system, for this purpose various tools
or software has been used which includes, hacking, malware, website detachment. In this malicious
coding process is used to hack computer system.
Security issue: This is considered as one of the major issues as organizations face lack of security issue
during the time of run business activities. Person due to lack of knowledge regarding how to protect
their information suffers from unauthorised cyber theft.
Platform issue: Individual before developing their website or launching their organization at digital
platform face issue related with selecting which platform is relevant for there to start up their business at
digital platform. There will be many options which manager can kept out related with digital market and
success the business depends on the decision they took related with their digital platform.
Document Page
Following are the methods which useful for organization to protect their computer
network from cyber-attack:
Development of inventory control, system: Organization with the development of strong stock management
system able to protect their computer from hacking or any other kind of cyber-attack. They are able in order
to formulate inventory systemin such manner which help in protecting data in effective manner.
Network segmentation & firewall: By implementing of effective network segmentation system organization
able to secure their computer network in such manner which helpful in securing all the essential business
data. Which is relevant in running organization in systematic manner.
Use of secure remote access tool: Personal face issue related with computer security due to not implement
access of tool, thus they need to use those tools and system which helpful and easily access the cloud system
of computer network, on the basis of that they are able to run organization without facing issue related with
cybercrime (Van den Herrewegen. and Garcia, 2018).
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
CONCLUSION
From the above analysis it has been concluded that computer security is become major trend in the field
of computer science at present time period due to the revolution major changes has been arise, which
positively and negativity impact on human being’s life. Computer and internet are considered as
essential thing to use their will be many issues arises due to use of these technological instruments,
which include cyber-crime. Rate of cyber crime has been raised with changes of time, due to lack of
protection of security and hacking system. Organization by implementing protecting security software as
well as cloud network and through formulating rigid strategies and policies regarding with use of
computer network able to control cyber issue arises within the organization.

Document Page
REFERENCES
Petrenko, S., 2018. Big Data Technologies for Monitoring of Computer Security: A Case
Study of the Russian Federation (pp. 1-249). Springer International Publishing.
Amran, A., Zaaba, Z.F. and Mahinderjit Singh, M. K., 2018. Habituation effects in computer
security warning. Information Security Journal: A Global Perspective, 27(4), pp.192-204.
Sun, X., 2018, May. Critical security issues in cloud computing: a survey. In 2018 IEEE 4th
International Conference on Big Data Security on Cloud (BigDataSecurity), IEEE
International Conference on High Performance and Smart Computing,(HPSC) and IEEE
International Conference on Intelligent Data and Security (IDS) (pp. 216-221). IEEE.
chevron_up_icon
1 out of 9
circle_padding
hide_on_mobile
zoom_out_icon
[object Object]