Analyzing Current Trends in Computer Science: A Security Perspective
VerifiedAdded on 2022/12/27
|9
|964
|70
Report
AI Summary
This report provides an overview of current trends in computer science, with a specific focus on computer security. It defines computer security, types of security (information and application), and the issues developers face, such as cyber-attacks, platform issues, and security vulnerabilities. The rep...

Trends in Computer
Science
Science
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

Table of content
INTRODUCTION
Overview of Computer security and main concern of a developer regarding security
CONCLUSION
REFERENCES
INTRODUCTION
Overview of Computer security and main concern of a developer regarding security
CONCLUSION
REFERENCES

INTRODUCTION
Computer science is the filed of study which help in providing knowledge regarding
with how to use technologies, network tool in day-to-day life. This report has been
formulated to define major trend in computer science. For this purpose, computer
security subject has been chosen. This report includes, an overview cyber security, its
types issue developer face during the time of implementation of any kind of website of
network and ways which help in protecting organization from issue related with cyber-
crime. All this information has been provided in systematic way.
Computer science is the filed of study which help in providing knowledge regarding
with how to use technologies, network tool in day-to-day life. This report has been
formulated to define major trend in computer science. For this purpose, computer
security subject has been chosen. This report includes, an overview cyber security, its
types issue developer face during the time of implementation of any kind of website of
network and ways which help in protecting organization from issue related with cyber-
crime. All this information has been provided in systematic way.
⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide

Overview of Computer security and main concern of a developer regarding security
Computer security : This term defines as the process of protecting network & system
of computers from theft, disclosing of relevant information, damages of software as
well as hardware and disruption of any kind of services provide by computers or other
electric devices. In general terms it is also known as cyber security or IT security
(Petrenko, 2018).
Computer security : This term defines as the process of protecting network & system
of computers from theft, disclosing of relevant information, damages of software as
well as hardware and disruption of any kind of services provide by computers or other
electric devices. In general terms it is also known as cyber security or IT security
(Petrenko, 2018).
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

Types of computer security.
Information security: It is related with provide security to relevant or essential data from
unauthorized use of information. By using software and different types of tools personal able to
secure integrity, confidentiality and accessibility of computer system.
Application security: Provides securities to newly develop application by using different software.
There are different types of threat related with security of application which includes, injection,
denial of services, cyber-attacks, all these issues can be prevented by using software like,
firewalls’, encryption, web application, antivirus Imperva WAF and SonicWall, all these software
use to prevent issue related with application security (Amran, Zaaba, and Mahinderjit Singh, K.,
2018).
Information security: It is related with provide security to relevant or essential data from
unauthorized use of information. By using software and different types of tools personal able to
secure integrity, confidentiality and accessibility of computer system.
Application security: Provides securities to newly develop application by using different software.
There are different types of threat related with security of application which includes, injection,
denial of services, cyber-attacks, all these issues can be prevented by using software like,
firewalls’, encryption, web application, antivirus Imperva WAF and SonicWall, all these software
use to prevent issue related with application security (Amran, Zaaba, and Mahinderjit Singh, K.,
2018).

Issue developer face regarding with cyber security.
Cyber-attack: It is defined as deliberating exploitation of network system, for this purpose various tools
or software has been used which includes, hacking, malware, website detachment. In this malicious
coding process is used to hack computer system.
Security issue: This is considered as one of the major issues as organizations face lack of security issue
during the time of run business activities. Person due to lack of knowledge regarding how to protect
their information suffers from unauthorised cyber theft.
Platform issue: Individual before developing their website or launching their organization at digital
platform face issue related with selecting which platform is relevant for there to start up their business at
digital platform. There will be many options which manager can kept out related with digital market and
success the business depends on the decision they took related with their digital platform.
Cyber-attack: It is defined as deliberating exploitation of network system, for this purpose various tools
or software has been used which includes, hacking, malware, website detachment. In this malicious
coding process is used to hack computer system.
Security issue: This is considered as one of the major issues as organizations face lack of security issue
during the time of run business activities. Person due to lack of knowledge regarding how to protect
their information suffers from unauthorised cyber theft.
Platform issue: Individual before developing their website or launching their organization at digital
platform face issue related with selecting which platform is relevant for there to start up their business at
digital platform. There will be many options which manager can kept out related with digital market and
success the business depends on the decision they took related with their digital platform.
⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide

Following are the methods which useful for organization to protect their computer
network from cyber-attack:
Development of inventory control, system: Organization with the development of strong stock management
system able to protect their computer from hacking or any other kind of cyber-attack. They are able in order
to formulate inventory systemin such manner which help in protecting data in effective manner.
Network segmentation & firewall: By implementing of effective network segmentation system organization
able to secure their computer network in such manner which helpful in securing all the essential business
data. Which is relevant in running organization in systematic manner.
Use of secure remote access tool: Personal face issue related with computer security due to not implement
access of tool, thus they need to use those tools and system which helpful and easily access the cloud system
of computer network, on the basis of that they are able to run organization without facing issue related with
cybercrime (Van den Herrewegen. and Garcia, 2018).
network from cyber-attack:
Development of inventory control, system: Organization with the development of strong stock management
system able to protect their computer from hacking or any other kind of cyber-attack. They are able in order
to formulate inventory systemin such manner which help in protecting data in effective manner.
Network segmentation & firewall: By implementing of effective network segmentation system organization
able to secure their computer network in such manner which helpful in securing all the essential business
data. Which is relevant in running organization in systematic manner.
Use of secure remote access tool: Personal face issue related with computer security due to not implement
access of tool, thus they need to use those tools and system which helpful and easily access the cloud system
of computer network, on the basis of that they are able to run organization without facing issue related with
cybercrime (Van den Herrewegen. and Garcia, 2018).
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

CONCLUSION
From the above analysis it has been concluded that computer security is become major trend in the field
of computer science at present time period due to the revolution major changes has been arise, which
positively and negativity impact on human being’s life. Computer and internet are considered as
essential thing to use their will be many issues arises due to use of these technological instruments,
which include cyber-crime. Rate of cyber crime has been raised with changes of time, due to lack of
protection of security and hacking system. Organization by implementing protecting security software as
well as cloud network and through formulating rigid strategies and policies regarding with use of
computer network able to control cyber issue arises within the organization.
From the above analysis it has been concluded that computer security is become major trend in the field
of computer science at present time period due to the revolution major changes has been arise, which
positively and negativity impact on human being’s life. Computer and internet are considered as
essential thing to use their will be many issues arises due to use of these technological instruments,
which include cyber-crime. Rate of cyber crime has been raised with changes of time, due to lack of
protection of security and hacking system. Organization by implementing protecting security software as
well as cloud network and through formulating rigid strategies and policies regarding with use of
computer network able to control cyber issue arises within the organization.

REFERENCES
Petrenko, S., 2018. Big Data Technologies for Monitoring of Computer Security: A Case
Study of the Russian Federation (pp. 1-249). Springer International Publishing.
Amran, A., Zaaba, Z.F. and Mahinderjit Singh, M. K., 2018. Habituation effects in computer
security warning. Information Security Journal: A Global Perspective, 27(4), pp.192-204.
Sun, X., 2018, May. Critical security issues in cloud computing: a survey. In 2018 IEEE 4th
International Conference on Big Data Security on Cloud (BigDataSecurity), IEEE
International Conference on High Performance and Smart Computing,(HPSC) and IEEE
International Conference on Intelligent Data and Security (IDS) (pp. 216-221). IEEE.
Petrenko, S., 2018. Big Data Technologies for Monitoring of Computer Security: A Case
Study of the Russian Federation (pp. 1-249). Springer International Publishing.
Amran, A., Zaaba, Z.F. and Mahinderjit Singh, M. K., 2018. Habituation effects in computer
security warning. Information Security Journal: A Global Perspective, 27(4), pp.192-204.
Sun, X., 2018, May. Critical security issues in cloud computing: a survey. In 2018 IEEE 4th
International Conference on Big Data Security on Cloud (BigDataSecurity), IEEE
International Conference on High Performance and Smart Computing,(HPSC) and IEEE
International Conference on Intelligent Data and Security (IDS) (pp. 216-221). IEEE.
⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide
1 out of 9
Related Documents

Your All-in-One AI-Powered Toolkit for Academic Success.
+13062052269
info@desklib.com
Available 24*7 on WhatsApp / Email
Unlock your academic potential
© 2024 | Zucol Services PVT LTD | All rights reserved.