CO4509 Computer Security: Analysis of Threats and Countermeasures

Verified

Added on  2025/04/23

|21
|3622
|151
AI Summary
Desklib provides past papers and solved assignments for students. This report analyzes computer security threats and countermeasures.
Document Page
CO4509 - COMPUTER SECURITY
ASSIGNMENT 1
STUDENT ID-
STUDENT NAME-
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
Contents
Introduction................................................................................................................................4
Analyse potential threats to computer systems and networks and evaluate countermeasures...5
Main threats of the computer system:....................................................................................5
Computer system networks:...................................................................................................6
Key principles of the computer security database..................................................................7
Description of the Memcrashed Function..............................................................................9
Memcrashed Exploit function..............................................................................................10
Memcrashed Exploit Solutions............................................................................................11
Critically evaluate security policies and techniques................................................................12
Cloud security function in the computer security system:.......................................................16
Conclusion................................................................................................................................19
References................................................................................................................................20
Document Page
List of figures
Figure 1: Different type of computer Threats............................................................................5
Figure 2: Computer system network..........................................................................................6
Figure 3: Memcrashed Technical Code.....................................................................................7
Figure 4: Memcrashed Function................................................................................................9
Figure 5: Memcrashed Exploit function..................................................................................10
Figure 6: Computer Security policies......................................................................................12
Figure 7: Computer security techniques..................................................................................14
Figure 8: Cloud Security Function...........................................................................................16
Document Page
Introduction
The computer is the source of the information. With the help of the human being, many types
of data should be transferred from the computer analysis system. For making a healthy
environment in the computer system computer security is the necessary part to identify the
computer system. Computer security is a platform in which control the all computer
application and manage the computer hardware and software parts. In the computer security
system analysis the computer data and frame structure of the computer application. Computer
security provides a path function in which save computer function threats. Protect of the
computer application information, data structure and computer threats is the combination of
computer security.
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
Analyse potential threats to computer systems and networks and evaluate
countermeasures
Computer system threats are the path function to analyse the security function of the
computer system. With the help of the threats mechanism improve the security function of
the computer system.
Main threats of the computer system:
Spyware computer Threats
It is the security programme with the help of them checks the online function of computer
programmes. This system generates a platform in which according to the generated platform
cross-check the online computer programme and define its value. It is the internet security
function with the help of them according to the online structure defines the work structure of
the computer programme.
Phishing Threat
It is the computer protocol with the help of them checks the personal and financial
information of the user or applicant. It is the path function of the computer system with the
help of them reduces the computer attacks from the online internet application (Aljawarneh
et al 2017).
Hacker’s application and predators Threat
It is the security threats of the computer system. In this application according to the computer
programme identify the computer viruses and according to the application make the security
function. With the help of security, the tool generates a way in which according to the
security framework defines the user application.
Document Page
Figure 1: Different type of computer Threats
Computer system networks:
Computer system network is the principal with the help of them convey the information from
one place to another place. In the computer network system, security is the most important
function to locate the computer network mechanism. With the use of the network, the
mechanism generates a platform in which all the computer system is connected to each other
and transfers the information.
Main computer network system:
Local application network
It is the application of the computer system in which all the computer system is connected to
each and transfers the information from one to another system. In this principle, the computer
system does not identify the online network and follow only the connected path function
(Alshammari et al 2015).
Wide application network
Document Page
It is the path function of the computer information system. In this network system computer
system is connected with the global market to identify the information. In this system, a
secure manner is more important compared to the local computer application.
Figure 2: Computer system network
Key principles of the computer security database
Computer security is the combination of the security function of the cyber-attacks and saves
information technology from the computer application. In the computer application, database
structure plays a vital role to secure the computer application. In the computer, the security
mechanism includes the different type of database structure to secure the computer system
(Falkowitz et al 2015).
Technical code of the Memcrashed computer security function:
Memcrashed is the path function with the help of them manages the traffic rate in the
computer security application. It is the amplification function with the use of them improves
the security network of the computer application. The technical code of the computer security
function is defined it is the way by which identify the protocol of the security application.
With the help of the technical code track the IP address of the computer system and locate the
security function.
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
Figure 3: Memcrashed Technical Code
Source- (Falkowitz et al 2015)
Main database security function
(1) Confidentiality: It is the path function in which secure the computer application. In this
system, all the data authentication function is access by the registered users. It is the
application in which only authorized applicant is applicable to access the computer
information. In this application firstly user defines the framework of the database and
according to the database frame structure only authorized a user to compile the computer
function. The database is the security function of providing the complete security mechanism
in the computer mechanism (Ghiëtte et al 2018).
(2) Integrity: It is the framework of the database structure. In the integrity system only
authorized user is applicable for the modification in the computer application system.
Integrity is the function of the database structure to modify computer information. With the
Document Page
help of the integrity function user modify the information according to the computer
application. When the information is changed by the user on that time when the other user is
using this particular system or application at that time received the changed computer
information.
(3) Database availability: In the computer security system presents the computer
information is a very important parameter to analyse the security system. In the database
structure when the user uses the computer information on that time according to the system
mechanism analysis the security function of the computer system (Hu et al 2016).
(4) Database authentication: For increase, the computer security application database
authentication is the necessary part to improve the security function. When the database
provides the proper authentication for the user on that time only authorized user is using the
computer application system. With the help of the registered user only selected protocol is
followed in the computer system and the framework of the computer system is more secure
compared to another computer application.
Example: For maintain the computer security application use the firewall detection system
secure the computer application. The firewall system reduces the data structure form the
computer application and increases the life of the computer network mechanism
(Kalaiprasath et al 2017).
Description of the Memcrashed Function
Memcrashed is the open application source with good quality performance sector to define
the database structure. In this system define a design structure to distribute the computer
memory according to the database parameter. When using the men crashed protocol at that
time speed of the attacks on the computer system is reduced. With the help of this
amplification system improve the process techniques to obtain the result. Memcrashed is
based on the denial services application to providing the proper security manner in the
computer application. Memcrashed is the simple construction application to analysis the
computer data according to the secure manner.
Document Page
Figure 4: Memcrashed Function
Memcrashed Exploit function
Memcrashed is the application in which reduce the computer attacks. With the use of the
memcrashed exploit reflection of the computer, the programme is complete and improves the
computer security function. In the exploit function, each data from the computer application
improve computer services. When the computer application uses the memory of the cache on
that time frequency of the database structure is to improve and generate the high-security
area. With the use of the exploit function network data access should be high and internet
access follow the security protocol (Merlo et al 2015).
Figure 5: Memcrashed Exploit function
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
Memcrashed Exploit Solutions
It is the application with the help of them reduces the computer attacks from the online
internet function. In this mechanism increase the security functions in the computer
application and improve the quality of the working structure.
Exploit solutions:
Follow the new exploit application for the file transformation.
Use the window metafile tool to increase the conversion rate.
Protect from the cyber-attacks for the online internet function.
Use the SQL process application to improve the working structure of the computer
application.
Reduce the working of the website app to increase the security function in the
computer application.
Document Page
Critically evaluate security policies and techniques.
Computer Security policies
Security policies are the path function in which includes the all security threats, organisation
security function and also include the computer application. In the security policy according
to the computer network complete the market structure. It is the system in which according to
the decided computer framework analysis the computer application and secure the
organisation data. Security policies are a physical thing to improve the working condition of
the organisation. When the computer application uses the security policies on that time
reduce the cyber-attacks and improve the computer application.
Main security policies:
(1) Object information: It is the basic principle of security policies. In this function firstly
identify the computer object according to the security function. In this policy system, all the
computer application identifies the basic information of the object and according to the object
information defines the security parameter. In the computer application when the object
information is finding on that time according to the object requirement locate the basic
information of computer application (Ney et al 2017).
(2) Computer application Scope: It is the object of information technology. In this function
according to the scope or requirement of the user application justify the security function. In
the computer application, the entire applicant did the work on a decided path function and if
any changes are done on that time conceder the secure manner. According to the application,
scope decided the user need and set the security parameter. All the computer data is based on
the scope of the computer application. The function of the computer application is totally
based on the framework of the computer network.
(3) Object goals: Security policy defines the goals of the computer application. According to
the policy goals define the frame structure of the computer application. The main goals of the
security function provide the security parameter according to the computer programme.
When the security goals are identified on that time working efficiency is high and the impact
of the cyber-attacks is reduced. In the computer security function with the help of the proper
chevron_up_icon
1 out of 21
circle_padding
hide_on_mobile
zoom_out_icon
[object Object]