We use cookies to give you the best experience possible. By continuing we’ll assume you’re on board with our cookie policy

Computer security is a safety runing system that is an of import characteristic to put in on a computing machine. It ensures safety and protection from unknown users and menaces. If a safety operating system is weak, unknown users, or hackers, are able to interrupt into the database and put in harmful viruses, every bit good as steal personal information. Computer security and hacking can hold both disadvantages and advantages. Computer security has evolved from early on to being a cardinal constituent to have. Hacking, every bit good as computing machine security, has developed into a more harmful and unsafe activity. Presently, security plans have been developed to halt hacking and viruses from encroach onto a user ‘s computing machine. Computer security and hacking have had impact on society today, globally and locally. Users use computing machine security to their benefit when maintaining personal information stored on their database. Choping can destruct a users ‘ individuality, or perchance their repute. Businesss and organisations have benefited from security, by its protection of information and protection from outside injury. Choping can be used as a good manner to look into a computing machine ‘s sustainability to dangers through webs and the cyberspace. Computer security and hacking are two of import issues discussed and recognized today.

Contentss

1 Introductionaˆ¦aˆ¦aˆ¦aˆ¦aˆ¦aˆ¦aˆ¦aˆ¦aˆ¦aˆ¦aˆ¦aˆ¦aˆ¦aˆ¦aˆ¦aˆ¦aˆ¦aˆ¦aˆ¦aˆ¦aˆ¦aˆ¦aˆ¦aˆ¦aˆ¦aˆ¦aˆ¦aˆ¦aˆ¦aˆ¦aˆ¦aˆ¦aˆ¦aˆ¦aˆ¦aˆ¦aˆ¦aˆ¦1

GET EVEN A BETTER ESSAY WE WILL WRITE A CUSTOM
ESSAY SAMPLE ON
Computer Security And Threat Of Hacking... TOPICS SPECIFICALLY FOR YOU

2 Backgroundaˆ¦aˆ¦aˆ¦aˆ¦aˆ¦aˆ¦aˆ¦aˆ¦aˆ¦aˆ¦aˆ¦aˆ¦aˆ¦aˆ¦aˆ¦aˆ¦aˆ¦aˆ¦aˆ¦aˆ¦aˆ¦aˆ¦aˆ¦aˆ¦aˆ¦aˆ¦aˆ¦aˆ¦aˆ¦aˆ¦aˆ¦aˆ¦aˆ¦aˆ¦aˆ¦aˆ¦aˆ¦aˆ¦.2

2.1 Definitions and History of Computer Security and Hackingaˆ¦aˆ¦aˆ¦aˆ¦aˆ¦aˆ¦aˆ¦2

2.2 Advantages and Disadvantages of Computer Security and Hackingaˆ¦aˆ¦.3

2.3 Good and Bad Hackingaˆ¦aˆ¦aˆ¦aˆ¦aˆ¦aˆ¦aˆ¦aˆ¦aˆ¦aˆ¦aˆ¦aˆ¦aˆ¦aˆ¦aˆ¦aˆ¦aˆ¦aˆ¦aˆ¦aˆ¦aˆ¦aˆ¦aˆ¦aˆ¦aˆ¦aˆ¦aˆ¦..3

2.4 Malwareaˆ¦aˆ¦aˆ¦aˆ¦aˆ¦aˆ¦aˆ¦aˆ¦aˆ¦aˆ¦aˆ¦aˆ¦aˆ¦aˆ¦aˆ¦aˆ¦aˆ¦aˆ¦aˆ¦aˆ¦aˆ¦aˆ¦aˆ¦aˆ¦aˆ¦aˆ¦aˆ¦aˆ¦aˆ¦aˆ¦aˆ¦aˆ¦aˆ¦aˆ¦aˆ¦..3

3 Computer Security and Hacking.aˆ¦aˆ¦aˆ¦aˆ¦aˆ¦aˆ¦aˆ¦aˆ¦aˆ¦aˆ¦aˆ¦aˆ¦aˆ¦aˆ¦aˆ¦aˆ¦aˆ¦aˆ¦aˆ¦aˆ¦aˆ¦aˆ¦aˆ¦aˆ¦aˆ¦aˆ¦..4

3.1 Impact on societyaˆ¦aˆ¦aˆ¦aˆ¦aˆ¦aˆ¦aˆ¦aˆ¦aˆ¦aˆ¦aˆ¦aˆ¦aˆ¦aˆ¦aˆ¦aˆ¦aˆ¦aˆ¦aˆ¦..aˆ¦aˆ¦aˆ¦aˆ¦aˆ¦aˆ¦aˆ¦aˆ¦aˆ¦aˆ¦.3

3.2 Technology to increase computing machine securityaˆ¦aˆ¦aˆ¦aˆ¦aˆ¦aˆ¦aˆ¦aˆ¦aˆ¦aˆ¦aˆ¦aˆ¦aˆ¦aˆ¦aˆ¦aˆ¦4

3.3 Checking computing machine ‘s secure networkaˆ¦aˆ¦aˆ¦aˆ¦aˆ¦aˆ¦aˆ¦aˆ¦aˆ¦aˆ¦aˆ¦aˆ¦aˆ¦aˆ¦aˆ¦aˆ¦aˆ¦aˆ¦..4

4 Conclusionaˆ¦aˆ¦aˆ¦aˆ¦aˆ¦aˆ¦aˆ¦aˆ¦aˆ¦aˆ¦aˆ¦aˆ¦aˆ¦aˆ¦aˆ¦aˆ¦aˆ¦aˆ¦aˆ¦aˆ¦aˆ¦aˆ¦aˆ¦aˆ¦aˆ¦aˆ¦aˆ¦aˆ¦aˆ¦aˆ¦aˆ¦aˆ¦aˆ¦aˆ¦aˆ¦aˆ¦aˆ¦aˆ¦aˆ¦5

5 Referencesaˆ¦aˆ¦aˆ¦aˆ¦aˆ¦aˆ¦aˆ¦aˆ¦aˆ¦aˆ¦aˆ¦aˆ¦aˆ¦aˆ¦aˆ¦aˆ¦aˆ¦aˆ¦aˆ¦aˆ¦aˆ¦aˆ¦aˆ¦aˆ¦aˆ¦aˆ¦aˆ¦aˆ¦aˆ¦aˆ¦aˆ¦aˆ¦aˆ¦aˆ¦aˆ¦aˆ¦aˆ¦aˆ¦aˆ¦6

List of Figures and Tables

Figure 1. Picture stand foring a computing machine and its securityaˆ¦aˆ¦aˆ¦aˆ¦aˆ¦aˆ¦aˆ¦aˆ¦aˆ¦aˆ¦aˆ¦aˆ¦aˆ¦aˆ¦aˆ¦aˆ¦aˆ¦aˆ¦aˆ¦aˆ¦aˆ¦aˆ¦aˆ¦aˆ¦aˆ¦aˆ¦aˆ¦2

Figure 2. Picture of the types of viruses and menaces on computersaˆ¦aˆ¦aˆ¦aˆ¦aˆ¦aˆ¦aˆ¦aˆ¦aˆ¦aˆ¦aˆ¦aˆ¦aˆ¦aˆ¦aˆ¦aˆ¦aˆ¦aˆ¦aˆ¦aˆ¦aˆ¦aˆ¦.3

Figure 3.Picture of the computing machine security plan Norton AntiVirus by Symantecaˆ¦aˆ¦aˆ¦aˆ¦aˆ¦aˆ¦aˆ¦aˆ¦aˆ¦aˆ¦aˆ¦aˆ¦..4

Figure 4.Picture of the Norton chief screenaˆ¦aˆ¦aˆ¦aˆ¦aˆ¦aˆ¦aˆ¦aˆ¦aˆ¦aˆ¦aˆ¦aˆ¦aˆ¦aˆ¦aˆ¦aˆ¦aˆ¦aˆ¦aˆ¦aˆ¦aˆ¦aˆ¦aˆ¦aˆ¦aˆ¦aˆ¦aˆ¦aˆ¦aˆ¦aˆ¦aˆ¦aˆ¦aˆ¦aˆ¦aˆ¦.4

1 Introduction

Computer Security is an of import component of safety safeguard when utilizing a computing machine. These runing systems run on computing machines to guarantee the safety of personal and fiscal information, along with protection. Computer security can be a really utile constituent to get [ 1 ] . If an unknown user attempts to entree a computing machine database, computing machine security will guarantee that that user will non be let in [ 2 ] . Besides maintaining unknown users out of others ‘ computing machine databases, computing machine security besides provides protection from harmful menaces and viruses. Once these viruses find their manner onto a user ‘s computing machine, information and control entree can be stolen [ 3 ] . There are important advantages and disadvantages of holding a strong computing machine system, one advantage being protection from viruses and other harmful onslaughts [ 4 ] .

Hacking has found its manner into the universe of computing machines. Choping can be destructive, harmful, and can hold some bad impact on peoples ‘ lives. If a computing machine system is non protected by a security operating system, hackers can happen their manner into that database easy. Once in, hackers can obtain personal, fiscal, and of import information [ 5 ] . This can do ruin in a user ‘s concern and personal life, and much more. While being branded a bad thing, choping can assist many every bit good. Some hackers are able to prove the dependability of a computing machine ‘s security system, to happen weak musca volitanss in the barrier [ 6 ] . Like computing machine security, choping can hold both costs, but benefits excessively [ 2 ] .

The intent of this study is to let computing machine users to derive penetration on the facets of computing machine security and the ethical issue of choping. Computer security can let users to experience comfy cognizing their personal information is being kept hidden. But even with a high-ranking computing machine security system, one is still vulnerable to a hacking invasion. A computing machine user ‘s private information, such as societal security, recognition card Numberss, watchwords, electronic mail references, and other information is at hazard to being taken.

There are a figure of aims covered in this study. First, computing machine security is used to maintain personal, fiscal, and other private information kept confidential. Second, computing machine security blocks viruses and aggressors from infringing on one ‘s computing machine. Third, even with this security, one is still susceptible to a hacking onslaught. And in conclusion, choping can be easy hurtful, but could in some instances be merely as helpful for users.

The chief contents of this study include computing machine security, and the issue of choping. Computer security is described as a protection technique for personal information, and for barricading unwanted menaces from the cyberspace. Hacking is described as being a harmful manner to obtain information from other users ‘ databases. Viruss and menaces are each described in order for other users to cognize the differences between them all. Besides in this study are ways to look into a computing machine ‘s security and ways to maintain it protected from injury excessively.

2 Background

2.1Computer security is an operating system used on computing machine databases to protect and supply safety to users. Besides forestalling unauthorised entree, computing machine security provides protection for personal, fiscal, and classified information [ 1 ] . One type of this security system requires a proof of a username and watchword provided by the user, in order to derive entree into the computing machine database [ 2, pg.267 ] . Besides formalizing who the user is, it besides confirms that the user is non seeking to try an improper operation [ 2, pg.31 ] . As shown in Figure 1, computing machine security requires a “ key, ” or username and watchword, in order to entree the database. Many concerns and organisations have benefited greatly from this operating system, because it allows their private information to remain confidential and secret [ 1 ] .

hypertext transfer protocol: //comtrec.com/wp-content/uploads/2010/05/Computer-Internet-Security.jpg

Figure 1 Picture stand foring the security operating system,

with the binary representation inside a computing machine.

Computer security had begun physically in the 1950-60s. Computer systems so were guarded by security officers, to halt the effort of deriving unauthorised entree. Subsequently on in the 60s and 70s, entree could be granted over telephone lines, which caused a alteration in the manner computing machines were externally guarded [ 2, 266-7 ] . By the 90s, companies sprang up to supply a more modern manner of procuring computing machine systems. Secure Sockets Layer ( SSL ) was developed by Netscape Communications, ( which was an early web browser ) to acquire unafraid transportation of info when purchasing online. By 1999, the Transport Layer Security ( TLS ) had been developed, and was really similar to the Secure Sockets Layer, but with a few of import betterments [ 2, 350-1 ] .

Choping can be defined as the invasion of one ‘s personal or concern computing machine system by an outside beginning [ 7 ] . Hackers, or the outside beginnings infringing on the personal computing machine, can hold many motivations to these invasions. Some hackers have admitted to merely desiring to bask the challenge of get the better ofing a security system [ 8 ] . Other hackers have admitted to desiring private or fiscal information for their ain personal addition [ 7 ] . There are different ways a computing machine can be hacked into. These ways include: through downloads, internet-based plans, and through fraud electronic mails. Through these, hackers can works viruses and onslaughts which make it possible to get the better of a security system [ 3 ] .

A “ hacker ” has had many definitions from early on. In the Middle Ages, a “ hacker ” was in the concern of making tools known as hoes. Subsequently on into the seventeenth Century, a “ hacker ” had become a strong worker that handled a hoe. Today, a “ hacker ” has nil to make with an existent tool, but is capable of being a strong worker, when it comes to irrupting upon another ‘s computing machine system [ 2, pgs.657-8 ] . The earliest signifier of hacking was known as “ phreaking. ” This involved hacking utilizing telephone lines [ 9, pgs.12- 13 ] .

2.2There are a figure of advantages and disadvantages when it comes to computing machine security. Some advantages include: greater storage infinite, resource and file sharing, an addition in cost efficiency, and security of private information. Some disadvantages include: the expensive cost, it could hold a figure of weak musca volitanss, and some security issues [ 4 ] .

Hacking has some of import costs and benefits when it comes into drama. Some costs include: the proprietor loses control over his or her information, harmful viruses and menaces on users ‘ computing machines, and loss of informations either being knowing or unwilled by hacker. An of import benefit is ethical hacking, because users can find where the weak musca volitanss in their system are [ 2, pg.659 ] .

2.3 There are some theories to make up one’s minding whether choping can be good or bad. In some ways, it can be unsafe, hurtful, and lay waste toing. Many can lose their personal information, such as societal security, recognition card Numberss, electronic mails, references, and much more, and can be left with nil. In some ways, hacking could be a good thing. This is true because many hire ethical hackers to prove their computing machine ‘s security strength to happen weak countries in their systems. It is an open theory, because hacking can be labeled good and bad, and each statement can be supported [ 2, 659 ] .

2.4 A category for viruses, menaces, worms, Trojans, spyware, and other signifiers of onslaughts is known as “ malware. ” [ 7 ] . A little part of package that can come in a user ‘s computing machine in secret and in other easy ways is known as a virus. Dardans are similar to a virus, but different in the fact that one time installed, it allows the Trojan Equus caballus ‘s Godhead the ability to see everything on the user ‘s computing machine. Spyware is capable of being installed within a user ‘s database with or without the user holding cognition of it [ 3 ] . These types of menaces and onslaughts are hidden within plans that come as sham electronic mails, internet-programs, and downloads. Figure 2 below demonstrates all the different types of harmful menaces that can be uploaded onto your computing machine by hackers.

hypertext transfer protocol: //www.dreamstime.com/computer-and-network-security-hand-thumb4123007.jpg

Figure 2 This is a aggregation of all the different

types of viruses and menaces that can be harmful

for a user ‘s computing machine.

3 Computer Security and Hacking

3.1Society has been impacted by computing machine security in a figure of ways. Computer security ensures users that their personal, fiscal, and other information will be kept secret from the eyes of others. It impacts concerns and organisations by maintaining their confidential informations safe from position and injury and assisting them in remaining successful [ 1 ] . It allows users to portion files and resources, an increased sum of storage infinite, and an addition in cost efficiency [ 4 ] . Equally good as protecting information, computing machine security has impacted users and their computing machines from awful viruses, menaces, and malware every bit good [ 3 ] . Computer security is an of import piece of engineering that has impacted society since its beginning.

Hacking is impacting society today in many ways. Choping impacts users by taking their personal information, and could perchance expose it over the cyberspace [ 7 ] . It is doing an addition in cost for companies and organisations to repair their computing machine systems after a security breach, and to obtain better security. There has been recent certification covering with an increased sum of menaces found in web sites that can easy be uploaded onto databases. [ 10 ] . Choping impacts concerns and organisations if these do non hold a strong security system. Choping can hold a figure of impacts on society, particularly taking personal information from other users [ 5 ] .

3.2 Computer security involves another constituent, called a “ firewall. ” This constituent, package or hardware, is made to barricade unwanted menaces and viruses from a user ‘s computing machine. A firewall is used to forestall the invasion of hackers, viruses, and many other menaces from deriving entree and information onto a computing machine [ 11 ] . An illustration of a strong firewall that provides protection and dependableness is the Cisco PIX Firewall [ 10 ] .

A well-known security system used by many is called Symantec. Symantec had originated in 1982. It has become the universe ‘s largest package company, with concern internationally, and with over 17,000 workers. Symantec ensures security of the computing machine, its substructure, and all the constituents within it. Symantec has a research lab where new engineerings are developed to guarantee even more security [ 12 ] .

Norton AntiVirus is Symantec ‘s current security plan. Norton provides safe networking, protection online, and a scanner to look into for viruses and menaces. Norton is a really trustful plan, because it ensures safety for users and for their computing machines. Figure 4 is a image of the plan Norton AntiVirus. Figure 5 represents the Norton plan at work. This chief screen alerts the user if their system is non unafraid, and what types of protection the user would wish to be on or off. [ 12 ]

hypertext transfer protocol: //www.amitbhawani.com/blog/wp-content/uploads/2010/06/Norton360-Box-Package.png hypertext transfer protocol: //www.windows7hacker.com/wp-content/uploads/blog/DownloadNortonAntivirus2010BetaonWindows_E88F/NewNortonAntiVirus.png

Figure 3 Picture of the Norton Figure 4 This figure represents the Norton AntiVirus plan AntiVirus chief screen

3.3 Even though hacking is labeled as unsafe, some have found hacking to be a approval. Some computing machine users hire “ ethical hackers, ” which are those who imitate an existent onslaught onto a user ‘s computing machine system, in order to prove that computing machine ‘s security system and its barricading power. While copying this onslaught, ethical hackers are besides looking for failings within the system, and what could be stolen in a existent hacking onslaught [ 6 ] . Another manner to look into a web ‘s security is by directing a exposure scanner over the computing machine. Like ethical hacking, a exposure scanner will look into for failings in the security, and will increase the security every bit good. Besides scanning for failings in the security wall, users should systematically be look intoing their computing machines for any type of menaces or onslaughts. If these menaces or onslaughts are non resolved, all types of malware could pervert the database [ 10 ] .

4 Decision

Computer Security is described as being a protection mechanism for computing machine databases. This mechanism can come in different forms, manners, and signifiers [ 1 ] . One of the types of computing machine security is a proof codification. The user of the computing machine must supply his/her ain username and watchword to entree the database [ 2 ] . Another type is AntiVirus security, such as Norton AntiVirus by Symantec. This plan will supply protection from harmful menaces and viruses, and hackers every bit good [ 12 ] . Computer security has provided many with comfort cognizing that their private and fiscal information will be kept safe from other eyes on their computing machines. Large companies and organisations have benefited from computing machine security, because with it they have a comforting feeling that their of import information will be kept safe [ 1 ] .

Hacking is a unsafe and unfortunate activity that occurs on vulnerable computing machines [ 7 ] . Hackers find their manner into other user ‘s systems, and depending on what they want, recognition card Numberss, societal security, or anything of the similar, they are likely to win in acquiring [ 5 ] . Hackers can works harmful viruses and menaces into a user ‘s system with or without that user cognizing [ 7 ] . It can be a really disconcerting and luckless event to go on, because users are susceptible to holding their personal information stolen or revealed to the public [ 2, pg.659 ] . But in the visible radiation of things, choping could be a good thing for some users. Ethical hacking can be a utile method for look intoing a computing machine ‘s security barrier. It finds the weak musca volitanss that a computing machine hacker, virus or menace could come in the database through [ 6 ] .

There are ways to better computing machine security and to maintain hackers and viruses out of computing machine systems. Ethical hacking could be a method used to happen the vulnerable countries in the security, which would inform the user that better security is needed [ 6 ] . Similar to ethical hacking, a exposure scanner runs over the system scanning for weak musca volitanss, and improves security excessively [ 10 ] . Certain antiviral plans could be purchased and installed to increase security. Such plans as Norton AntiVirus will alarm the user of any menaces, scans the system, and will maintain a computing machine safe [ 12 ] .

There are decisions I ‘ve drawn from researching computing machine security and hacking. First, computing machine security is a really of import constituent to hold on a computing machine. Businesss and companies have impacted from it, because they are able to maintain valuable information stored on their computing machines. Without it, users should non be on the cyberspace or web at all. Hacking can be a really uncomforting and hurtful activity to users and their computing machines. Users can hold their private and fiscal information taken from them, every bit good as being made populace. There are many types of viruses and menaces that can harm users ‘ computing machines, particularly the 1s thought to be low hazard. The ground I drew these decisions is because they are of import things to cognize and understand. If one is naA?ve to the hazards of the cyberspace and hackers, their computing machines, every bit good as themselves are in hazard.

There are some issues that I would wish to turn to in future surveies. I would wish address the issue of weak musca volitanss in a computing machine ‘s security. I would wish to see this security to non hold these weak musca volitanss, and to repair them before utilizing them on computing machines. Second, I want users to recognize how unsafe it is to non hold a computing machine security operating system, before they find it is excessively late. I would wish to see plans such as Facebook and MySpace non let users to set every bit much information as they allow now. Because of this displaying of information, many are susceptible to danger. I would wish these issues to be addressed in future surveies.

Share this Post!

Send a Comment

Your email address will not be published.

Kylie Garcia

Hi there, would you like to get such a paper? How about receiving a customized one?

Check it out