Writing tips and writing guidelines for students,case study samples, admission essay examples, book reviews, paper writing tips, college essays, research proposal samples
Tuesday, August 13, 2019
Cyber Security Coursework Example | Topics and Well Written Essays - 2500 words
Cyber Security - Coursework Example The paper tells that in the current age of union of communication and technology, one cannot resist or keep away from being affected by internet, cyber space, cell phones and computers. However as we marvel our lives due to these technologies and feel blessed, we canââ¬â¢t stop thinking about our own security and safety over the cyber space. Either it be physical security, personal information security or security of our computerââ¬â¢s hardware and soft ware, we are concerned about our safety. Then what basically is cyber security? It is guarding your physical and personal data from any vulnerability such as a digital asset accumulated in your computer, hard disk or any of the memory drives. Firstly, you need to search that what kinds of vulnerabilities you can meet on the internet and what should you do to counter them. There are many distinct types of vulnerabilities and each one of them is serious in its own sense and asks for solutions to overcome it. The higher the vulnera bility is, the more complicated or intricate measure would be taken to implement security measures to protect your own self. Beginning from plain malicious codes or malware to grave viruses which can erase all the data on your computers or gulp all the contents of your windows; hackers can utilize your personal data for their deceitful purposes. These are risks that if not properly addressed can create acute problems for you. Often these malicious codes or spyware get into your computer when you enter a new website or open an unknown mail. Every application has some loop holes which are identified by hackers and then it becomes easier for them to exploit your programs. They get access to these files and copy and harm computer applications by clinging themselves to either the junk mail you receive or through your local network provider. These deceitful codes are usually very intricate and tricky so that a normal person using Personal computer cannot access them. IT professionals spen d huge amount of their time to solve these codes. These codes are not only restricted to spyware and malware but also consist of bugs, worms and viruses which are a cause of a lot of damage. (Cyber Security (2010)) These malicious codes are very harmful indeed but there is a bigger imposter than them. These are the attackers or hackers. They are much hazardous and harmful then these mere codes. Codes and Viruses can only do what they are designed to do by the original programmer. However, these attackers and hackers are living people who can obtain the necessary information they require and then use it for their own malicious purposes. But sometimes hackers might just be having fun! They want to try their hacking skills and get into your computer just to know how to hack and learn it rather than for any sort of personal benefit. (Cyber Security (2010)) Top Cyber Security Vulnerabilities The Database of National Vulnerability Version 2.2 is vulnerability management data which is run by the United States government and is characterized by SCAP (Security Content Automation Protocol). This data helps in computerization of management of vulnerability, all security measures you can take to avoid it, and obedience or agreement to these measures. National Vulnerability Database
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment