Computer Protection Report

616 words - 2 pages

Computer viruses, spy ware, hackers, spam. True paranoids have good reason to fear what is out in cyber space, lurking to corrupt and ultimately crash their innocent PC. Banks, insurance companies and department stores add firewalls, patches, and teams of technical experts to fend off the next cyber attack on customer information. Would-be criminals dream of sneaking into government computers for the challenge.From identity theft to pranks, these types of invasive acts continue, despite security measures by the Operating System (OS) manufacturers. Microsoft offers free updates for its software via the web. Microsoft also offers patches for unforeseen vulnerability issues as they arise after marketing new software. To the unknowing PC user, many default settings in the newest Windows installs allow remote access to your PC, unless you manually turn the access off. (Rash, 2004)Chip makers and OS writers are fighting back, trying to close one of the most exploited holes; the buffer overrun. Viruses often create overruns by flooding a PC with more code or data than expected, leaving the excess code in an unprotected space on that system where it can execute. Windows XP with SP2--this feature sterilizes miscreant code that overflows programming boundaries by leaving it untagged. Desktops with this CPU enjoy the functionality today. However, Ullrich worries that network routers and mobile devices will not provide buffer overrun protection for some time. (PC World Dec, 2004)There are options other than Microsoft, called open-source programs. Many are as good or better than their Microsoft counterparts, others literally are headaches. Some of those are LINUX, requiring you to repartition your hard drive to make space for it. There is a version called Mandrakelinux with a built in portioning program. FOXFIRE is a web browser similar to Internet Explorer, not plagued by spy ware. OPENOFFICE is a suite of word processing, spreadsheet, and...

Find Another Essay On Computer Protection Report

Research and Describe the role of the Data Protection Legislation

1542 words - 6 pages Contents PageThe context of the page Page numberIntroduction 3Describe the Data protection legislation and 4 - 6what does it mean for the website?Data Protection Report· Who controls Data protection? 7· Data Protection legislation 8Bibliography 9IntroductionIn this assignment I have been asked to undertake a project, which means that I have to research and describe the role of the data protection legislations for companies. The

Growing Up With a Personal Computer

1553 words - 6 pages personal computer; as this technology can also be generally beneficial and influential in the life of a child. Unbeknownst to most is the fact that personal computers and computer gaming is generally beneficial to the mental and social ability of children. From a report on The Guardian, “A report from the European parliament concluded yesterday that computer games are good for children and teach them essential life skills (Booth).” The

The Microsoft Baseline Analyzer

1175 words - 5 pages performed scans for missing patches, missing/weak passwords, and assess the holistic security status to determine any associated potential risks to the computer. MBSA utilized the Microsoft update catalog and determined which security updates required updating, provided a report on specific system information, and performed Windows Security and Desktop Application Scans to report any further administrative vulnerabilities. The resulting security

The State of PC Security

3791 words - 15 pages IntroductionPrivacy and security is the number one concern of Computer users today. Survey after survey indicates people's mounting concern for the protection of their identities and the safeguard of their data. While our computer security and privacy faces threats from both private and probably governmental intrusions, the existing patchwork of laws and practices fails to provide comprehensive protection. Instead, we live in a confusion of

Computer Security.

1948 words - 8 pages information and create security plans that will meet this new challenge. Computer security controls work with a different set of variables than those used for mainframes and LANs. For example, control over program changes, data security, system documentation, backup, recovery plans, and system testing are inherent in most mainframe (LAN) environments. However, desktops, laptop, and handheld computer systems seldom have this protection. One of the most

Vulnerability of computerised accounting information systems to computer crime.

1597 words - 6 pages reputation, lost assets and possibly lost trade secrets.In today's world, the organisations are spending huge amounts to keep their data secured and avoid important information of their accounts to get into wrong hands as previously companies have suffered huge losses due to computer crime. According to one of the articles on Computer Crime at http://www.answers.com/topic/computer-crime, one report, made available in 1987 by the accounting firm of

Outline of the Data protection act and it's implications within IT.

2485 words - 10 pages technological advances, the benefits may be many but there will, inevitably, be potential problems.Consider this scenario. I purchase over a number of years books and CDs from a number of shops. The shops get together exchange information and build a picture of my interests. They use this to send me marketing information. Is there anything wrong with this?Development of data protection legislation (Bott et al., 2001)Report of Younger Committee on

Social Control of Cyber Space

2352 words - 9 pages , institutions around the United States have scattered for solutions to protect themselves from unlawful intrusions and the borderless threats from cyber space. In 1991, the Computer Emergency Response Team at Carnegie Mellon University, also known as C.E.R.T., reported more than 500 incidents of computer account attacks. Five years later, Carnegie Mellon University would report 2,500 incidents of such attacks. Frightening enough, University of

IA2b

960 words - 4 pages ). Cybersecurity Policy and Legislation in the 112th Congress. Intellectual Property & Technology Law Journal, 23(12), 14-20. Cate, F. & Laurie, B. (Eds.). (2009). Security, Privacy, and the Role of Law. IEEE Computer and Reliability Societies. (IEEE Report 1540-7993/09). (pp. 60-63). Retrieved from University of Maryland University College IEEE Computer Society website: http://www.computer.org.ezproxy.umuc.edu/portal/web/csdl Center for Democracy and

Home Computers; our greatest weakness in the fight against identity theft

659 words - 3 pages install and properly maintain anti-virus programs and firewalls culminating in enhanced security consciousness.One line of protection that every home computer should employ, is the use of anti-virus software that blocks computer viruses such as Trojan Horse programs. A Trojan Horse virus is a destructive program that masquerades as a benign application opening up ports to your system and allowing free access. Any good anti-virus software package

Copyrights

2576 words - 10 pages kinds of technical anti-copying devices that make up for what would otherwise be the possibility of easily achieved copying.Finally, in addition to the other forms of limitation on copying, the law of contracts can provide protection. Instead of using a special-purpose, no-copying computer, a publisher might sell drums to a library for use in an ordinary computer, but contractually obligate the library to permit only a certain type or extent of

Similar Essays

Computer Ethics Awareness Among University Students

930 words - 4 pages professional conduct for IT professionals, as a way to check or reduce unethical conduct in the IT profession. The 1991 report of the ACM/IEEE-CS Curriculum Task Force recommended the introduction of computer ethics into Computer Science Curriculum at University level (Martin & Yale-Weltz, 1999). The report stressed the importance to expose students to ethical and societal issues that are associated with the computing field during the point of

Computer Viruses Essay

3440 words - 14 pages Research paper on Computer Virus, Computer Worms and Trojan HorseComputer VirusesFor a layman who has little knowledge about the language of computers, there is no difference among virus, worm and Trojan horse. These three concepts are often used interchangeably because they are all malicious programs that can destroy files and data and cause damage to the computers. In this sense they are similar. They are, however, different. This report aims

Do Not Blame Computer For Everything!

3489 words - 14 pages be with us in the future.In this report, the arguments on whether the ethical problems or social problems arising from using computing technology are the result of computing invention or not will be discussed. Firstly, the definition of computer ethics, computer privacy and copyright will be introduced because the main arguments are focused on these three issues. And then, both sides of arguments will be illustrated and evaluated. Finally, the

Careers In The Operating System Field

1148 words - 5 pages to conceal confidential information as it is being transmitted. They also monitor news reports of computer viruses and update the virus protection system as needed. Computer security specialists may be called upon to educate users about computer security, install security software, monitor the network for security breaches, respond to cyber attacks, and, in some cases, gather data and evidence to be used in prosecuting cyber crime. The