Computer Security Since 2001 Essay

2099 words - 8 pages

Computer security is now an important area for any network administrator, systems analyst, information technology technician, databases administrator to the computer scientist. Although this list shows the professionals dabbling in Information Technology, it should not be misconstrued that the average computer user at home should not be concerned about computer security. A computer, be it a personal computer, a laptop or a simple netbook, is one of the features that adorn any home. Mobile phones too should not be excluded whenever the issue of computer security crops up since they are the latest targets for cyber criminals (SANS Institute). Inevitably, this has the led to the development and growth of a complex industry centered on Computer security.
The actual threats to computer security are many. These threats emanate from the state of technology of today’s computer, computer users who are ignorant of the ways to secure their computer machines, the current trend of data distribution without any restraints, and the advent of the mobile office (Vacca, J., 2009, 3-4). Firstly, the modern PC today has evolved from the Abacus, an implement that was used for simple mathematical calculations (Sadiku and Obiozor) to a powerful machine that can store and manipulate data (Vacca. J., 2009, 3). Sadiku and Obiothor’s work shows the evolution of the computer starting from the Abacus, to the machines made by such inventors as Blaise Pascal, Gottfried Wilhelm von Leibniz, Charles Babbage and Thomas of Colmar, to the electromechanical computer using punched cards, right through to the first digital computer using Integrated Circuits. It is the latter development, more so in the manufacturing of the Integrated Circuits, which has increased the power of the modern computer to not only compute difficult mathematical calculations but also to manipulate data. The powerful technology behind the modern computer is also complicated. Many average computer users, even many computer professionals do not fully understand how the computer works (Vacca, J., 4). It is this ignorance that enhances threats to company data or personal data.
Secondly, many computer users are not fully conversant with the strategies on how to secure their computers. This provides malicious computer users to launch attacks through outright manipulation of these users. For example, Vacca (2009) shows that through unbridled instaaltion of computer programs and the accessing of dubious websites online, users are able to act as conduits for malicious programs within a network (p. 4). It is through this technique that phishing scams occur and malicious programs such as computer viruses and worms are spread from one computer to another (Vacca, J., 2009, 4).
Thirdly, the aim of computer design was to increase the power of the machine (Vacca, J., 2009, 4). Consequently, the complexity of the computer’s technology increased proportionally to the computing power of the machines increase....

Find Another Essay On Computer Security Since 2001

The Heightening of Airport Security after September 11th

798 words - 3 pages The Heightening of Airport Security after September 11th Extraordinary challenges require extraordinary measures. The terrorist attacks on America on September 11, 2001 required that we reform our nation’s aviation security system in fundamental ways. Three years after the Sept. 11 tragedies, how far has airport and airlines come? It depends on the source. While it is important for airports to heighten security after the attacks of 9/11

Social Distance Essay

1756 words - 8 pages In reference to computer science, physical security is one of the most important accomplishments a business can achieve. Due to the advent of the modern technical age, all of a company’s records are held on their data systems. First and foremost, theft or loss of historical records and accounting data would instantly cripple an enterprise and could very well lead to its ultimate demise. The high profile news reports just in the last decade

Computer Security

3255 words - 13 pages and more effective, there are still threats to my security as a user of the Internet. It would be interesting to understand the concept of computer security and its techniques before explaining what are the threats to computer security, and finally looking to its application on the Internet. Computer security has been important since the creation of the Internet. Still, Steven L. Shaffer and Alan R. Simon describe it as being one of

The Growing Threat of Computer Crime

3335 words - 13 pages Abstract Computers have been used for most kinds of crime, including fraud, theft, larceny, embezzlement, burglary, sabotage, espionage, murder, and forgery, since the first cases were reported in 1958. One study of 1,500 computer crimes established that most of them were committed by trusted computer users within businesses; persons with the requisite skills, knowledge, access, and resources. With the arrival of personal computers to

A Security Plan for Individuals by Virtual Protectors

2068 words - 8 pages implement these aspects of computer security. Without computer security, a business could easily fail by just taking its first steps into e-commerce or any participation within the web. Internet Security Attacks today via the Internet are much more advanced and pose a greater threat to anyone using the Internet. However there are certain practices that should be applied when using the Internet for business purposes. Since DAD’s will be dealing with

Gray-Hat Hacking

2153 words - 9 pages Copyright Act, 1998, 5 Deborah Radcliff, Playing by Europe’s rule, 2001,,10801,62057,00.html 6 US Department of Justice, Federal Computer Intrusion Laws, 7 Council of Europe, Convention on Cybercrime CETS No.:185, 2001,

Computer Ethics Awareness Among University Students

930 words - 4 pages caused by unreliable software and to computer misuse (Forrester and Morrison, 2001). According to Forrester and Morrison (2001), this unethical use of computer have created a whole new range of social problems, which include computer crime, software theft, hacking, the creation of viruses, invasion of privacy, overreliance on intelligent machines and workplace stress. This unethical behaviour related to Information System (IS) have caused

Common security arguments

2967 words - 12 pages , remotely. Reid explained his reason to target, Microsoft Windows' a negligent security model yet profiting from end-users' weakness to buy their first computer for Internet access, unaware the O/S security flaws and potential Internet danger. (, 2002) Maybe they are today's Robin Hoods or maybe not.1984's "Great Hacker War". Masters of Deception (MOD) led by Phiber Optik, ex-LOD opposed Legion of Doom (LOD) group founder, Lex Luther. Since

Cyber Crimes Reflected Through Television Programs

1058 words - 5 pages before the Senate Intelligence Committee, that computer technology is growing so rapidly it is hard for security experts to keep improving (The FISCAL Times By Reuters, Roll Call March 13, 2013). In relation to depict, 24’s illustration of computers being used as a weapon to commit crimes over the internet is accurate, like those scenes that involve computer system intrusion. Computer crimes are perpetrated against thousands of Americans daily. The

information security

1354 words - 5 pages data is not lost when critical issues arise. These issues include but are not limited to: natural disasters, computer/server malfunction, physical theft, or any other instance where data has the potential of being lost. Since most information is stored on computers in our modern era, information assurance is typically dealt with by IT security specialists. One of the most common methods of providing information assurance is to have an off-site

The vulnerability of computerised accounting information systems to computer crime

1509 words - 6 pages connections between vulnerabilities of Computerised Accounting Information System and computer crime.With the information technology is developing day-by-day, Computerised Accounting Information System plays an increasingly significant role in the successful operation of today's business (especially for corporation). As the American Institute of Certified Public Accountants (AICPA) stated that information security and controls within information system

Similar Essays

Hacking As A Means Of Identifying Weaknesses In Computer Security

1651 words - 7 pages contradiction in terms."(D’Ottavi, 2003) Part of the controversy may arise from the older, less stigmatised definition of hacker which has since become synonymous with the term computer criminal. A recent case against a young man proves the seriousness of repercussions hacking can have. Glenn Mangham breached security of the social networking site Facebook and tampered with an employee’s email account (Cluley, 2012). As a result, charges were pressed

The Quantum Computer And The Impact If Made Profitable

1440 words - 6 pages can harness quantum parallelism. An algorithm that uses prime numbers that have been factored are incredibly hard to decrypt using a classical computer. But if you use a quantum computer to decrypt the encryption, it will solve the problem in a matter of seconds. This is blessing mixed with a curse. Quantum computing must be considered a national security issue. Since quantum computers break the codes used universally to protect transactions over

Computer Viruses Essay

3440 words - 14 pages severe.Another common computer virus is the XP Antivirus 2009 which is classified as a rogue scanner. (Mary Landesman 1) This virus is dangerous because it masquerades itself as an anti-virus, antispyware or any security software which informs and claims that a user's system is infected with a virus so that the user will purchase the XP Antivirus 2009. It creates a list of entries in the PC with a warning that the computer is infected with a virus

Computer Security Essay

540 words - 2 pages way since the creation of computers. But still we cannot fully believe our computers are fully secure and safe from unwanted snoopers. Computer security is very hard to create presently for anyone can get in if they know what to do. Right now what to do is easy but if you need someone's hand to get in a computer that may be a little more difficult.