This website uses cookies to ensure you have the best experience. Learn more

Computer Security Essay

1963 words - 8 pages

Computer Security
Victoria M. Deardorff
Brevard Community College
April 10, 2012

This paper is written as a basic overview of computer security for the non-technical user. This paper is meant to educate the reader on practical steps that can be implemented to secure their home-based computers. Additionally, the reader will be informed of industry and government needs for and methods of computer security. With this information, the reader should gain a better understanding of why agencies and companies have their rules and regulations pertaining to computer security.

What do you think when you read or hear the words “computer security”? The word security implies freedom from risk, ...view middle of the document...

” (Ross, 1999) In the early years, systems were kept in what could have been referred to as a glass house where constant cooling, electricity and protection from vandalism was provided. They were protected and alarmed as part of the general building security. Security focused on break-ins that might include vandalism or theft of computer equipment. Today, we have desktops, laptops, tablets and smartphones that cannot be kept in glass houses. Whatever form your computer(s) have, how do you begin to protect them and the information they contain? You must start with a plan to protect and be prepared to restore your computer(s) and the data they house before there is ever a need.
Computer Security for the Home Computer
Protecting your personal computer is a never ending task. Whether you use a home system, one at your place of employment or both, it is your responsibility to educate yourself concerning the growing need of computer security. Following are steps to protecting your home computer(s):
1. Notebook computers, along with any mobile device, should be kept under a watchful eye at all times.
2. Use a strong password which is the first line of defense against unauthorized access to your computer. A strong password is at least eight characters long, does not contain a complete word or your real name, is very different from previously used passwords and contains characters from uppercase letters, lowercase letters, numbers, symbols on the keyboard and spaces.
3. Backup your system in the event there is a natural disaster, power failure, disk failure, accidently deleted files or your system is subjected to theft. The easiest way to perform a backup on your home system is to use any USB external hard drive and the built-in Windows or MAC software. Store this backup in a place that would not be subject to the above mentioned disasters. A fireproof and waterproof safe would be one recommendation.
4. Install system patches as they are released by your particular software vendor. Quiet often these patches or repairs contain security updates as a result of a security threat being discovered. Your software documentation or the manufacturer’s website will have instructions for obtaining these patches.
5. Anti-virus software is a must for your home system. McAfee Virus Scan by Network Associates ( and Norton Anti-Virus by Symantec ( are the leading anti-virus software packages and can be purchased through most retailers or online directly from the vendor. A good habit would be to scan your entire PC at least once a week.
6. Firewalls that are available in hardware or software are your next protection item. Firewalls are especially important when using a high speed cable or DSL Internet connection that is “always-on”. “Hardware-based firewalls act as physical barriers between your PC and the Internet, so that packets from unknown addresses are deleted before they ever reach your...

Other Papers Like Computer Security

Computer Security Assessment Essay

567 words - 3 pages . Since the cases are highly sensitive, more secured identification processes are needed. Computer crimes are Hi-Tech crimes. Because there is a large increase in the number of offenders committing this crime, so it is necessary by an officer will be able to use multiple identities, using digital identity. On the other hand, full proof security is ensured by biological identity because it provides secure access. The role of signed X.509

Home Computer Security Essay

3757 words - 16 pages Home Computer Security -- Glossary Note: This is an historic document. We are no longer maintaining the content, but it may have value for research purposes. Pages linked to from the document may no longer be available.Home Computer Security       Glossary | This section contains definitions of terms used throughout this booklet. Unless otherwise stated, the definitions come from the Webopedia Online Dictionary for Computer and Internet

Computer Laboratory Security System

3875 words - 16 pages 1.0 INTRODUCTION Computer laboratory Security System is a wonderful management solution for Computer Laboratory includes all the necessary tools to keep your business organized and functioning properly. The application features a nice and very intuitive user interface which can be operated by anyone since it doesn't require any special knowledge. This system can be applied to different computer laboratory and computer cafes. It allows you

Computer System Security

3291 words - 14 pages Certification (GIAC). . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Security Certified Program (SCP) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . CompTIA’s Security+ . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Certified Computer Examiner (CCE

Computer Data Security

838 words - 4 pages Every business from the small auto shop in our neighborhood to a big national corporations are worried about the same thing, keeping sensitive data safe, either by storing the physical paper work in a secure room or by strengthening computer security measures. Data needs to be handling with care and monitored all the time to make sure that the integrity of files has not been corrupted. Plus, data collected and stored in serves needs to be

Threats to Elements of Computer Security

1748 words - 7 pages Running Head: THREATS TO ELEMENTS OF COMPUTER SECURITY Threats To Elements Of Computer Security: Ways Employee Use of Emails May Breach Confidentiality, Integrity And Availability of Information. Gertrude Nyandat Grantham University Abstract Email has indeed become the primary communications medium for most organizations, While email is critical to the operation of almost all organizations, it is also

Course Discription

968 words - 4 pages Stallings, W., & Brown, L. (2008). Computer security principles and practice. Pearson Education, Inc. Software Microsoft® Project 2010 (Virtual Desktop) Microsoft® Visio® 2010 (Virtual Desktop) Microsoft® Excel® 2010 (Virtual Desktop) Microsoft® Word 2010 (Virtual Desktop) All electronic materials are available on the student website. Supplemental Resource Microsoft. (2012). Microsoft Office Project 2010. Hoboken, NJ

Introduction to Information Security Student

1249 words - 5 pages IT414 - Principles of Information Security Sherwin R. Pineda Introduction to Information Security Do not figure on opponents not attacking; worry about your own lack of preparation. Learning Outcomes 嗗Define information security 嗗Recount the history of computer security, and explain how it evolved into information security 嗗Define key terms and critical concepts of information security Introduction 嗗The History of Information

Data And Privacy

2289 words - 10 pages Data Privacy and Security Table of Contents Introduction 3 Why Protection 4 Computer Virus 4 How Viruses Infect Computer 5 How People Hack Computer Systems 6 How to Keep Computers Safe from Online Predators 7 Conclusion 10 REFERENCES 11 Introduction The role of computer systems is very vital in our daily lives. Since computers help us to deal with approximately all the

Principles of Security 5th Edition Chapter 1 Review Questions

844 words - 4 pages security was dominant in the early years of computing? Physical security. 5. What are the three components of the C.I.A. triangle? What are they used for? Confidentiality, Integrity and availability are the three components of the C.I.A triangle. They are used as a standard for computer security. 6. If the C.I.A. triangle is incomplete, why is it so commonly used in security? The C.I.A triangle provides a basic standard of what is needed

Chapter 1 Review Questions

870 words - 4 pages . 7. Describe the critical characteristics of information. How are they used in the study of computer security? A. Availability: Authorized users can access the information. B. Accuracy: Free from errors C. Authenticity: Genuine D. Confidentiality: Preventing disclosure to unauthorized individuals. E. Integrity: Whole and uncorrupted. F. Utility: Has a value for some purpose. G. Possession: Ownership. 8. Identify the six components

Related Essays

Computer Security Essay

915 words - 4 pages Contents 1.1) Computer threats categories 2 This attack covers: 2 2.) Bob signs up for internet banking. 3 2.1) how the security scheme works 3 2.2) is it secure against dongle theft 3 2.3) if safe from eavesdropping, does this eliminate need for dongle 3 2.4) the cryptographic primitives used 3 2.5) purpose of the serial number 3 2.6) does the serial number need to be randomly generated 3 Computer security and protecting our systems 4

Computer Security Essay

1413 words - 6 pages The term cybercrime became often term being heard by people nowadays. In the early world, it was not a big deal and still can be controlled. Unfortunately, when there is a tremendous increasing number of connected people and devices, it is a bigger risk there to be resolved. A rough definition for the term cybercrime is a crime which is influenced by some kind of computer or cyber aspect. To be more specific, it is a crime that has illegal

What Is Computer Security? Essay

286 words - 2 pages Computer security (Also known as cybersecurity or IT Security) is information security as applied to computers and networks. The field covers all the processes and mechanisms by which computer-based equipment, information and services are protected from unintended or unauthorized access, change or destruction. Computer security also includes protection from unplanned events and natural disasters. One way to think of computer security is to

Computer Security In Education Essay

330 words - 2 pages are much more equipped to defend themselves. References Oblinger, D. (2003). IT Security and Academic Values. In Computer and network security in higher education (chapter one). Retrieved from Rasmussen, R. (2011, April 28). The college cyber security tightrope: Higher education institutions face greater risks. Retrieved from