This website uses cookies to ensure you have the best experience. Learn more

Computer Security Essay

915 words - 4 pages

Contents
1.1) Computer threats categories 2
This attack covers: 2
2.) Bob signs up for internet banking. 3
2.1) how the security scheme works 3
2.2) is it secure against dongle theft 3
2.3) if safe from eavesdropping, does this eliminate need for dongle 3
2.4) the cryptographic primitives used 3
2.5) purpose of the serial number 3
2.6) does the serial number need to be randomly generated 3
Computer security and protecting our systems 4
Bibliography 5

Question 1
1.1) Computer threats categories

This attack covers:
i) Deliberate acts are the main threat category for this type of attack because the hacker is deliberately trying to cause ...view middle of the document...

2.3) if safe from eavesdropping, does this eliminate need for dongle
3. Yes, security token, along with Bob’s PIN number helps to authenticate Bob as Bob. Even if a secure channel exists the bank has no way of verifying the person using the secure channel is indeed Bob.
2.4) the cryptographic primitives used
4. A stream cipher is used in this scheme. The same cipher is used on both the security token and the authentication server.
2.5) purpose of the serial number
5. The serial number serves to identify the secret stream cipher key of each authentication token.
2.6) does the serial number need to be randomly generated
6. The serial number does not need to be random as it reveals no information about the key (which should be random). It merely serves as an identifier so it only needs to be unique. As a result, it also does not need to be kept secret. It serves no purpose after the token has been activated.

Question 3
Computer security and protecting our systems

As computers have become a big part of our daily lives, they have become our main source of communications and transactions, they have in return opened a gap for treats thus in turn reason for us to protect our information and systems.
We have now under circumstances been required to set passwords to our computers, phones and other systems to insure that we do not have any unauthorized personal, we have been forced to create passwords so long and complicated that sometimes they even confuse us, the very own people who set them. Then have to go through long tedious recovery processes when we have forgotten them. Passwords are safe...

Other Papers Like Computer Security

Computer Security Assessment Essay

567 words - 3 pages . Since the cases are highly sensitive, more secured identification processes are needed. Computer crimes are Hi-Tech crimes. Because there is a large increase in the number of offenders committing this crime, so it is necessary by an officer will be able to use multiple identities, using digital identity. On the other hand, full proof security is ensured by biological identity because it provides secure access. The role of signed X.509

Home Computer Security Essay

3757 words - 16 pages Home Computer Security -- Glossary Note: This is an historic document. We are no longer maintaining the content, but it may have value for research purposes. Pages linked to from the document may no longer be available.Home Computer Security       Glossary | This section contains definitions of terms used throughout this booklet. Unless otherwise stated, the definitions come from the Webopedia Online Dictionary for Computer and Internet

Computer Laboratory Security System

3875 words - 16 pages 1.0 INTRODUCTION Computer laboratory Security System is a wonderful management solution for Computer Laboratory includes all the necessary tools to keep your business organized and functioning properly. The application features a nice and very intuitive user interface which can be operated by anyone since it doesn't require any special knowledge. This system can be applied to different computer laboratory and computer cafes. It allows you

Computer System Security

3291 words - 14 pages Certification (GIAC). . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Security Certified Program (SCP) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . CompTIA’s Security+ . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Certified Computer Examiner (CCE

Computer Data Security

838 words - 4 pages Every business from the small auto shop in our neighborhood to a big national corporations are worried about the same thing, keeping sensitive data safe, either by storing the physical paper work in a secure room or by strengthening computer security measures. Data needs to be handling with care and monitored all the time to make sure that the integrity of files has not been corrupted. Plus, data collected and stored in serves needs to be

Threats to Elements of Computer Security

1748 words - 7 pages Running Head: THREATS TO ELEMENTS OF COMPUTER SECURITY Threats To Elements Of Computer Security: Ways Employee Use of Emails May Breach Confidentiality, Integrity And Availability of Information. Gertrude Nyandat Grantham University Abstract Email has indeed become the primary communications medium for most organizations, While email is critical to the operation of almost all organizations, it is also

Course Discription

968 words - 4 pages Stallings, W., & Brown, L. (2008). Computer security principles and practice. Pearson Education, Inc. Software Microsoft® Project 2010 (Virtual Desktop) Microsoft® Visio® 2010 (Virtual Desktop) Microsoft® Excel® 2010 (Virtual Desktop) Microsoft® Word 2010 (Virtual Desktop) All electronic materials are available on the student website. Supplemental Resource Microsoft. (2012). Microsoft Office Project 2010. Hoboken, NJ

Introduction to Information Security Student

1249 words - 5 pages IT414 - Principles of Information Security Sherwin R. Pineda Introduction to Information Security Do not figure on opponents not attacking; worry about your own lack of preparation. Learning Outcomes 嗗Define information security 嗗Recount the history of computer security, and explain how it evolved into information security 嗗Define key terms and critical concepts of information security Introduction 嗗The History of Information

Data And Privacy

2289 words - 10 pages Data Privacy and Security Table of Contents Introduction 3 Why Protection 4 Computer Virus 4 How Viruses Infect Computer 5 How People Hack Computer Systems 6 How to Keep Computers Safe from Online Predators 7 Conclusion 10 REFERENCES 11 Introduction The role of computer systems is very vital in our daily lives. Since computers help us to deal with approximately all the

Principles of Security 5th Edition Chapter 1 Review Questions

844 words - 4 pages security was dominant in the early years of computing? Physical security. 5. What are the three components of the C.I.A. triangle? What are they used for? Confidentiality, Integrity and availability are the three components of the C.I.A triangle. They are used as a standard for computer security. 6. If the C.I.A. triangle is incomplete, why is it so commonly used in security? The C.I.A triangle provides a basic standard of what is needed

Chapter 1-Introduction to Information Security: Principles of Information Security

979 words - 4 pages available to those authorized to use it. 6. If the CIA triangle is incomplete, why is it so commonly used in security? The CIA triangle is still used because it addresses the major concerns with the vulnerability of information systems. 7. Describe the critical characteristics of information. How are they used in the study of computer security? Availability: Authorized users can access the information Accuracy: free from errors

Related Essays

Computer Security Essay

1963 words - 8 pages Computer Security Victoria M. Deardorff Brevard Community College April 10, 2012 This paper is written as a basic overview of computer security for the non-technical user. This paper is meant to educate the reader on practical steps that can be implemented to secure their home-based computers. Additionally, the reader will be informed of industry and government needs for and methods of computer security. With this information, the reader

Computer Security Essay

1413 words - 6 pages The term cybercrime became often term being heard by people nowadays. In the early world, it was not a big deal and still can be controlled. Unfortunately, when there is a tremendous increasing number of connected people and devices, it is a bigger risk there to be resolved. A rough definition for the term cybercrime is a crime which is influenced by some kind of computer or cyber aspect. To be more specific, it is a crime that has illegal

What Is Computer Security? Essay

286 words - 2 pages Computer security (Also known as cybersecurity or IT Security) is information security as applied to computers and networks. The field covers all the processes and mechanisms by which computer-based equipment, information and services are protected from unintended or unauthorized access, change or destruction. Computer security also includes protection from unplanned events and natural disasters. One way to think of computer security is to

Computer Security In Education Essay

330 words - 2 pages are much more equipped to defend themselves. References Oblinger, D. (2003). IT Security and Academic Values. In Computer and network security in higher education (chapter one). Retrieved from http://net.educause.edu/ir/library/pdf/pub7008e.pdf Rasmussen, R. (2011, April 28). The college cyber security tightrope: Higher education institutions face greater risks. Retrieved from http://www.securityweek.com/college-cyber-security-tightrope-higher-education-institutions-face-greater-risks