StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Data Privacy and Security - Research Paper Example

Cite this document
Summary
This essay analyzes that the role of computer systems is very vital in our daily lives. Since these computers help us to deal with approximately all the major functions of our lives as well as are so inevitable that spending even a day or two away from the computer can leave us feeling powerless…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER95.5% of users find it useful
Data Privacy and Security
Read Text Preview

Extract of sample "Data Privacy and Security"

 Data Privacy and Security Introduction The role of computer systems is very vital in our daily lives. Since these computers help us to deal with approximately all the major functions of our lives as well as are so inevitable that spending even a day or two away from the computer can leave us feeling powerless. In this prospect, many people control their routine lives by means of their personal computers. However, at the present computer security has become a very critical issue. Additionally, security refers to the technique to discover as well as stop illicit utilization of our secret information or computer. In this scenario, some preventive measures enable us to stop criminal users (as well known as "intruders") from accessing and using some part of our computer system. In addition, recognition of such intrusion helps us in deciding whether or not somebody tried to interrupt into our computer system, if they were successful in their attempt, as well as what they could have acquired from the system (ComputerSecurityService, 2011), (Armor2net Software Ltd., 2004) and (Norton, 2001). Moreover, the term “computer security” is very commonly used, though; the information and data saved on a computer are in danger to few risks unless the computer is connected to other systems using a network. In view of the fact that the use of computer networks, particularly the Internet (largest network of the networks), has turned out to be persistent, the thought of computer security system has extended to point out problems covered in the way of networked use of computers and their information and data resources (Kinkus, 2002). This outlines the important points and vital aspects of computers security. This paper will cover the answers of various questions such as how can viruses contaminate computers, how computer systems are hacked by people, how to keep computers secure from online predators. Why Protection? In case of computer systems and information technology, integrity, privacy and legality are considered as the most frightening factors for a computer user. For the daily internet users the security and privacy of computer is considered as the most vital area of computer security. However, when the users registering themselves with any internet service or a website they can suffer of having nothing to keep secret, security on the internet is concerning saving someone's data and information, yet if the information does not appear crucial. Because of this the simplicity by which information in electronic arrangement is capable to be utilized between enterprises as well as since small pieces of related information from different sources could simply be linked jointly to shape a composite of, for instance, any personal information searching behavior it is at the current tremendously significant that individuals are accomplished to sustain influence over what information is gathered concerning them, how it is engaged who is authorized to utilize it, and for which reason it is used (Kinkus, 2002) and (Shelly, Cashman, & Vermaat, 2005) . Computer Virus Computer virus or simply bug is a type of software application or program that is developed to copy itself as well as extend to further machines. In most scenarios, the application is "malicious”, which outlines it is designed to cause the computer malfunction in different ways. However, in many cases the term "computer virus" encompasses all the types of "malware," or malicious software. In place of sniffles and a fever, a number of widespread signs of a computer viral infection include data and information loss, sluggish performance and sometime system stops working that makes the people with the machine feel ill. However, a lot of latest viruses were developed to stay unseen and undetected on a computer and not aware its user, consequently malware infected systems can extend silently. In this scenario, the first computer virus was Elk Cloner, which was introduced in 1981. This virus was developed by human programmers and the basic purpose of this virus was to damage others' computers (Chuks, 2011). How Viruses Infect Computer There exist thousands of viruses these days, as well as new viruses are coming out with every passing day. Additionally, it is terribly difficult to offer the computer users a standard clarification of how viruses work, for the reason that they all have dissimilarities in the way they contaminate or the technique they used to spread from one computer to another. In this scenario, file viruses are some sort of programming code that connect themselves to driver files, .exe files or compressed files, as well as they are activated when the host application is run by the system users. Additionally, once the virus file or parasitic virus is started, it can spread by linking with new applications in the computer system, and can as well carry out the bad actions for which it was programmed. In addition, a large number of file/parasitic viruses reach through loading themselves in the computer’s main memory, as well as they begin searching space used for extra programs available on the drive. Moreover, by spreading themselves from one system to another, these viruses programs as well hold a variety of pessimistic elements that could be turned on instantly or through a specific ‘trigger’. The triggers could encompass probably be precise dates, or the figure of times the virus has been simulated, or something evenly small (TechiesGuide, 2011). How People Hack Computer Systems The idea of 'computer security' is used in many forms; the content stored on a computer could be vulnerable simply through few risks apart from the computer is linked to others on a network. Seeing that the utilization of computer networks (particularly the Internet) has augmented radically in last two decades, in this scenario, the idea of computer security is employed to explain issues referring to the networked utilization of computers and their resources (Molie, 2007). Additionally, it is significant for the system user to get computer security management into their hands. In addition, we require placing it in position, where systems that will facilitate in detecting and stopping vulnerabilities from being taken advantage of, in its place of just assuming that our network is protected and that we do not require securing our computers for ourselves (Molie, 2007) and (ComputerSecurityService, 2011). From the above discussion we can perceive that the primary step in computer security management is to make sure that we have extremely good passwords that comprise a blend of letters, numbers as well as symbols. In this scenario, some extra efficient client verification methods are a great deal more accommodating. Additionally, the firewall is a fundamental and absolute requirement for each computer. It permits the system users to simply access those services for which they are authorized. These basic mechanisms are the necessary foundation of a computer security administration; however these mechanisms are not effective to deal with and stop the entire kinds of threats. Moreover, discovering high-quality software might appear daunting if we are not familiar with accurately what we are searching for. Another solution is antispyware that is also considered as an extremely high-quality addition to our computer security arrangement. Thus, once we know that we have the software in position to safeguard our computer from worms, viruses, Trojan horses and additional malware we should turn to an additional feature of computer safety management. Furthermore, protecting and backing-up our important data and files is the most excellent method to keep away from the destruction that could be practiced if our computer system has been hacked (Molie, 2007) and (ComputerSecurityService, 2011). In addition, it is significant for the computer user to have the essential layers of computer and network security prepared to protect their data and computer, however since malware spreads and modifies itself constantly, there is need to update our software frequently. As well, while we are without doubt assuring beside an attack, we cannot essentially be positive one will never take place. However, in case it takes place, making backups of the entire data and information at another place is an outstanding method to safeguard our information (Molie, 2007) and (ComputerSecurityService, 2011). How to Keep Computers Safe from Online Predators Hacking is the process of entering into network or computer systems, normally with illegal intension (i.e. to change or alter on hand settings). Occasionally malicious in nature, it can create serious problems for the networks or computer systems. In this scenario, people with malicious intentions are frequently referred to as "crackers because they "crack" network or personal computer systems. However, currently the majority of businesses as well as individuals make use of different network-based and host-based safety software to identify malicious actions, defend systems and data, as well as up-hold event response attempts. In this way, security software could be referred as a foundation of computer safety log data (Hinders, 2011), (CampusActivism, 2011), (Mitchell, 2011) and (NIST, 2010). Some important ways to protect computers are presented below: ­The majority available antimalware software are known as antivirus applications that normally keep record of viruses and check malware, file and system disinfection efforts and file quarantines. In addition, antivirus software can as well keep record of information such as when the process of malware detection was carried out and when software updates or antivirus signature occurred (Shelly, Cashman, & Vermaat, 2005) and (Norton, 2001). Another important technique for computer security is known as intrusion prevention and intrusion detection systems. For implementing computer security intrusion detection and intrusion prevention systems record comprehensive data and information on doubtful behavior as well as check for attacks, and some events intrusion anticipation systems carried out to prevent malicious action in progress. In this scenario, a number of intrusion detection applications, like that file reliability checking software, execute occasionally in place of incessantly, consequently they produce log entries in batches in its place of on a continuing basis (Shelly, Cashman, & Vermaat, 2005) and (Norton, 2001). Remote Access Software is also one of the most important solutions that are aimed at approving and securing the virtual private networks (VPNs). Additionally, virtual private networking systems normally keep the record of successful and failed login attempts, in addition to the dates and times every user used the network, along with the amount of data sent and received in every user session (Shelly, Cashman, & Vermaat, 2005) and (Norton, 2001). ­Vulnerability Management Software is a high quality solution for the corporate network security management. In scenario of computer security vulnerability management software comprises patch management application and vulnerability assessment application, which is used to record and maintain the patch system history and vulnerability status of every host, that comprises recognized vulnerabilities and missing software updates (Shelly, Cashman, & Vermaat, 2005) and (Norton, 2001). Authentication Servers are aimed to ensure the computer security. For this purpose they comprise directory servers and single sign-on servers, normally log every verification attempt, comprises its source, username, achievement or stoppage, as well as date and time (Shelly, Cashman, & Vermaat, 2005) and (Norton, 2001). System Firewalls can be used to track the position of network traffic and carry out content assessment. In addition, firewalls are inclined to encompass extra complex policies and generate extra detailed logs of action than routers (Shelly, Cashman, & Vermaat, 2005) and (Norton, 2001). Conclusion The term “computer security” is very commonly used, though; the information and data saved on a computer are in danger to few risks unless the computer is connected to other systems using a network. In view of the fact that the use of computer networks, particularly the internet (largest network of the networks), has turned out to be persistent, the thought of computer security system has extended to point out problems covered in the way of networked use of computers and their information and data resources. For the daily internet users the security and privacy of computer is considered as the most vital area of computer security. This paper has presented some of the important aspects of computer security management. This research has outlined some of the important features of computer security those need to be maintained for the sake of effective security management. This paper has discussed the ways viruses and hackers enter into system and cause damage. References Armor2net Software Ltd. (2004). Why is the computer security important? Retrieved July 12, 2011, from http://www.armor2net.com/knowledge/computer_security.htm CampusActivism. (2011). What is Hacking? Retrieved July 13, 2011, from http://www.campusactivism.org/html-resource/hackers/section6.html Chuks, A. (2011). How a Virus Infect Your Computer. Retrieved July 12, 2011, from http://skoola.com/lecturepage.php?id=1457&cid=33 ComputerSecurityService. (2011). Taking Charge Of Your Computer Security Management . Retrieved July 13, 2011, from http://computersecurityservice.org/ar/computer-security-management.php Hinders, D. (2011, July 09). What is Computer Hacking? Retrieved July 12, 2011, from WiseGeek.com: http://www.wisegeek.com/what-is-computer-hacking.htm Kinkus, J. F. (2002). Science and Technology Resources on the Internet: Computer Security. Retrieved July 12, 2011, from http://www.library.ucsb.edu/istl/02-fall/internet.html Mitchell, B. (2011). What is a Hacker? Retrieved July 12, 2011, from About.com: http://compnetworking.about.com/od/networksecurityprivacy/f/what-is-hacking.htm Molie, C. (2007, July 19). Computer Security - What Exactly Is It? . Retrieved July 10, 2011, from http://isms-guide.blogspot.com/2007/07/computer-security-what-exactly-is-it.html NIST. (2010). Computer Security. Retrieved July 12, 2011, from http://csrc.nist.gov/publications/nistpubs/800-92/SP800-92.pdf Norton, P. (2001). Introduction to Computers, Fourth Edition. Singapore: McGraw-Hill. Shelly, Cashman, & Vermaat. (2005). Discovering Computers 2005. Boston: Thomson Course Technology. TechiesGuide. (2011). How does a Computer Virus Work . Retrieved July 13, 2011, from http://www.techiesguide.com/how-does-a-computer-virus-work.html Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Data Privacy and Security Research Paper Example | Topics and Well Written Essays - 1750 words”, n.d.)
Retrieved from https://studentshare.org/information-technology/1427665-data-privacy-and-security
(Data Privacy and Security Research Paper Example | Topics and Well Written Essays - 1750 Words)
https://studentshare.org/information-technology/1427665-data-privacy-and-security.
“Data Privacy and Security Research Paper Example | Topics and Well Written Essays - 1750 Words”, n.d. https://studentshare.org/information-technology/1427665-data-privacy-and-security.
  • Cited: 0 times

CHECK THESE SAMPLES OF Data Privacy and Security

Customer Relationship Management

It is, therefore, important that the company maintain both Data Privacy and Security.... Customers mainly trust those companies that they believe maintain a high degree of privacy and security of their information.... The questions below will be addressed in the succeeding discussions: What the differences between privacy and data security?... The differences between privacy and data security are important in handling customer information....
3 Pages (750 words) Essay

Data Protection Laws, Regulations, and Policies

The Personal Data Privacy and Security Act of 2009 The Personal Data Privacy and Security Act is the other Act that addresses data protection in the United States of America.... Just like the Personal Data Privacy and Security Act of 2009, the Massachusetts's 201 CMR 17.... Among these policies are Sarbanes-Oxley Act [SOX], Data Protection Act, Federal Information security Management Act [FISMA], California security Breach (SB) Information Act, Massachusetts 201 CMR 17....
3 Pages (750 words) Essay

Using Gadgets at Work

Data Privacy and Security.... There are two security concerns that a business may have with employees that communicate outside a network.... nother critical issue concerns with the aspect of data integrity (Salomon, 2003).... In data integrity, the same should not be modified in an undetectable way.... The breach of integrity occurs when another force modifies data during its transit.... Users can attain harm on the breach of data....
1 Pages (250 words) Essay

Internet Sharing of Files, and HIPAA Regulations

Legal issues and resolutions surrounding internet sharing of files, HIPAA, and PACS revolve around safeguarding Data Privacy and Security.... All healthcare practitioners are responsible for adhering to HIPAA privacy and security regulations so as to guarantee that PHI is secured and confidential (Cao, Huang & Zhou, 2003).... Some of issues essential to adhering to HIPAA requirements include restricting access, tracking access, protecting data security, confidentiality, and integrity and sustaining data chain-of-control (Lyer, Levin & Shea, 2006)....
2 Pages (500 words) Research Paper

Cultural and Social Significance of Mobility and Wearable Technology

Vis a vis, the issues of Data Privacy and Security raises concerns over the ownership of the information, third party access rights and sharing of the information to government agencies.... Consequently Ling (2008) noted these technologies have given rise to new concerns of privacy and security.... Vis a vis, the advent of mobility and wearable technology has had profound implications on communication, interpersonal interactions, security and privacy and healthcare services provisions....
2 Pages (500 words) Essay

Management Plan in the Case of a Security Breach

In the health sector, it is of crucial significance to note that the protection of The information of such clients should be accorded due protection and security deserved.... It is significant to note that confidentiality of information is important in several aspects of life since it maintains… In addition, information security and confidentiality is important in the protection of the client information.... These rules, policies and regulations should ensure maximum security and confidentiality of the information of such clients....
4 Pages (1000 words) Essay

Internet of Things

However, these processes have to consider the issues of Data Privacy and Security since the internet is considered a delicate medium of data transfer.... The Internet of Things enables the development of these smart entities, which act as a source of the trigger to the development of novel technologies that are most needed in addressing the common challenges emerging in areas of public health, environmental protection/climate change, energy conservation, enhancement of security and enhancement of economic growth among others....
5 Pages (1250 words) Case Study

Information and Communication Technology Foundations

data management by the SPI firm was very crude since it was done traditionally.... These forms of data prevention are things like data backups and recovery.... ue to the rising growth in demand for SPI, there is also a corresponding need to establish a form of storing or keeping the facts and figures and also to update and access and reach for the very data....
6 Pages (1500 words) Case Study
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us