The Critical Field of Computer Security Essay

No Works Cited
Length: 1008 words (2.9 double-spaced pages)
Rating: Yellow      
Open Document

- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

Computer Security
Developing the skills required to ensure best practice in the Information Technology world starts here and now. Cyber-criminals, hackers, pentesters, corporate espionage, and disgruntled employees are everyday annoyances IT professionals will find themselves devoting massive amounts of time to, while maintaining their respective networks' functionality for legitimate users. The field covers all the processes and mechanisms by which computer-based equipment, information are protected from unintended or unauthorized access, modification or removal. Computer security is a critical part of technology as it grows in our daily lives.
One use of the term "computer security" refers to technology that is used to implement secure operating systems. An operating system (OS) is a collection of software that manages computer hardware resources and provides common services for computer programs.(Rouse 1) The operating system is a needed component of the system software in a computer system and the user that interacts with it. Application programs usually require an operating system to function. Much of this technology is based on science developed in the 1980s and used to produce what may be some of the most impenetrable operating systems ever.(Krishna 1) Though still accurate, the technology is in use today, is dynamically changing as we know it. Such ultra-strong secure operating systems are based on operating system kernel technology that can guarantee that certain security policies are absolutely enforced in an operating environment and users.(Krishna 1) A great example of this is a quote from the developer android webpage, "To protect that value, the platform must offer an application environment that ensures the sec...

... middle of paper ...

...rogram may also need some interaction or input with the user and thus may be used in combination with the social engineering technique.(2) Many exploits are designed to grant “superuser-level” or administrator access to a computer system. However, it is also possible to use several exploits, first to gain low-level access, then to escalate privileges repeatedly until one reaches root.(2) Normally a single exploit can only take over of a specific software vulnerability. Often, when an exploit is published, the vulnerability is fixed through a patch and the exploit becomes obsolete until newer versions of the software become available.(2) This makes it important to keep updated software. This is the reason why some evil hackers do not publish their exploits but keep them private to themselves or other hackers.(2) These are referred to as “Zero day Exploits.”

Click the button above to view the complete essay, speech, term paper, or research paper

Need Writing Help?

Get feedback on grammar, clarity, concision and logic instantly.

Check your paper »

This essay is 100% guaranteed.

Title Length Color Rating  
Essay about Security and Privacy on SAT´s (IRS) Electronic Signature - Introduction New information technologies change the way society lives. This is why the tax authorities cannot remain outside such changes. Since the year 2005 the Tax Administration System (SAT Servico de Administracion Tributaria), which is the Mexican IRS, has been introducing and applying new information technologies with the objective of a better, faster and safer way of fulfilling its obligations with taxpayers. One of the most controversial tools the SAT started using is the Electronic Signature (FIEL Firma Electronica)....   [tags: privacy, security, biometric features]
:: 11 Works Cited
1916 words
(5.5 pages)
Term Papers [preview]
World of Network Security Infirmities Essay - World of Network Security Infirmities Network security is a very broad subject for me. I started out in telecommunications field as a Radiomen in United States Navy in 1992. Security was always the main mandate for my job field. I was required to have a security clearance and safeguarding equipment and information for which I had access to. The job area always had all types’ of electronic devices like computers, transmitters, receivers, electronic keying material system (EKMS) equipment, modems, brick phones, and multiplexing devices....   [tags: Threats, IT, Internet]
:: 9 Works Cited
1433 words
(4.1 pages)
Powerful Essays [preview]
Essay on Virtualization in Computer Science - Virtualization, in computing, refers to the act of creating a virtual (rather than actual) version of something, including but not limited to a virtual computer hardware platform, operating system (OS), storage device, or computer network resources. The term "virtualization" traces its roots to 1960s mainframes, during which it was a method of logically dividing the mainframes' resources for different applications. Since then, the meaning of the term has evolved to the aforementioned. The term "the cloud" is essentially a metaphor for the Internet] Marketers have further popularized the phrase "in the cloud" to refer to software, platforms and infrastructure that are sold "as a service", i.e...   [tags: hardware, operating system, storage] 722 words
(2.1 pages)
Better Essays [preview]
Computer Technology Essay - Computer technology is one of the most essential in the world of today. It has become an important tool in varieties applications. There have two main areas which based on the computer technology to accomplish in their systems, these are the data model and the data classification. In terms of The data modelling, it is a way to simplify the real system by using the abstract representation. Birta and Arbez (2007:p. 6) state that data modelling has replaced the real system by describing with a simple technical way instead of find out the results by using experiments....   [tags: Technology, Data Modeling] 1993 words
(5.7 pages)
Strong Essays [preview]
Information Security Needs Proper Employee Behavior Essay - Human end users are considered to be the weakest link in information security as failure to comply with information security policies remains one of the biggest threats to the organization. The goal of any policy within an organization is to influence the behaviors of employees in a way that benefits the organization. Information security cannot be achieved through technology. Information security governance seeks to influence employee behaviors to ensure that critical security policies and rules are followed....   [tags: Technology, Training] 1153 words
(3.3 pages)
Better Essays [preview]
My Plans for Postgraduate Studies and Career Interests Essay - My Plans for Postgraduate Studies and Career Interests With a four year degree in Computer Science and Engineering and after working in software industry for some time, Now I’m intended to pursue my long term goal in academics, which is to obtain a Master degree and possibly to aim for PhD relating to my preferred research area. With the enthusiasm to learn and explore the area of parallel and distributed computing, I want to achieve my Master degree specialized in relevant field. I envision myself pursuing a career in academia and research in future which will allow me to contribute those fields with my foremost interest....   [tags: Computer Science] 654 words
(1.9 pages)
Good Essays [preview]
Measures Companies Need to Take in Order to Prevent Computer Systems Failure - ... 3.2 Employees Information technology outsourcing banks should also be competent in handling proper planning which provides training and development for employees in technology and teach them new skills required in discharging their responsibilities in new areas of information technology and management. Moreover, this reminds company representative’s work at least some of the CA 7 operator firm has taken in India to find qualified professional information technology candidates. The problem is caused by a less experienced employee making a big mistake while performing a routine task of backing up an upgrade to CA 7 tool is generally in the field of information technology....   [tags: hackers, keystroke, loggers, banking]
:: 11 Works Cited
822 words
(2.3 pages)
Better Essays [preview]
Essay about The Role of Database Administrator - ... They usually have a specialty in a field in organizing, refining or gathering. Responsibility of database jobs The responsibility of a database administrator is to serve as the link between the database designers, knowledge managers and users. The database designers are often brought in for completing specific projects and then moving onto other projects at other companies or different departments at the same company. Their job are usually finished when they finish designing the database. While they may be used in the future to perform some modifications to the database, they rarely work together with companies on a day-to-day basis....   [tags: computer systems management]
:: 3 Works Cited
1434 words
(4.1 pages)
Term Papers [preview]
System Problem and Solution Essay - The Alameida Video club had some problems and difficulties with their current system. The programmer of the system left to Belgium and they were in need of help. This business needs to be up and running again in 3 days. Description of task The Alameida Video club had some problems and difficulties with their current system. The programmer of the system left to Belgium and they were in need of help. This business needs to be up and running again in 3 days because of the amount of money loss due to being a main Video shop in Gibraltar....   [tags: Computer Science] 956 words
(2.7 pages)
Good Essays [preview]
Computer Network Security Alternatives Essay - Computer Network Security Alternatives Computer network security and integrity is a large concern among all types and sizes of companies. The options for solving security risks are as varied as the companies themselves. However, it is possible to break down the methods for dealing with security risks into three major categories. Companies have the option to: 1. Select best of breed products for their various security needs and assemble the products together to form their own customized solutions....   [tags: Computer Network Security Essays] 776 words
(2.2 pages)
Strong Essays [preview]