StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Computer Security - Research Paper Example

Cite this document
Summary
1.A. Publicizing an attack. In 2009, a Black Hat conference was held and one of the topics was to educate the public about the vulnerabilities of Iphone. The group also warned Apple about the problems with Iphone so Apple engineers found ways to fix that. This is also the logic why commercial enterprises publicize an attack…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER98.1% of users find it useful
Computer Security
Read Text Preview

Extract of sample "Computer Security"

A. Publicizing an attack. In 2009, a Black Hat conference was held and one of the topics was to educate the public about the vulnerabilities of Iphone. The group also warned Apple about the problems with Iphone so Apple engineers found ways to fix that. This is also the logic why commercial enterprises publicize an attack. This is an appropriate response from a commercial enterprise because they are concerned with customer relationship building. Such companies want to be ethical by being honest about the weakness of their products.

At least, the general public is forewarned and can seek preventive measures. Moreover, even if the vulnerabilities are exposed, it is likely that the hackers have used that information before. B.Keeping the attack confidential. This approach is being lauded by many organizations because this restricts the movements of hackers who are looking for exploits. This approach is good for government agencies because the general public can react hysterically once they learn that public agencies are not that secure.

Perhaps, this approach should be used by organizations and agencies that can compromise national security. 2. The symmetric type of encryption is more popularly used simply because it more convenient and faster to implement than asymmetric encryption. This is due to the fact that same key is used to encrypt and decrypt the code by both receiver and sender of the message. There are many two main types of symmetric algorithms – block and stream ciphers. Examples of symmetric key cryptography are: DES, IDEA, AES and RC2.

So far, DES is the most commonly used form of symmetric key. The only challenge presented to this method of encryption is that both parties must have a secure method when exchanging keys. Also, problems in verification can be encountered because both sender and user share the same key. Nevertheless, symmetric type is still used due to its speed and efficiency. The asymmetric type of cryptography uses two keys instead of a single key. These keys includes a public key that serves to encrypt messages and a private key that’s responsible for decrypting message.

Using a public key had benefits such as enabling it for use by anyone given the right to do so. However, asymmetric type is much slower to use since it utilizes more computer resources and there’s also a possibility that widespread security can be compromised. It is crucial that a private key be guarded or else access is very possible. Commonly, asymmetric is used for online entities to verify digital signatures. 3. Iris scan verification or “Iris recognition” is a biometric authentication that utilizes the irides of a person.

The technology was developed by John Daugman, a Harvard University professor, who was approached in 1989 by two ophthalmologists, namely: Aran Safir and Leonard Flom who originally patented the concept. Iris scan authentication has many advantages including the following: 1. Since the “iris” is part of an authentication that you already have, there is no risk of misplacing it or forgetting to bring it along with you unlike USBs, magnetic cards etc. There is also no need to remember any password which may be forgotten or hacked. 2. The iris is as unique as the fingerprint.

Its formation is determined as early as embryonic gestation in a random manner. No two people have the same iris formation. 3. The technology does not violate any personal space such as search, frisking, touching, or even getting into contact with an object such as fingerprint scanning. The person just has to stand in front of the camera and immediately be authenticated. However, this type of authentication has minor flaws. For example, that the eyelashes and eyelid covering the iris minimizes the accuracy of the shot.

Plus, it takes a large budget to employ this authentication method. Nevertheless, correctional facilities and some airports use this biotechnology authentication for it has more benefits. 4. There are two sides to this controversial issue. First, open source developers claim that not just because the codes are exposed, the system is already vulnerable. On the other hand, arguments coming from the public sector claim that open source cannot be used for very sensitive information because it has not yet attained the level of security warranted by proprietary systems.

My belief is that proprietary systems are just as vulnerable as open source systems. Open source systems can be secure since the developers can easily find vulnerabilities in the program since other people are also looking at it. Certainly, developers of open source programs have long thought of securing the codes since these would be used at an enterprise level. Also, it s easier to fix an open source vulnerability than a closed source since opens source is more flexible to use.

Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Computer Security Research Paper Example | Topics and Well Written Essays - 500 words”, n.d.)
Retrieved from https://studentshare.org/other/1408656-computer-security
(Computer Security Research Paper Example | Topics and Well Written Essays - 500 Words)
https://studentshare.org/other/1408656-computer-security.
“Computer Security Research Paper Example | Topics and Well Written Essays - 500 Words”, n.d. https://studentshare.org/other/1408656-computer-security.
  • Cited: 0 times

CHECK THESE SAMPLES OF Computer Security

Cryptography and Computer Security

This report "Cryptography and Computer Security" sheds some light on the fact that taking precautions along with the necessary software can prevent the system from malicious software and can also help to reduce the chances of any serious data loss.... This opened a gateway to many viruses and unwanted material into the computer.... In order to protect the computer from such threats, many techniques and methods were adopted and up till now new techniques and soft wares are being developed to protect the computer....
8 Pages (2000 words) Report

Attacking Cryptography Computer Security

This report "Attacking Cryptography Computer Security" discusses computer operating systems that use various data protection methods to prevent any form of malware and spyware from getting access to the data stored into a computer or a computer network.... Various Computer Security firms provide information about data protection methods, encryption, and decryption being one of them (Echizen, Kunihiro & Sasaki, 2010).... The experts in the field of information security use special software applications to block hackers from accessing information from their servers and in the entire unsecured channels in the networks....
6 Pages (1500 words) Report

Computer Security Policies

To further enhance our capabilities aside from our modern infrastructure and certified personnel, our company has started the “road map” to ISO 17799/27001 – Code of Practice for Information security Management and Information security Management Systems certification.... This is a globally-recognized information security certification that ensures a company practices globally-accepted and best practices in information security – all our corporate policies are based on this ISO standards....
4 Pages (1000 words) Essay

Computer Security - Preventing Malware Attacks

The paper "Computer Security - Preventing Malware Attacks" states that the rate of production of malicious programs exceeds that of legitimate applications; and the most common malware transmission method is through email and the internet.... hellip; Malware refers to malicious ware; and it involves software used in disrupting computer functions or operations, gets sensitive computer information, and gain access to private computer networks....
6 Pages (1500 words) Essay

Computer Security Licensing

The paper "Computer Security Licensing" states that generally, computer users should be taught on the varied solutions to computer problems.... Users should, therefore, be taught the various Computer Security measures such as encryption of computer software to prevent and reduce fraud and fraud-related acts.... hellip; Because the use of computers is becoming part of the population's daily lives: it is only prudent that computer users are as well equipped with the knowledge of how to protect such devices....
6 Pages (1500 words) Essay

The Importance of Computer Security

The paper "The Importance of Computer Security " highlights that Ashgapour stated that a primary goal of effective risk communication is to assist individuals in making informed decisions about the type of risks which are acceptable and which are not.... The importance of Computer Security has been emphasized by two expert studies.... The second study was done by Computer Security professionals.... One is a seminal work carried out by Farzeneh Asghapour, Debin Lin and Jean Camp (2007) in assessing the indirect and implicit use of mental models applied to Computer Security....
9 Pages (2250 words) Literature review

Principles of Computer Security

The paper "Principles of Computer Security" traces concepts and terms related to cryptography, intrusion detection systems, standards and protocols, public and private keys, and hardening of the network.... Hence, suitable methods to overcome hackers' challenges become a part of Computer Security.... Criminals have managed to adapt the traditional method breaking into a house to breaking into computer systems.... Cryptography is the process used in computer engineering used for providing secure communication to avoid interception of the message by unauthorized parties....
6 Pages (1500 words) Coursework

Computer Security Research

The paper "Computer Security Research" states that generally, the National Institute of Standards and Technology gets its guidelines on the systems to use from the NSA.... These guidelines include the kind of security to implement to protect sensitive data.... This hacking is done in the name of ensuring national security, although it faces a lot of rebellion from the public.... The biggest challenge to the transmission of information by the use of computers in a network is its security....
5 Pages (1250 words) Essay
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us