The Dangers Of Computer Security

Improved Essays
As the world of technology advances and new technology comes out. Individuals need to know of the risks and the threats that are out there. Computers are a great piece to have with you, but you can’t become ignorant in the world of the internet. Individuals will be using the internet to check out different websites, do their shopping online, and some will be doing their banking online.
As I have mention in my research paper and in my presentation, computer security is something individuals need basic knowledge. I have talked about the following items and why they are important for every individual to use. I have talked about anti-virus programs because they are a necessary for individuals. Weekly or monthly scans are required due to the fact,
…show more content…
They tend to completely destroy your Operating System and you can’t recover anything from them. These types of programs are created to make steal your information and destroy your computer at the same time. Getting anti-malware software that does real-time protection is the way to go. You will be able to protect your computer when you navigate the web and if malware tries to infect your computer, the software will catch it and remove it from your …show more content…
It is best to have a long strong password that contains the items that were mention above. You will need these items because the hard your password and the longer it is, the better your chances are to prevent others to break into your things. You can also go for the things such as having a two-step verification set up. This way if someone is able to break into your account the second layer of defense will be there to prevent them from getting into your account.
Using the knowledge that I found in my research, there are different kinds of free software out there for the end users. I was able to install them into different computer systems and see how they function and find which one is the best in each of the categories. The categories that I cover weren’t very confusing I hope. I also went over all of the items and the software that is free for the students to use and protect themselves. I don’t want them to fall and become victims to those who are there to take their valuable information away from

Related Documents

  • Superior Essays

    The internet is providing us with plenty of resources, such as learning and sharing information, high academic research, and more opportunity for people to find deeper topics for further information. As the internet becomes increasingly involved into our daily lifestyles,…

    • 1718 Words
    • 7 Pages
    Superior Essays
  • Improved Essays

    Nt1310 Unit 3 Case Study

    • 835 Words
    • 4 Pages

    This antivirus program installed in our system it runs in background and protects your computer always. We have to update them and keep our computer protected and safe. Proper virus protection is the best way to avoid unwanted intrusion.…

    • 835 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    The vulnerabilities identified in part 1 assignment was mitigated by recommending the right solutions. In part2, the network security analyst identified and proposed solutions for the right network devices to protect the accounting firm's network from intruders and external cyber threats. In this final assignment section, the network security analyst of the accounting firm will propose the application/end-user security recommendation to protect the company’s sensitive information. The analyst will also ensure that the proper procedure and policies are in place to take care of network security and employees should be trained and aware of those policies from possible threats including cyber-attacks.…

    • 730 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    Securing your Macintosh(Mac) OS computer Apple producing their computers with a lot of security features already in them. Mac OS X is one of the most secure operating systems in the market. Still a lot of people make mistakes while using their computers on their daily bases. These mistakes can notably weaken the security of their operation system. To be sure that you computer secure we will consider how to secure your user account, your web browsing, and we will maximize the privacy.…

    • 867 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    Nt1310 Unit 9 Final Paper

    • 586 Words
    • 3 Pages

    Opening Statement Written policies provide a means of security within organization. It establishes the regulations that all faculty must adhere to in order to protect important company and client information. The organizational policies should be read by and signed by each employee as a consensus that all regulations will be followed once joining the organization. And, for those who are current employees, to keep abreast of any amendments made to current policy, so that all employees are in compliance. These policies should be kept in an accessible place for everyone to read, so no one will be left out of the loop.…

    • 586 Words
    • 3 Pages
    Improved Essays
  • Decent Essays

    3- Specify alternative courses of action. 1- the anti-virus and fire-wall programs use the anti-virus and fire-wall programs for protection from hacking and the need of updating it constantly Because of that viruses are developed continuously and periodically, and don't think that anti-virus alone enough to protect you from penetration. 2- anti-loggers programs One of the most important programs that you need to have are the anti-loggers programs and its mission is to protect Your personal data such as passwords, data of bank cards, even your device can't figure out what you are writing.…

    • 253 Words
    • 2 Pages
    Decent Essays
  • Improved Essays

    Part 1 What is data compression? Data compression is where a file is made smaller by shortening code where it is similar. This is helpful when transmitting files over the net, or in general just saving space of a SSD or Normal Hard drive. Data compression comes in two forms: Lossless Compression: Lossless compression is where similar parts of a file, are compressed by their similarities, however, the frequency is recorded and can be uncompressed without losing any extra data.…

    • 826 Words
    • 4 Pages
    Improved Essays
  • Great Essays

    When studies on cyber security and cyber attacks combined with the all too real fact that the general public is mal-informed as to their responsibility to become educated in cyber security awareness, a correlation exists (Fiedler, 2016). Being unaware of the serious consequences of the actions of individuals and businesses alike is what cyber security awareness is all about. Furthermore, in line with the disruptive innovation theory, the more advanced the technology, the greater opportunity to protect our businesses and individuals…

    • 2302 Words
    • 10 Pages
    Great Essays
  • Improved Essays

    Secure Computer Security

    • 1115 Words
    • 4 Pages

    Computer security is important to an Information system to ensure the Confidentiality, Integrity, and availability is not compromised. There are many ways to secure a computer based information system. The most important way to secure the system is to physically secure it. When securing a system it is advantageous to use layers of defense.…

    • 1115 Words
    • 4 Pages
    Improved Essays
  • Superior Essays

    System Security

    • 1010 Words
    • 5 Pages

    System security is proficient through equipment and programming. The product must be always redesigned and figured out how to shield you from rising dangers. A system security framework as a rule comprises of numerous segments. In a perfect world, all parts cooperate, which minimizes upkeep and enhances security. System security segments regularly include: • Against infection and hostile to spyware • Firewall, to piece unapproved access to your system • Interruption avoidance frameworks (IPS), to distinguish quick spreading dangers, for example, zero-day or zero-hour assaults • Virtual Private Networks (VPNs), to give secure remote air conditioning With system security set up, your organization will encounter…

    • 1010 Words
    • 5 Pages
    Superior Essays
  • Improved Essays

    A network allows computers to exchange data. In computer networks, devices exchange data using a data link. The connections are made using cable or wireless connection. Maintaining network security throughout an organization can be quite challenging and is indeed a tough job, but it is attainable and can be achieved. Network security is all about keeping the network safe for all devices and computers on the system.…

    • 2212 Words
    • 9 Pages
    Improved Essays
  • Improved Essays

    How do we prevent computer crime Computer crime is a common thing in todays society. It is something that should be in every persons mind as they are surfing the web and typing in personal information. The first thing that should be done to prevent computer crime is have a firewall on their computer. A firewall is essentially a barrier for your computer that keeps information from going out into the network without permission [1].…

    • 1873 Words
    • 8 Pages
    Improved Essays
  • Great Essays

    Desert Safari Essay

    • 1834 Words
    • 8 Pages

    Client URL: http://deluxosphere.com/ Desert Safari Tips That Can Make the Trip More Pleasant and Enjoyable Most probably, one of the things that top your travel bucket list is taking a desert safari. As many travelers say, it is the most fun activity that you can do in the desert. If you are going to a destination that is known for having great sand dunes, then it is something that you cannot miss. However, keep in mind that such kind of trip is that all comfortable and convenient.…

    • 1834 Words
    • 8 Pages
    Great Essays
  • Improved Essays

    Network Security

    • 782 Words
    • 4 Pages

    Neglecting the human or technological aspect of network security can provide attackers with a vulnerable area to focus their attacks. ITProPortal.com states, “Statistically, we see that machine-driven security coupled with appropriate end-user engagement at the moment of threat identification reduced security professionals’ operational workloads by nearly 90%.” Network security is an absolute necessity and the use of firewalls, anti-malware, intrusion detection and prevention systems, network access control, and 2FA are all technology solutions that can provide high levels of network security when deployed and maintained correctly. Security conscious users are the final key to ensuring the most secure network possible in order to greatly reduce the potential for security…

    • 782 Words
    • 4 Pages
    Improved Essays
  • Great Essays

    Cyber Attacks are now becoming more and more sophisticated. Anything we do online can be interrupted and disrupt in seconds by any cyber or internet attacks. Data we keep online is very vulnerable to cyber-attacks out there which are increasing in numbers day by day. Cyber-attacks changed in 2015, when Ukraine experienced the first recorded power outage caused by a cyber-attack. It didn’t last long but it adversely impacted the government, industry and people.…

    • 1388 Words
    • 6 Pages
    Great Essays