Unit 1 Assignment

Improved Essays
COMPUTER ARCHITECTURE AND
IMPLEMENTATION

Assignment 1
Name: Bhargavi Bussu
Student Id: 10000126759

Professor: Paul Wang

1.3 Traditionally a user's view of a Computer system like an Onion. Explain why this concept is outdated and draw a new diagram based on the concept proposed in this book.

In Today's current generation the Computer systems are wide opened to the Internet, however threat towards the Computer system have been increasing rapidly at a faster rate.
Despite of increasing counter attacks on Computer systems people have started developing invented and used different solving techniques to prevent from them such as Firewall, User authentication , Norton Antivirus so on ....

Even after putting lot of efforts to prevent the counter attacks on Computer systems still we are standing way back. Data bleach and Computer have to compromises are still remains very common and same. In older days for our Computer system counter attack techniques most of them used to detect based on passive techniques. We use to get alerts for Computer system once after attacks have taken place.
…show more content…
This is the same as now the so called Secured human privacy life. If we apply same above technique for Computer systems we can conclude that we not only build the Norton for preventing counter attacks, in near feature we have to build the Computer systems in such a way that it has to detect the counter attack before they get

Related Documents

  • Decent Essays

    First, it is important to understand that through the application of some of the NIST security control mechanisms, the threat in the case can be substantially minimized. Some of the main approaches and methods that may be used towards minimizing the threat described include enhanced security awareness and training of the users of the system, access control into the system under consideration, frequent system maintenance and upgrades, occasional audits into the system, protection of the system from non-secured program codes, application of intrusion detection systems to detect any form of intrusions into the system and the protection of the system from spywares and spam. 14.5 The first and perhaps the most important value of the threat is that…

    • 252 Words
    • 2 Pages
    Decent Essays
  • Improved Essays

    It’s great that each day technology is taking new phases and flourishing its potentiality, but the advancing field is also becoming a growing opportunity for invaders to breach security. By the time you recognize the attack, damage is already done, leaving you with nothing but an infected system. To prevent potential data injury, you need to be quick and proactive. Here are few steps that can help offset the deadly…

    • 409 Words
    • 2 Pages
    Improved Essays
  • Improved Essays

    Carry On is a good source of knowledge that gave deep information in the sense of security, it is a great help for readers who are in different fields other than information security. Bruce Schneier has very intimate knowledge about the topic of security. After reading the book we can find the vast information in different ways. The psychology of security is the chapter that is beautiful and meaningful and provides experimental information to the reader, Bruce relates the human mindset and human psychology with security as he tries to represent the similarity and difference with security and human psychology.…

    • 773 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    College Security Risks

    • 1018 Words
    • 5 Pages

    As a security analyst in the Information technology environment at the Aim Higher College, I have seen many attacks from the hackers that attempt to steal the sensitive data of the college and expose it to the whole world or alter it in some way. I have seen the many threats that have existed on the college’s data and systems at one point. Furthermore, I discovered many vulnerabilities in college’s systems, I captured them before the intruders can get their hands on them and make an effort to exploit the vulnerabilities. Moreover, I gave many suggestions on how to fix and secure on many issues that were affecting the college’s network and systems.…

    • 1018 Words
    • 5 Pages
    Improved Essays
  • Improved Essays

    P3: Describe how software and network security can keep systems and data secure In every single large organisation, security of data and system are very important. I will describe how network security and software are able to keep the data and systems secure. I will write about alternative network security methods and software which every single company should use. I will also explain these terms to show a better understanding of how important it is ti protect data and system which an organisation is working with.…

    • 1134 Words
    • 5 Pages
    Improved Essays
  • Great Essays

    Security Analysis Of Yahoo

    • 1989 Words
    • 8 Pages

    As such, the company’s information technology department is concerned with the process of making sure that each of the organization’s computer systems are safe and free from any internal and external threats that may affect the operations of the business. As the company offers its services to different clients, the IT department makes sure that all operations are streamlined and that every system made to effect its operations is functional. Additionally, the department takes a center role in protecting its users from malicious attacks that could lead to different security threats being posed to the organizational product users. As such, some of the important personnel’s in the Information Technology include a number of programmers, different moderators, and system control engineers among other people who have the ability to detect any threat and any form of inappropriateness’ in the…

    • 1989 Words
    • 8 Pages
    Great Essays
  • Great Essays

    Risk Analysis Assignment

    • 1273 Words
    • 6 Pages

    Finally, it is possible to reduce an attacker 's chances by keeping systems up to date with items such as security patches and system software and hardware…

    • 1273 Words
    • 6 Pages
    Great Essays
  • Improved Essays

    Essay On Cybersecurity

    • 1115 Words
    • 5 Pages

    Cybersecurity is a big deal in today’s world. People are scared that their personal and confidential information will be hacked and they will lost it. Companies try to prevent security breaches, but there is only so much that they can do. Even the government is trying to stop it.…

    • 1115 Words
    • 5 Pages
    Improved Essays
  • Great Essays

    Detection Malware

    • 1657 Words
    • 7 Pages

    230). Countermeasures should be implemented as part of the prevention method to ensure that the network and computers are secured as possible. Systems should be patched accordingly; access controls must be put in place to reduce potential infection to files. If prevention fails, then detection, identification and removal should be put in effect to successfully minimize denial-of-service costs. In addition, prevention mechanisms include anti-virus programs such as host-based scanners, generic decryption (GD) technology, host-based behavior-blocking software, spyware detection, rootkit countermeasures and intrusion prevention systems…

    • 1657 Words
    • 7 Pages
    Great Essays
  • Improved Essays

    avoiding such attacks such as Intrusion Detection System (IDS) which is the most popular method of defense [29]. A defense federation is used in [29] for guarding against such attacks. Under this technique each cloud is loaded with separate IDS. The different intrusion detection systems work on the basis of information that is exchange between these systems.…

    • 745 Words
    • 3 Pages
    Improved Essays
  • Superior Essays

    Physical Security

    • 1193 Words
    • 5 Pages

    This chapter began with a brief introduction of physical security. This chapter described physical security as an important issue to organizations and their infrastructure. Indeed, physical security was addressed as a mechanism that protect data, systems, equipment, facilities, people and all company assets. This chapter equally observed that the issue of physical security in today’s world is very alarming and at a raising costs for companies because environment are now becoming more dynamically complex. Computer memory, processors, has been stolen from companies at different point.…

    • 1193 Words
    • 5 Pages
    Superior Essays
  • Improved Essays

    Secure Computer Security

    • 1115 Words
    • 4 Pages

    Computer security is important to an Information system to ensure the Confidentiality, Integrity, and availability is not compromised. There are many ways to secure a computer based information system. The most important way to secure the system is to physically secure it. When securing a system it is advantageous to use layers of defense.…

    • 1115 Words
    • 4 Pages
    Improved Essays
  • Superior Essays

    Introduction In order for you to plan for security. You must first conduct a full risk assessment. The whole point of security planning is to develop some security polices so that you can implement some controls that will help to prevent the risks to your systems from becoming a reality. This paper will discuss some cybersecurity strategies and other various frameworks.…

    • 1045 Words
    • 4 Pages
    Superior Essays
  • Improved Essays

    Obeying the law, rules or regulations means the act of a person need to follow the command or restriction of the rule of law in legal system, and regulations or rules set up by respective organization, otherwise penalties might be applied. For such instance, as a citizen of Malaysia, and on the land of Malaysia, a person should always follow the law stated in the legal system of Malaysia, for example, according to Dangerous Drugs Act 1952, Malaysia prohibit the dangerous drug, those who possess the drugs more than the amount stated in the law will receive the mandatory sentence of death by hanging. Besides the law of a country, a person should always follow the rules or regulations set up by the organization, if the person is a member of the…

    • 876 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    These days Internet has made it easier to send and receive accurate data from any destination, which is a rapid development. There are different transmission media to transfer the data to destination such as social sites, emails, file sharing sites, etc. Also, it might be easier to modify and misuse the significant data by hacking. There are many approaches to transfer the data securely to the destination without any modifications like cryptography and steganography.…

    • 1064 Words
    • 5 Pages
    Improved Essays