Computer security

Decent Essays
Improved Essays
Superior Essays
Great Essays
Brilliant Essays
    Page 35 of 50 - About 500 Essays
  • Improved Essays

    The pros of adding an outlook account is that staff can contact each other, save work on the cloud like on One Drive, easily access their work anywhere as long as internet is available. The main advantage of having an outlook account is the ability to attach emails and work and sending them. The cons of having an outlook account is that it will take the staff quite a while to get use to using the outlook account. Some people aren’t easy learners so therefore it will be long until they get used…

    • 1185 Words
    • 5 Pages
    Improved Essays
  • Improved Essays

    In today's world, technology is gradually taking over our daily lifestyle and habits. Technology is unavoidable. Everywhere we turn, we encounter computers, televisions, phones, and surveillance camera, to name a few. And not surprisingly, all these digital gadgets are connecting us to the worldwide web where our freedom and privacy are often at risk. Because of our cultural dependency on technology, I choose to learn more about the interest group, Public Knowledge. Public Knowledge is among…

    • 669 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    The prevalence of technology in modern societies has further connected people over the past decades. Technologies such as cellphones and the internet have been used for communication and transactions between people. However, the use of technology possess inconspicuous risks. The use of electronic surveillances is not acceptable for the intrusion of personal privacy because of the lack of protection it can give to the personal information of a person. An examination of the literature will prove…

    • 474 Words
    • 2 Pages
    Improved Essays
  • Improved Essays

    Alang Vs Chen

    • 626 Words
    • 3 Pages

    The two readings I decided to examine are; Online Freedom Will Depend on Deeper Forms of Web Literacy, by Navneet Alang and Justice and Journalism, by Victor Chen. Both of which assess the affects that the media or technology has had on society. Each author in their own unique way has convinced me that their topics are both concerning matters. Alang and Chen both use reasonable and valid facts or evidence that support their point of view, Chen incorporated a study done by J. Roberts and A. Doob,…

    • 626 Words
    • 3 Pages
    Improved Essays
  • Superior Essays

    Argumentative Article Essay In “Step aside, Windows! Open source and Linux are IT’s new security headache,” Preston Gralla is examining how hackers are beginning to target open source softwares more than in the past. Gralla points out that Windows is still the primary target of attacks, “nearly 99% of them targeted Windows” but also argues that open source software attacks are on the rise. Gralla provides an ample amount of credible information to back his claims. His use of ethos, pathos and…

    • 826 Words
    • 4 Pages
    Superior Essays
  • Improved Essays

    (NIST) established in 1972 by the Computer Security Act of 1987 by redesignating the National Bureau of Standards. In 1998 President Bill Clinton issued Presidential Decision Directive 63 which established the United States critical infrastructure program as applicable to computer and information systems. Subsequently, in 2002 the Federal Information Security Management Act (FISMA) replaced the Computer Security Act of 1987 which intended to enhance information security policies in federal…

    • 1303 Words
    • 6 Pages
    Improved Essays
  • Improved Essays

    Coinbase Case Study

    • 969 Words
    • 4 Pages

    customers have been increasing on high number. After a long period of waiting and a lot of frustration from all the Bitcoin customers, Coinbase started its customer support line. While issuing the customer support notice to its customer, Coinbase gave a security notice too stating that Coinbase support will NEVER ask its customer to share their password or a 2-factor authentication codes, nor will it request them to install remote login softwares on their devices. It even asked the Coinbase…

    • 969 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    Many things happen in the world which the social media records as being real or fake. People find the need to post fake news around the time of serious events and get people to believe them. In the article “5 Reasons Why People Share Fake Photos During Natural Disasters,” the author pinpoints some of the psychology behind their actions. One of the most interesting ways he pinpoints his psychology is through the use of Allusion. While he explains his reasoning he gives concrete details to…

    • 410 Words
    • 2 Pages
    Improved Essays
  • Decent Essays

    1. Alex Weiss's argued that a computer gamer's should gamers be prosecuted for virtual stealing. He supports this by using his personal experience with the game such as, "he joined corporations, running scams in which he bribed money from players, then blocked them or kept the messages for future use."Also, he states," ...this ruling makes no sense to me" in response to the Dutch Supreme Court's decision. I do not agree with him because even if a game is just a way to escape from the real world…

    • 362 Words
    • 2 Pages
    Decent Essays
  • Superior Essays

    The continuing technological revolution in communications and information exchange over the past years has led to a growth in a new form of crime, cybercrime. Hence, criminals across the globe have invented various ways to use computer technology for theft, fraud as well as harassment. According to Holder and Jaishankar (2011, cited in Tiganoaia, 2013), cybercrime is defined as “an offence that is committed against individuals or groups of individuals with a criminal motive to intentionally…

    • 1246 Words
    • 5 Pages
    Superior Essays
  • Page 1 32 33 34 35 36 37 38 39 50