123ArticleOnline Logo
Welcome to 123ArticleOnline.com!
ALL >> Education >> View Article

Security In Computing Exercise

By Author: Sherry Roberts
Total Articles: 314

1. Distinguish between vulnerability, threat, and control
The vulnerability is a weakness in a computer system; a threat is a possible danger, while control is a countermeasure that eliminates or reduces the danger of a threat or vulnerability.
2. List three types of harm a company might experience from theft of computer equipment
A company can lose sensitive data (that can be loss of huge funds)
A legal action can be taken against the company. That can come especially from the people who have been impacted by the loss of sensitive data
A company can lose its reputation due to the compromise of their security that makes the public lose trust in it.
3. List at least three sorts of harm a corporation could experience from electronic espionage or unauthorized viewing of confidential company materials
• The loss of competitive advantage
• The loss of trade secrets
• The loss of reputation
4. List at least three sorts of damage a company could undergo when the integrity of a program or company data is compromised
• There can be security programs because the compromise can open a loophole that can be used by intruders of virus to harm the other systems
• The compromise of the program and data integrity can have a negative impact on the productivity of a company when it relies on that program or data to run the business
• A company can lose the market values as a result of the compromise of data or program integrity
5. List at least three varieties of harm a company could encounter from loss of service, that is, failure of availability. List the product or capability to which access is lost, and explain how this loss hurts the company.
• There can be a harm of the replay messages that are brought about by the hacker whereby the same information is being received every time
• The loss of availability can result in the modification of the data in the file system, and this affects the productivity because the required data is not available for use in carrying out the operations.
• The loss of availability can also lead to deadlocks because concurrency is poorly managed.
There are capabilities and products to which accessibility is lost, and this results in, for instance, the loss of data, software, and hardware. That interrupts the performance because the cessation is not done gracefully so as to allow the user to shift to another system to continue the work. The lack of access to a given system or service can also delay some tasks and activities, thereby leading to the loss of revenue in overall.
6. Describe a circumstance in which you have experienced harm as a consequence of a failure of computer security. Was the failure malicious or not? Did the attack target you specifically or was it general and you were the unfortunate victim?
Recently I was a victim of some virus that made caused all my files to be unreadable because I had inserted an infected flash disk into the laptop and this is what resulted in the compromise of my security. The harm was accelerated by an outdated antivirus that I used. The failure was malicious because the files would not be repaired at all. Also, the attack was not targeted since it was as a result of negligence to avoid updating the antivirus and inserting the infected flash disk into the laptop minus scanning it.
7. Describe two instances of vulnerabilities in automobiles for which auto manufacturers have instituted controls. Tell why you think these controls are effective, somewhat effective, or ineffective
One of the examples of the vulnerabilities in automobiles is the amount of software that is leveraged in the automobile and incorporates expensive parts. The other example of the hardware parts that are more expensive when used in the automobiles, if they are lost, then we can incur a great loss. Also, if these parts are damaged, it can result in a great negative impact not only on the performance but also to the organizational revenue due to the unavailability of the hardware resources.
8. One control against incidental software deletion is to preserve all old versions of a program. Of course, this administration is prohibitively expensive in light of the cost of storage. Suggest a less costly control against unintended software deletion. Is your control effective against all possible reasons of software deletion? If not, what threats does it not cover?

References
Pfleeger, C. P., & Pfleeger, S. L. (2002). Security in computing. Prentice Hall Professional Technical Reference.

Sherry Roberts is the author of this paper. A senior editor at Melda Research in non plagiarized essay for sale if you need a similar paper you can place your order for nursing writing services

More About the Author

Author is associated with MeldaResearch.Com which is a global Custom Essay Writing and Term Paper Writing Company. If you would like help in Research Papers and Term Paper Help you can visit Custom Writing Service

Total Views: 108Word Count: 779See All articles From Author

Education Articles

1. School Data Lists Reveals An Amazing Offer On Christmas And New Year On The Education Email List
Author: Ryan

2. 5 Top Tips For Teaching English To Kids
Author: MyTEFL Reviews

3. Choose A Brighter Career With Mca (master Of Computer Application )
Author: rajkujmarsingh

4. How Technology Is Changing Education System
Author: EngVarta

5. Last Minute Tips For Neet Aspirants
Author: SIKHA ROY

6. Oracle Fusion Hcm Online Training | Oracle Cloud Hcm Online Training
Author: shivani

7. The Future Of Java
Author: infocampus

8. 11 Benefits Of Online English Speaking Course You May Not Consider (2018)
Author: Yogesh Vermani

9. An Overview Of Prince2 Training Along With Its Benefits
Author: Multisoftsystems

10. List Of Top 5 Highest Paying Jobs In Tourism
Author: Individual

11. What Makes An Engineering College Great?
Author: Sit Pune

12. Kiwifruit Cultivation
Author: Roopa

13. Why Oracle's Java Programs Is So Popular And High In Demand
Author: infocampus

14. Selecting The Best Mba Colleges In Bangalore Depending Upon Three Salient Features
Author: Muskan

15. How Software Training Institutes Help To Increase The Coding Skills Of Students
Author: MindQ Systems

Login To Account
Login Email:
Password:
Forgot Password?
New User?
Sign Up Newsletter
Email Address: