Storing_sensitive_final_copy

Storing_sensitive_final_copy - Risks and Solutions 1...

Info iconThis preview shows pages 1–5. Sign up to view the full content.

View Full Document Right Arrow Icon
Risks and Solutions 1 Running Head: THE RISKS OF STORING INFORMATION AND SOLUTIONS TO IT The Risks of Storing Information and the Solutions to It Angel Linero 3310977 Osman Nuri Satir 3235928 University of New Brunswick, Saint John ESL 1303 November 24, 2009
Background image of page 1

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Risks and Solutions 2 I. However, there are many risks associated with the use of computers by individuals, corporations and governments. Example of these include lose and hacking into information on the other hand a lot of security systems have been designed to limit stealing other information and protect people’s privacy. II. The risk of the storing data in computer is very high because the vulnerabilities that computers has also the existence of threats against them. A. Computers vulnerabilities 1. a. b. 2. a. b. B. Hackers and malware represent a big threat for computers system
Background image of page 2
Risks and Solutions 3 1. a. b. 8.5 millions data records illegally download (Elms, LaPadre, & Maurer, 2008, p.3). 2. About 221,101 new malicious code reported in 2007 (Wall, 2008, p.45). a. “I love you” virus (GAO, 2000, pp.1-7). b. III. Solutions A. Antivirus programs and physical protection 1. Software and Firewalls a) “Norton Antivirus” (Grace Darling, 2006, p. 112). b) “Antivirus Software” (Grace Darling, 2006, p.112). 2. Firewalls a) “A software firewall enforces an access control policy” (Grace Darling, 2006, p.113).
Background image of page 3

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Solutions 4 b) A software firewall can protect only the computer it is installed in” (Grace Darling, 2006, p.113). B. Use of other protection tools 1. SSL certificate a) Intuitions and Firms “The Secure Socket Layer (SSL)” (Tan & Teo, 2007, para. 1). b) Websites that offers online purchase through internet “the web user” 2. Passwords a) “Passwords Security” (Vu, Proctor, Spantzel, Tai, Cook, et.al, 2007, P.744). b) “Ensuring privacy” (Vu, et.al, 2007, p.755). Why is the use of computers growing rapidly? Because, computers make people’s live easier than ever. For example, people can communicate easily regardless of the distance among countries. Also, people used to store all their massive information in big storage rooms and the process of looking for a specific file used to take a lot of time. In this period of time with the computers’ benefits, people can save information in electronic folders and seek it in just seconds. Therefore, the use of computers is increasing as well as type and amount of information that is
Background image of page 4
Image of page 5
This is the end of the preview. Sign up to access the rest of the document.

Page1 / 14

Storing_sensitive_final_copy - Risks and Solutions 1...

This preview shows document pages 1 - 5. Sign up to view the full document.

View Full Document Right Arrow Icon
Ask a homework question - tutors are online