Storing_sensitive_final_copy

Storing_sensitive_final_copy - Risks and Solutions 1...

Info icon This preview shows pages 1–6. Sign up to view the full content.

View Full Document Right Arrow Icon
Risks and Solutions 1 Running Head: THE RISKS OF STORING INFORMATION AND SOLUTIONS TO IT The Risks of Storing Information and the Solutions to It Angel Linero 3310977 Osman Nuri Satir 3235928 University of New Brunswick, Saint John ESL 1303 November 24, 2009
Image of page 1

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full Document Right Arrow Icon
Risks and Solutions 2 I. However, there are many risks associated with the use of computers by individuals, corporations and governments. Example of these include lose and hacking into information on the other hand a lot of security systems have been designed to limit stealing other information and protect people’s privacy. II. The risk of the storing data in computer is very high because the vulnerabilities that computers has also the existence of threats against them. A. Computers vulnerabilities 1. Complex programs are vulnerable (Wang & Dasgupta, 2008, p.314). a. Vulnerabilities are increasing (Wang & Dasgupta, 2008, p.314). b. 6 and 16 bugs per 1000 lines of code (Wang & Dasgupta, 2008, p.318). 2. Disable malware detectors (Wang & Dasgupta, 2008, p.315). a. Cisco firewalls have a defect (Rustad & Koenig, 2005, p.1556). b. Software helps to circumvent firewall (Rustad & Koenig, 2005, p.1556). B. Hackers and malware represent a big threat for computers system
Image of page 2
Risks and Solutions 3 1. Hackers are increasing (Hanh & Laynee-Farrar, 2006, p.297). a. Many companies have been hacked (Elms, LaPadre, & Maurer, 2008, p.4). b. 8.5 millions data records illegally download (Elms, LaPadre, & Maurer, 2008, p.3). 2. About 221,101 new malicious code reported in 2007 (Wall, 2008, p.45). a. “I love you” virus (GAO, 2000, pp.1-7). b. Rootkits the most dangerous (Wang & Dasgupta, 2008, p.312). III. Solutions A. Antivirus programs and physical protection 1. Software and Firewalls a) “Norton Antivirus” (Grace Darling, 2006, p. 112). b) “Antivirus Software” (Grace Darling, 2006, p.112). 2. Firewalls a) “A software firewall enforces an access control policy” (Grace Darling, 2006, p.113).
Image of page 3

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full Document Right Arrow Icon
Risks and Solutions 4 b) A software firewall can protect only the computer it is installed in” (Grace Darling, 2006, p.113). B. Use of other protection tools 1. SSL certificate a) Intuitions and Firms “The Secure Socket Layer (SSL)” (Tan & Teo, 2007, para. 1). b) Websites that offers online purchase through internet “the web user” (Tan & Teo, 2007, para. 1). 2. Passwords a) “Passwords Security” (Vu, Proctor, Spantzel, Tai, Cook, et.al, 2007, P.744). b) “Ensuring privacy” (Vu, et.al, 2007, p.755). Why is the use of computers growing rapidly? Because, computers make people’s live easier than ever. For example, people can communicate easily regardless of the distance among countries. Also, people used to store all their massive information in big storage rooms and the process of looking for a specific file used to take a lot of time. In this period of time with the computers’ benefits, people can save information in electronic folders and seek it in just seconds. Therefore, the use of computers is increasing as well as type and amount of information that is
Image of page 4
Risks and Solutions 5 stored in it. However, there are many risks associated with the use of computers by individuals, corporations and governments. Examples of these includes: lose of and hacking into information.
Image of page 5

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full Document Right Arrow Icon
Image of page 6
This is the end of the preview. Sign up to access the rest of the document.

{[ snackBarMessage ]}

What students are saying

  • Left Quote Icon

    As a current student on this bumpy collegiate pathway, I stumbled upon Course Hero, where I can find study resources for nearly all my courses, get online help from tutors 24/7, and even share my old projects, papers, and lecture notes with other students.

    Student Picture

    Kiran Temple University Fox School of Business ‘17, Course Hero Intern

  • Left Quote Icon

    I cannot even describe how much Course Hero helped me this summer. It’s truly become something I can always rely on and help me. In the end, I was not only able to survive summer classes, but I was able to thrive thanks to Course Hero.

    Student Picture

    Dana University of Pennsylvania ‘17, Course Hero Intern

  • Left Quote Icon

    The ability to access any university’s resources through Course Hero proved invaluable in my case. I was behind on Tulane coursework and actually used UCLA’s materials to help me move forward and get everything together on time.

    Student Picture

    Jill Tulane University ‘16, Course Hero Intern