Preview

Access Control - 1

Satisfactory Essays
Open Document
Open Document
450 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Access Control - 1
Viruses, Scams, and the Security of Your PC
Michael Harper
Blue Ridge Community and Technical College
Apryl McDonough
30 November 2012

Viruses, Scams, and the Security of Your PC A virus is a computer program written for entering your computer without your permission. Some viruses just reproduce itself and spread through your system. However, some may cause damage or effect program or system performance. When this happens, it is referred to as your computer being infected. In today’s world of communication, with the internet, computers, cell phones, and having such easy access, viruses are a real threat to your computer system. Mark Ciampa, author of Security +, Guide to Network Security Fundamentals, wrote, “A biological virus is an agent hat reproduces itself”. (Page 43) He goes on to write, “A computer virus is a malicious computer code that, like its biological counterpart, reproduces itself on the same computer”. (Page 44) There are many different kinds of known computer viruses, and there are new ones being created every day. That is why computer and network security is so important. Some use these programs for scams or internet crime. This ranges from just breaking into computer system for fun, to stealing money, identity theft, company secrets, to child pornography. There is even a virus that is an email Trojan horse that could blow up your computer. Therefore, we need to be careful what emails we open and what we download to our computers. We need to be careful how we choose our also. There are people ready to get into your computer for any information they can retrieve. These bad people are called hackers, which Mark Ciampa describes in his Security + book on page20 of the first chapter. For example, South Carolina had a security breach that put 3.6 million taxpayers at risk for identity theft. The email entitled “CCIT advice on state security information breach” informed Clemson students on October 27th that personal



References: Man, S. (2012). ABB Stockpile - Mining Solution Library (Automation). The ABB Group - Automation and Power Technologies. Retrieved September 20, 2012, from http://www.abb.com/industries/db0003db002806/e29095140f8c008fc12573b1002d9a69.aspx?tabKey Note- the references must be double spaced , in alphabetical order, and formatted with a hanging indent.

You May Also Find These Documents Helpful

  • Better Essays

    Lit 121.56

    • 1420 Words
    • 6 Pages

    References: [List your references here. Make sure to list them in APA format. Read my tips about APA formatting]…

    • 1420 Words
    • 6 Pages
    Better Essays
  • Satisfactory Essays

    It205 Capstone Question

    • 633 Words
    • 3 Pages

    Malicious software, referred to as malware, can contain a variety of threats, from data loss to system failures. There are several types of worms, viruses, Trojan horses and spyware, which can be delivered in a variety of ways. Computer viruses are a type of software or executable file that attaches itself to other programs to be uses. Viruses can cause system failures, rewrite hard drives, or destroy files and programs. Worms are similar to viruses, but are independent programs, rather that attaching to others. Viruses have a tendency to spread more rapidly over networks and through e-mail. Trojan horses are based off their namesake, in which they appear to benign types of programs, but when executed can introduce malware into your system. Spyware is programing that can track computer use. Forms of…

    • 633 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    References (list your end-of-text citations; alphabetical order by the first author’s last name; you need at least 3 end-of-text citations - 2 database (journals) and 1 online source; you may have more than the requirement, but you will lose points if you have less than the requirement)…

    • 822 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    Unit 8 econ HW 1

    • 824 Words
    • 10 Pages

    4. Provide a list of references at the end of the last page of your assignment.…

    • 824 Words
    • 10 Pages
    Satisfactory Essays
  • Good Essays

    cm220 essay

    • 2182 Words
    • 8 Pages

    References: Directions: Use the next page to create a references page for the sources cited in Part II above. Create full citations for each source in APA format, order the citations alphabetically, and use a hanging indent.…

    • 2182 Words
    • 8 Pages
    Good Essays
  • Powerful Essays

    Access Control Lists

    • 3039 Words
    • 13 Pages

    This report will look at various access control methods used by Operating Systems (OS) to control user access to files on a computer and what they can do once they have gained access. In this first section I will look at methods such as Access Control Lists(ACL’s), Capabilities and Encrypting file systems(EFS) and which Operating Systems use these as well as the advantages and disadvantages they have over each other. The second part of my report will focus on one OS and explain in detail the methods it uses to control file access and how it works.…

    • 3039 Words
    • 13 Pages
    Powerful Essays
  • Satisfactory Essays

    progress check 1

    • 711 Words
    • 3 Pages

    A computer virus is programmed to raid and attack existing computer programs. The virus is sent by an e-mail or activated through a download. The virus program then infects the whole computer system. The virus attaches itself to other programs in the computer and copies itself. Some computer viruses are terrible; they erase files or lock up systems. Viruses must not go untreated.…

    • 711 Words
    • 3 Pages
    Satisfactory Essays
  • Powerful Essays

    Access Control Policy

    • 833 Words
    • 3 Pages

    Describe how and why authentication credentials are used to identify and control access to files, screens, and systems. Include a discussion of the principles of authentication such as passwords, multifactor authentication, biometrics, and single-sign-on.…

    • 833 Words
    • 3 Pages
    Powerful Essays
  • Good Essays

    Formal Outline Template

    • 783 Words
    • 4 Pages

    References: APA format; all references need to be sited in APA format. Electronic sources must be .edu, .gov, or .org in order to be acceptable. Be sure to make sure that the references are in Alphabetical order. Double-Spaced; all references should be double-spaced and indented. Five source minimum: You must have at least five sources cited in your outline and listed on your reference page. Make sure to provide all necessary information in the references.…

    • 783 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    Research Papers

    • 417 Words
    • 2 Pages

    ADD IN YOUR OTHER 3-4 SOURCES HERE & REFERENCES SHOULD BE LISTED IN ALPHABETICAL ORDER.…

    • 417 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Annotated Bibliography

    • 695 Words
    • 3 Pages

    reference should be cited in APA format. After each citation, provide a summary of the source,…

    • 695 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    Causes Of Identity Theft

    • 1108 Words
    • 5 Pages

    Hackers are people who hack into other people’s computers or electronic devices so they can take control over their things. A book titled Net Crimes and Misdemeanors written by J. A. Hitchcock takes us through many different aspects of how people take and control our things. She explains to us “When you’re connected to the internet, your computer is part of a worldwide network and anyone can try to connect to your system. The best way to describe it is by contrasting it to your television, a one-way communication mechanism” (Hitchcock 237). Hackers can reach any personal information located on an individual’s computer. Any accounts or credit card numbers in the system, they can get ahold of. We use many internet softwares today that can help prevent hackers, but not all the time. Hackers are extremely knowledgeable with computers and can find their way in. Hitchcock also gives us a little background information on when many viruses and softwares were introduced. She states, “…there was a good enough market for a security suite that included a personal firewall and antivirus capability. They were right. When NIS was introduced in December 1999, the U.S. retail market for internet security software grew more than 140 percent” (Hitchcock 236). Throughout the years, many software updates came out to help protect people and their information. The problem is that the more…

    • 1108 Words
    • 5 Pages
    Good Essays
  • Good Essays

    A network of compromised machines (bots) controlled by a bot master Responsible for (non-exhaustive list): Large-scale network probing (i.e., scanning activities) Launching Distributed Denial of Service (DDoS) attacks Sending large-scale unsolicited emails (SPAM) Click-fraud campaign Information theft Shift from a for-fun activity towards a profit-oriented business…

    • 11343 Words
    • 46 Pages
    Good Essays
  • Powerful Essays

    A computer virus is a computer program that can replicate itself and spread from one computer to another. The term "virus" is also commonly, but erroneously, used to refer to other types of malware, including but not limited to adware and spyware programs that do not have a reproductive ability.…

    • 4916 Words
    • 20 Pages
    Powerful Essays
  • Good Essays

    Guidance

    • 570 Words
    • 3 Pages

    References: should be cited in the text (e.g. Poerbandono & Djunarsjah, 2005) and listed in alphabetical order in the reference section.…

    • 570 Words
    • 3 Pages
    Good Essays