Sign In
Not register? Register Now!
You are here: HomeResearch PaperTechnology
Pages:
10 pages/≈2750 words
Sources:
Level:
APA
Subject:
Technology
Type:
Research Paper
Language:
English (U.S.)
Document:
MS Word
Date:
Total cost:
$ 39.95
Topic:

Commercial Solutions for Classified Program and Bit-defender Sphere and Windows Defender (Research Paper Sample)

Instructions:

Task 1
Security being a top concern for any organisation, choosing the correct security solutions is of utmost importance. Consider an area of information technology (IT) security, such as, network security, e-mail security, database security and so on. Identify and research three different commercial IT security solutions/products for the chosen security area. The three products must target the same security issues. [Note: Instead of IT security specific products such as antivirus software etc. you may also choose to research the security features of products such as database management systems, operating systems and so on.] Prepare a report providing categorical feature comparison for the three products in the chosen category and make recommendations about the products to assist purchasing decision. Your report may include the following sections: - Executive overview. - Introduction. - Product description. - Detailed feature comparison. - Conclusions and recommendations. - Reference list - Appendices (if any) Length of the report: 1750~2000 words, excluding references and appendices.
Task 2 1. Originally Linux/UNIX systems had one all-powerful user called root that managed systems. Discuss the risks of having a single root user and how more limited management abilities can be given to others users on Linux/UNIX systems. Include a sample generic policy for a limited user from which a configuration could be written. (750 words)

source..
Content:

Information Security
Name:
University:
Course:
Instructor:
Date:
Executive Summary
Since their invention, computers have played a significant role in connecting individuals around the world. Computers are used for paying bills, shopping, banking among other services. People get connected to their friends and family through social networking and email, surfing, and much more. As much as people rely heavily on computers for their invaluable services, most tend to ignore internet security.
It is important to improve the security of computers because these machines play a critical role in the contemporary society. Computers carry a lot of personal information, sensitive information that ensures the day to day activities. Malicious software and internet viruses can be used to cause harm to computers (Brown, 2011).
Internet attackers can install malicious software in vulnerable computers. The hackers usually take advantage flaws in the computers or unsafe practices such as leaving one's programs unsecured. The attackers can also employ social engineering; where an individual is convinced to open malicious links such as email attachments. In the event that one's computer is infected, the attacker is able to access the computer and perform any activities that might not be intended by the user. The hackers can also access personal information which they can use to commit fraud (Brown, 2011). Computer attackers can also change the computer configurations causing the computers to perform poorly; they could even install malicious software to use in attacking other computers.
According to Smith (2006), the harm caused by computer attacks has led to an investment in security products/solutions for Information Technology departments. Various products have been introduced to curb internet insecurity.

...
Get the Whole Paper!
Not exactly what you need?
Do you need a custom essay? Order right now:

Other Topics:

  • Social Media and Education
    Description: It was revealed that some of the online learning programs have embraced social media such as Facebook and twitter to communicate between tutors and students....
    4 pages/≈1100 words| APA | Technology | Research Paper |
  • Electronic Circuit Simulation
    Description: This report clearly shows the behaviors of electronic devices and circuits. The report shows how electronic circuit simulation integrates and uses mathematical models in order to replicate the behavior of electronic circuit or devices. This electronics simulation software totally engages the users by ...
    3 pages/≈825 words| APA | Technology | Research Paper |
  • Building the Boeing 787
    Description: Boeing is ranked second in the plane manufacturing industry in terms of capacity and efficiency...
    8 pages/≈2200 words| APA | Technology | Research Paper |
Need a Custom Essay Written?
First time 15% Discount!