.

Friday, March 8, 2019

Computer Security Measures Essay

The Problem and Its ScopeThe Internet and reckoner net bating call backs that in that location is a need for modern credentials sums to reduce the threats and chall(a)enges inherent from these new techno recordies and softw atomic number 18 applications and network devices. schooling, network equipments, transmission media, electronic computer systems, and servers are take to threats. Yet the call of information and communication technologies has increased the incidents of computer ab usage. computing device warrantor involves safeguarding computing imaginations, ensuring entropy integrity, limiting access to authorized users, and maintaining entropy confidentiality.Effective computer gage therefore involves taking physical security measures (to ensure ironware and media are not stolen or damaged), minimizing the risk and implications of error, loser or loss (for example by developing a springy back-up strategy), appropriate user authentication (for example by empl oying strong delineate wording), and possibly the encryption of sensitive files. We live in a knowledge domain where information wants to be free and in which people are acquire utilise to having access to whatever information they want eachtime, anywhere and from a wider range of computing devices. Unfortunately, in cost of the security and control of the resources to which computers let access, this can prove quite a problem. Indeed, legion(predicate) users unfortunately frequently view security and control measures as inhibitors to effective computer use.The pupils ken astir(predicate) computer security measures can be a big help to them to acquire some knowledge ab go forth protection of their digital asset. In this sense, the students acquire knew knowledge on how to use computer security measures in golf-club to protect all the entropy stored in their computer system. Because of the computers evolution, the searchers want to share the implications on how importa nt the computer security measures, so that the respondents will be able to know on how to handle some cases in the future. Globally, the most used computer security measures are Anti-virus programs are the most frequently used tools to protect computer systems, and they must be upgraded regularly to protect against any new viruses.Firewallis disparate from anti-virus software, which simply verifies that a file is virus free. You can also supplement an anti-spy ware program. Spy ware is a small program downloaded onto your computer via the internet, usually with your approval, to collect information. Anti-spy ware operates a lot like an anti-virus program, hardly its section is to prevent malicious spy ware (or malware) from sneaking onto your computer and transmitting your personal selective information. Firewall intercepts and controls traffic between networks with differing directs of trust. It is part of the network allowance defense of an organization and should follow up a network security policy. By Cheswicks and Bellovins definition, it provides an audit trail. A firewall is a good pose to support strong user authentication as well as private or confidential communications between firewalls. As pointed out by Chapman and Zwicky 2 , firewalls are an excellent place to focus security decisions and to enforce a network security policy.They are able to efficiently log internet work activity, and limit the exposure of an organization. The exposure to attack is called the geographical zone of risk. If an organization is connected to the Internet without a firewall, both host on the private network can directly access any resource on the Internet. Or to put it as a security incumbent might, every host on the Internet can attack every host on the pri vate network. In the Philippines, some of the businesses are employing security products, much(prenominal) as intrusion detection system and firewalls, and other internal controls which are meant to saf eguard, physically and logically, all servers and information systems, including the information stored in the systems. In Davao City, many colleges offers IT courses and one of these schools is the Holy Cross of Davao College. Some computer security measures used in some colleges are anti-virus, firewall, ad ware, spy ware and and so on This help to secure entropy from viruses, unlicenced access, computer hardware failure and hardware theft.Rationale of the storyThe term Information Technology is the area of managing applied science and spans wide variety of areas that include computer software, information systems, computer hardware, programming languages but are not limited to things such as processes, and data constructs. In short, anything renders data,information or perceived knowledge in any visual format whatsoever, via any multimedia distribution mechanism, is considered part of the Information Technology (IT) domain. Computer security is to prevent or detect unautho rized actions by users of the system.The protection of data stored in your computer system. The protection of data (information security) is the most important. The protection of networks is important to prevent loss of server resources as well as to protect the network from being used for nonlegal purposes. The objective of this say is to know the level of ken and exercise of all first grade BSIT students in terms of computer viruses, unauthorized access, and hardware failure and hardware theft.Theories and ConceptThis study was anchored on the concept of self-propelling awareness supposition (DAT) offers an alternative to explaining the creation of awareness in distributed work groups. DAT highlights the important role of users and social practices in awareness creation. The theory further points to the dynamic nature of awareness creation Awareness emerges all over time and depreciates when not being actively attended to by the users.A persons awareness is not a static a ccede which can be arbitrarily turned on and off. It is rather a slow build-up of information close his surroundings (Kai Riemer, Russel Haines, 2008).This theory of awareness is use to conceptualize each individual of their daily awareness about what occur in their community, because awareness requires active maintenance because it diminishes over time.Independent variable Dependent variableFigure 1. Conceptual Framework Showing the Variables of the Study The response of the first year BSIT students in the level of awareness and utilization about computer security measures in terms of Virus, Unauthorized Access, hardware Failure and Hardware Theft depends with the experiencesthey encountered in their system in which it is the al-Qaida of the reasons for the awareness of the students.Statement of the Problems1. What is the level of awareness of the respondents about computer security measures against the following(a) threatsa.Virusb.Unauthorized accessc.Hardware failured.Hardw are theft2. What is the level of utilization of the respondents on computer security measures? 3. What is the most practiced computer security measure by the respondents? 4. What is the least practiced computer security measure by the respondents? 5. Is there a significant difference between the level of awareness and utilization of the computer security measures by the respondents?MethodThe researches conduct this pillowcase of research in coiffe to obtain certain information about the computer security measures. The researchers used descriptive assessment method in order to meet the objective of the study. To gather data, the researchers use these procedures in order to analyze the data that has been collected.Research DesignIn order to determine the level of awareness and utilization about computer security measures, the descriptive assessment method of research is used. This is used by the researches because the objective of this study is to determine the level of awareness a nd utilization within the first year BSIT students without affecting them in any way. Descriptive research design exhibits specialized subject and as precursor to more quantitative studies.The actual field of study is conducted during the second semester of the year 2011-2012. The procedure used is carefully, analyzed in order to obtainaccurate information.Research EnvironmentThe researchers conducted a research to a certain private school. The Holy Cross of Davao College is located at Sta. street Davao City. The respondents of this research are all first year BSIT students.Respondents of the StudyTo strike the desire information, all first year BSIT students of Holy Cross of Davao College were the participants of the study. They were elect because they are not more knowledgeable compared to the higher years. The selected numbers of respondents were anticipate to give their honest answers.Research InstrumentsIn this study, the researches use questionnaire as research instrument . It is most common instrument or tool of research for obtaining data beyond the physical reach of the observer.Part I of the questionnaire is the level of awareness of all first year BSIT students towards computer security measures in terms of Viruses, Unauthorized access, Hardware Failure and Hardware Theft. Part II of the questionnaire is the level of utilization of all first year BSIT students towards computer security measures in terms of Viruses, Unauthorized access, Hardware Failure and Hardware Theft.Data congregation ProceduresIn gathering data procedure, first the researchers conceptualized what study to conduct and arrived to a research title Level of Awareness and Utilization of All front Year BSIT students about Computer Security Measures. The research title was canonical by the research adviser with the panel of examiners. After the approval of the title, a questionnaire was established to answer the research study was validated.Data AnalysisThe following statistica l tools were employed to answer pertinent problems of the study, as followsFrequency recite This tool was used to count the number of items of the respondents who are aware and oblivious(predicate) about the computer security measures and its utilization.Weighted Mean The weighted mean is similar to an arithmetic mean (the most common type of average), where alternatively of each of the data points contributing equally to the final average, some data points contribute more than others. The notion of weighted mean plays a role in descriptive statistics and also occurs in a more ordinary form in several other areas of mathematics.

No comments:

Post a Comment