Question

In: Computer Science

Describe and give examples of the 2 most significant computer security threats that are impacting the...

Describe and give examples of the 2 most significant computer security threats that are impacting the world at the present time. (b) What steps are being taken to minimize or thwart these threats? (c) Will the efforts proposed to protect individuals, companies and the governments from these threats still protect the rights of citizens? (d) Do you think that the steps taken or to be taken are ethical and will not cause a backlash in society? Please elaborate (beyond a yes or no answer

Solutions

Expert Solution

(a)Describe and give examples of the 2 most significant computer security threats that are impacting the world at the present time.

Answer: The most significant computer security threats that are impacting the world presently are Computer Viruses/worms and using Software programs with bugs

1) Computer viruses and worms are malicious programs created for destroying or misusing the data stored in the system or the computer network. The computer viruses and worms are also designed to spread from one infected system to other systems in the network. Examples are Stuxnet, MyDoom, Storm Worm, etc.

2) When we install the software programs with bugs on the system, the bugs can be used by Hackers to gain higher user privileges, can bypass security control and can misuse sensitive data on the system. For Example the data leaks of credit card information.

(b) What steps are being taken to minimize or thwart these threats?

Answer: Some steps which can minimize the threats are:

  • Installing and using antivirus software on all the devices connected in the network.
  • Applying firewall rules for incoming and outgoing traffic from the networks connected to the internet.
  • Installing latest patches regularly for all the software used in the systems.
  • Don’t open unknown links in spam mails.
  • Provide proper authentication and authorizations in the systems and software.

(c) Will the efforts proposed to protect individuals, companies and the governments from these threats still protect the rights of citizens?

Answer: The protection provided are for safeguarding the citizens and can still protect the rights of the legitimate rights of the citizens.

(d) Do you think that the steps taken or to be taken are ethical and will not cause a backlash in society? Please elaborate (beyond a yes or no answer)

Answer: The steps taken are ethical as the motivation for taking the steps are for the protection of the interests of the citizens. Also the citizens know that the steps are taken to protect their data and avoid any misuse of their data. So there should not be any backlash in the society.


Related Solutions

Give at least 2 examples of how climate change is impacting land system change and freshwater...
Give at least 2 examples of how climate change is impacting land system change and freshwater use .
Which of the following would likely be considered Congress's greatest (most effective, impacting and significant) power?...
Which of the following would likely be considered Congress's greatest (most effective, impacting and significant) power? A. Its power to coin money. B. Its power to establish immigration laws C. Its power to set up post offices D. Its "power of the purse"
Justify with an appropriate diagram and examples that security is a significant undertaking in SDN.
Justify with an appropriate diagram and examples that security is a significant undertaking in SDN.
Describe the postindustrial workforce. Give examples of the types of work that are most common in...
Describe the postindustrial workforce. Give examples of the types of work that are most common in postindustrial societies. Explain how technology has changed the nature of work in these societies.
Climate change is impacting biological systems. Give 3 examples and explain how they are related to...
Climate change is impacting biological systems. Give 3 examples and explain how they are related to increases in temperature, CO2 or both.
The Trump administration is pro-business. Please discuss and give examples as to their actions impacting employees...
The Trump administration is pro-business. Please discuss and give examples as to their actions impacting employees and your opinion on these actions;
The followings are the most common security threats in networks. a. DoS Attack [5 marks] b....
The followings are the most common security threats in networks. a. DoS Attack [5 marks] b. Sniffer [5 marks] c. Spoofing [5 marks] d. Man-in-middle attack [5 marks] e. TCP/IP Hijacking [5 marks] You are expected to carry out an analysis and discuss on the nature of each threats by addressing the following elements; What it is all about? How can such attack/threats take place in the network? Why they do it? When normally such attack take place (i.e. any...
Briefly describe the Five Whys technique and give 2 examples
Briefly describe the Five Whys technique and give 2 examples
1. Give examples of security measures that might be used to control information security, personnel security,...
1. Give examples of security measures that might be used to control information security, personnel security, and health hazard security issues. 2. Should the federal and state governments enact tougher laws or regs to deal with security violators? If so, what are your recommendations?
1. What are the new threats to human security in the era of globalization? 2. Two...
1. What are the new threats to human security in the era of globalization? 2. Two individuals have become whistleblowers: Edward Snowden abd Julian Assange. They believe that their choices prioritize human or individual rights over nation-states security. Do uou think that their arguments are valid? Why or Why not? Please explain with a lengthy explanation.
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT