Question

In: Computer Science

Prepare a short Word document (2 pages) that describes your impressions about the importance of the...

Prepare a short Word document (2 pages) that describes your impressions about the importance of the security mechanisms you have reviewed thus far (authentication, encryption, firewalls, and so on) and how they might be useful in the Group Project

Solutions

Expert Solution

A computer system faces many threats ,the major threats are data loss,unuthorized acess and virus and other harmful programs which can lead to database breach ,any sensitive information can fall in wrong hand and also damage of software and hardware by virus.So the importance of security mechanism come into play for preventing such losses:-

  • Firewalls:-it is good way to maintain a security level between a computer system and internet.Computer network manager set up some rules so that any unauthorised access and intrusions can be prevented.Firewalls are very important at the boundary of internet and enterprise network.You can use firewalls to set the rules for other network manager to access the your data according to your rules.
  • Authentication:- It basically means to know who is requesting network services.It can be achieved by identifying one or more of these factors:something they know,something they have and something they are.The most common way of authentication now a days is userid and password.
  • Encryption:-It can be the method to keep data safe.When data is transmitted ove internet or in CD or harddisk it can be easily misused or accessed if proper encryption and authentication is not done.In enryption the data is encoded when transmitted  so that only authorized person can access it by decrypting it.
  • Auditing:-Proper accounting of all logs from any user on server ,his/her detail of network activity data should be done,it should record all activity of authentication and user which is attempting to change his access rights..

These security mechanism can be useful in follwing ways:-

the need of security mechanism over the computer network and outside it cannot be denied.All the files,data and personal information related to any project can be access by an unauthorized person if proper safety measures are not taken,hackers attack or virus attack can also be prevented by proper use of antivirus and authentication.The data stored in any hard disk or external storage device can be protected by proper use of password security and authentication so that ant project file or data would not fall in wrong hands. The database for an organistion should also be secure and safe from ay data breach using these security mechanism.


Related Solutions

research the Caesar Cipher, and document your research in 2-3 pages in a Word document with...
research the Caesar Cipher, and document your research in 2-3 pages in a Word document with illustrations in your document and provide an example of how the Caesar Cipher works while encrypting and decrypting a sample message. Also, add its history and its internal workings. Summary of the areas to complete: - Research the Caesar Cipher. - Show its Encryption Method in details. - Show its Decryption Method in details. - Describe its History and what it was used for....
Create a short Word document, no longer than a page, that describes “How the Internet Works.”
Create a short Word document, no longer than a page, that describes “How the Internet Works.” This can be from any perspective you wish, browser, email, networking but will probably have to cover a few of these ideas. You will receive 3 points for each keyword and although I encourage you to use more than 5, the maximum number of points you can receive is 15.Terms (Remember, you need to use at least 5 to get full credit)Public IP address             ...
Create a WORD (or Pages) doc. Upload either your Word doc or convert Word or Pages...
Create a WORD (or Pages) doc. Upload either your Word doc or convert Word or Pages to PDF and then upload the PDF file below. Do NOT upload a Pages document. A firm produces a product with the following costs: $1.30 of materials and $0.90 of wages for factory labor. In addition, the firm also pays rent of $483 and insurance of $242 per month. Its past few statements for electricity had the following total costs: Cost of Electricity Month...
Prepare short analysis report of maximum 2 pages ( 500 - 1000 words ) according to...
Prepare short analysis report of maximum 2 pages ( 500 - 1000 words ) according to the following case study . Read the case study and answer the questions : Aamod was born in a small rural village in Bangladesh . He spent his childhood years looking after his family ' s livestock . The community upheld high values , such as honesty and respect , but the people were desperately poor . He realized that he would have to...
write a short report (about 2 pages) about the integration of MRP and JIT adopted by...
write a short report (about 2 pages) about the integration of MRP and JIT adopted by your selected company which should be a real company
Write a document providing instructions or procedures for your workplace. This should be 2-3 pages in...
Write a document providing instructions or procedures for your workplace. This should be 2-3 pages in length and focus on the written presentation to the audience. Instructions should provide a step-by-step path to accomplishing something. This could be operating, maintenance, use, or other activity requiring direction. Another idea would be product use. You may want to include safety items as you proceed or even materials required at the start or during the steps. Both the text and the web provide...
Write a document providing instructions or procedures for your workplace. This should be 2-4 pages in...
Write a document providing instructions or procedures for your workplace. This should be 2-4 pages in length and focus on the written presentation to the audience. Instructions should provide a step-by-step path to accomplishing something. This could be operating, maintenance, use, or other activity requiring direction. Another idea would be product use. You may want to include safety items as you proceed or even materials required at the start or during the steps. Both the text and the web provide...
In a Word document, prepare a 2-3 page (500-750 words) written response to the following items...
In a Word document, prepare a 2-3 page (500-750 words) written response to the following items to submit to your professor: Identify the types of data and information collected in Telemedicine. Select two of the types of data and explain how each is transmitted
Prepare a document that addresses the following: Describes the different phases of the traditional systems development...
Prepare a document that addresses the following: Describes the different phases of the traditional systems development life cycle (SDLC) Compares the SDLC waterfall method to the spiral and agile methods. Explains how these methods are similar and how they are different. You may submit your paper in essay form or you may choose to use a table that highlights the different phases of the SDLC and compares it to spiral and agile methods.
Please view the following video and submit an approximately 250 word commentary on your impressions. Be...
Please view the following video and submit an approximately 250 word commentary on your impressions. Be sure to include at least one specific principle from Chapters 9, and/or 10, and/or 11 as you see it illustrated in the video.   Video: PepsiAmericas: A Bottler-Wholesaler in the Pepsi Channel of Distribution
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT