Question

In: Computer Science

Some private information is being stored on the computer, which can leave it vulnerable. Should the...

Some private information is being stored on the computer, which can leave it vulnerable. Should the burden be upon the vendor to provide more security features at OS level, or should we as user distribute personal information onto other secure platforms?

Solutions

Expert Solution

At operating system level your data is completely at risk of data loss anytime. your data may be destroyed due to failure of hard disk. Or it can be hacked by your friend by accessing the system.

If vendor provides security options at os level then also there is chance of data being hacked by known people because they know Which computer you use. One more important think is that no body can protect your data when your hard disk fails unless you pay a huge amount to disk recovery team. So it is not a good approach to keep sensible data at operating system.

Now come to other Security platforms. In my mind the first approach hits is upload your sensible data to clouds. I will tell you why? The main benefit of data storing at platforms who provides cloud storage services is your known people won't be able to know Which cloud service you use.

Moreover cloud services provides additional security to secure your data. Even you can set One time password system to access your data. Until you provide correct OTP , it won't allow you to access data.

One more advantage is that you can access your data from anywhere, the only requirement is one smart phone with Internet connection and tada you rock. There is no chance of data loss due to hard disk failure because data is not stored locally.

Don't forget to like.

Thanks by ❤️.


Related Solutions

Which of the 4 functions of management is most vulnerable to being replaced by technology
Which of the 4 functions of management is most vulnerable to being replaced by technology
If computer and information science are foundational to nursing informatics, should computer and information literacy be...
If computer and information science are foundational to nursing informatics, should computer and information literacy be a requirement in all nursing programs at all levels? Why or why not?
Which two Acts set legislative guidelines about how information should be collected, disclosed, used and stored...
Which two Acts set legislative guidelines about how information should be collected, disclosed, used and stored and what do these Acts cover?
Some argue that accountants should focus on producing financial statements and leave the design and production...
Some argue that accountants should focus on producing financial statements and leave the design and production of managerial reports to information systems specialists. Others argue the opposite. Write at least five sentences considering both sides. What are the advantages and disadvantages to involving accountants more in information system design? To what extent should accountants be involved in producing reports that include more than just financial performance measures? Why? that's how the question was i dont have any additional information. (...
Explain the types of information that can be stored in an Active Directory user record. What...
Explain the types of information that can be stored in an Active Directory user record. What are some of the additional tabs which are available in the Active Directory Users and Computers "Advanced Features" mode? What are some of the specific challenges and risks associated with account management in a large infrastructure? How can inadequate access controls or access management leave critical information vulnerable? What protections does encryption offer and how important is key management to keeping any encryption system...
We will do some basic data analysis on information stored in external files. You will find...
We will do some basic data analysis on information stored in external files. You will find the following data files in the Source Code -> Chapter 7 folder you should have downloaded already downloaded/unzipped in Lesson 3. If you need that link again: Pyton4E_Source_Code.zip GirNames.txt contains a list of the 200 most popular names given to girls born in US from year 2000 thru 2009 BoyNames.txt contains a list of the 200 most popular names given to boys born in...
In what situation, we should invest in some company shares, as an executive of a private...
In what situation, we should invest in some company shares, as an executive of a private equity fund? What should be IRR, equity exit value, etc. And also, if we decide to invest, how should we structure it?
Should the care of youths, some as young as 13, be given to private prison corporations?...
Should the care of youths, some as young as 13, be given to private prison corporations? Why or why not?
A Mexican laboratory developed a new vaccine against COVID-19, which should be stored at an average...
A Mexican laboratory developed a new vaccine against COVID-19, which should be stored at an average daily temperature of 8 degrees, with a standard deviation of 3 degrees. If the distribution of daily temperatures is approximately normal. What is the probability that: A) On a given day the temperature would have been between 6 and 9 degrees B) The first day a temperature of at most 7.1 degrees is reached is before 6 days
Please explain the Family and Medical Leave Act. Your response should include to which businesses the...
Please explain the Family and Medical Leave Act. Your response should include to which businesses the Act applies, to which employees the Act applies, and the duration of the allotted leave.
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT