Computer security

Running head: COMPUTER SECURITY 1
COMPUTER SECURITY
Student’s name
Institutional affiliation
Date
COMPUTER SECURITY 2
Abstract
Computers are always at risk of being hacked by malicious people to steal the information
therein. The computer security, therefore, involves several steps as discussed here below. The
industrial or economic espionage is ever rising as malicious business organizations steal data and
other techniques from other businesses with the aim of outdoing it. They accomplish such
operations using spies such as disgruntled engineers. The competitor aggressively targets and
recruit disgruntled organization engineer or software savvy employee. The competitor may
conduct economic intelligence from websites through theft, bribery or cyber intrusion. Such threats
can be combated by for example enforcing domestic laws enforcement and carrying out public
campaign and awareness outreach. Offenders should also be given severe penalties upon
confirmation. The undercover security agents have been trained to build trust among themselves
and to catch nuances through spy methods in various strategic installations. They may as well use
civilian clothes instead of uniform and secretive interviews with suspected organization’s
employees. Private and public agencies have entered a joint venture to combat business crimes
with assistance from government security department.
COMPUTER SECURITY 3
Computer security
Switch of the computer internet router off
The security of a computer can be improved by switching off the routers especially when
one is online for extended periods of time since hackers in most cases prefer those networks which
are always online. For computers that still have an internet connection, security can be enhanced
through protection of all internet connection points, specifically routers, (Baggett Jr, & Adams,
2012)
The computer routers should be fixed with a decent firewall
The routers should keep off lousy stuff and let in good ones as designed by the computer
service providers. The computer router's firmware should also be upgraded.
The computer should have a decent firewall
The operating system of a computer should have an integrated firewall such as Windows
Firewall which is a protective barrier to hackers.
Installation of a decent Anti-virus Software
The purpose of such software is to both detect and keep of all the viruses that may deter
with the file's data in the Computers although it may slow down its operation. The Anti-virus
software should be updated regularly, at least twice a week. Its settings should also be checked
frequently. Different USB cables should also be avoided, (Baggett Jr, & Adams, 2012)
The computer should be kept up to date
The operating systems of the machine should regularly be updated. Failure to install the
operating system, an essential security patch, puts the computer at risks of being interrupted.
Avoidance of porn sites visits
COMPUTER SECURITY 4
These porn sites and others are at times set to trap computer users. The sites are infected
with worms which are deliberately set to infect computers with viruses to modify its websites.
Safeguard your passwords
The password should be kept safe and hard to predict by non-users. The passwords used to
sign up different websites should also be different. Password managers like the Last Pass are also
recommended since one need not type it on the computer keyboard. Saving password on the
computer is too risky hence should be avoided, (Baggett Jr, & Adams, 2012)
Use of a safer web browser
Outdated browsers like internet explorer and safari are no safe since it may be infected
easily by viruses hence should be kept at bay. Google Chrome is the currently secure browser
recommended for security reasons.
Avoid Public Wi-Fi
Wi-Fi connections allow browsing and emails to be sent unencrypted to other users using
the same hotspot and malicious individual may listen and steal passwords. Hence, 3G connection
or a secured connection is preferable. A VPN can be used to encrypt your connection.
Avoid leaving the computer unmanned
The computer should be turned off especially in unsafe places because malicious people
may install a virus on your computer by connecting a device and steal the data therein even when
it is locked. Encrypting the hardware is a better solution.
The foreign business competitors accomplish economic espionage through intellectual
stealing of the business trade secrets. The competitor aggressively targets and recruit disgruntled
organization engineer or software savvy employee. The competitor may conduct financial
intelligence from websites through theft, bribery or cyber intrusion. Personal computers have been
COMPUTER SECURITY 5
the primary tool that has been used to hack into unattended computers in business offices. Some
economic computer perpetrators may take advantage of the vulnerabilities of other computer
software. The perpetrators use computer spyware and malware to predict the trade secrets
concerning the customer plans and other trade secrets of a business future. Some devices like
distributed denial service (DDoS) targets compromised computer systems to interfere with the
flooding requests on the target computer systems so that it may both shut down and keep off users
from accessing services. The increased accessibility to computer internet networks has been the
ideal tool for perpetrators to carry out a cyber-attack, (Thonnard, et.al 2012)
The economic espionage can be combated through the formulation of strict rules and
legislation against the perpetrators of intellectual property theft. Enforcing domestic laws
enforcement and carrying out public campaign and awareness outreach is the best outreach
practices for combating such malpractices. Task force in collaboration with other private and
public cyber-security units have been formed and reinforced to look into perpetration and
intellectual sabotage issues. Hefty fines and punishment have been put in place to be carried out
on the offenders. Many nations and private and public business organizations have collaborated
but financially and socially to combat the crimes.
Some departments like para-military CISF are carrying out undercover operations and
programs to protect specific strategic or specific installations. Such actions are accurately carried
out at sensitive places like government departments, airports, and aerospace among others. The
undercover security agents have been trained to build trust among themselves and to catch nuances
through spy methods in various strategic installations. The agents carry out secretive interviews
and surveillance operations to ascertain any suspected cases of espionage and sabotage, (Murphy,
2016)
COMPUTER SECURITY 6
Plainclothes
The law enforcement agents spy suspected organizations and individuals by wearing
civilian clothes to avoid being detected instead of wearing their uniforms.
Enticing target organizations and victims
The detectives usually use bait to seek further information from employees and other
suspected victims. The security departments offer a large sum of money, for instance, to gather
information from such suspects.
Develop long-term relationships
The police, task force and other security agent establish a close relationship with the
suspected organizations to seek a detailed report of their espionage and other malpractices. Well-
trained spies organize these relationships.
The objectives of the protocol include the creation of a better understanding between the
public and the private sectors of the economy to protect lives and properties of the citizen and
ensure continuity of experience in the community. It was also formed to encourage public and
private sector cooperation and partnership in planning and assessment processes. It was established
to assist businesses and communities which do not have emergency planning in cases of economic
espionage to have a joint emergency planning program with the government security agents and
task force. Additionally, the protocol was put in place to develop the desired understanding of
goals where public and private resources complement each other. It was also formed to act as a
source of fund for business planning to have a joint venture in preparing especially for mutual
cohesion and safety, (Jones, Kowalk & Miller, 2010).
Assessment and management approach to cases of terrorist attacks are evaluated regarding
the value of the property at a risk of loss as well as the number of lives that may be lost. Vulnerable
COMPUTER SECURITY 7
facilities like transportation facilities (e.g., airports), public and private institutions (e.g., stadiums
and town social halls), cyber service facilities and Defense and defense research institutes.
Management approach may involve such steps as risk involved calculation, critical and threat
assessments, vulnerability assessment, critical infrastructure inventory and measures to counter
the possible threat upon identification. Management approach consists of the determination of
when, and where the risk may take place. It also involves both private and public preparedness in
such situations, (Ezell, et.al 2016).
COMPUTER SECURITY 8
References
Baggett Jr, C. C., & Adams, J. J. (2012). U.S. Patent No. 8,121,892. Washington, DC: U.S.
Patent and Trademark Office.
Ezell, B. C., Bennett, S. P., Von Winterfeldt, D., Sokolowski, J., & Collins, A. J. (2010).
Probabilistic risk analysis and terrorism risk. Risk analysis, 30(4), 575-589.
Jones, R. W., Kowalk, M. A., & Miller, P. P. (2010). Critical incident protocol: A public and
private partnership.
Murphy, B. (2016). Deceptive apparatus: Foucauldian perspectives on law, authorised crime and
the rationalities of undercover investigation. Griffith Law Review, 25(2), 223-244.
Thonnard, O., Bilge, L., O’Gorman, G., Kiernan, S., & Lee, M. (2012). Industrial espionage and
targeted attacks: Understanding the characteristics of an escalating threat. Research in
attacks, intrusions, and defenses, 64-85.59.

Place new order. It's free, fast and safe

-+
550 words

Our customers say

Customer Avatar
Jeff Curtis
USA, Student

"I'm fully satisfied with the essay I've just received. When I read it, I felt like it was exactly what I wanted to say, but couldn’t find the necessary words. Thank you!"

Customer Avatar
Ian McGregor
UK, Student

"I don’t know what I would do without your assistance! With your help, I met my deadline just in time and the work was very professional. I will be back in several days with another assignment!"

Customer Avatar
Shannon Williams
Canada, Student

"It was the perfect experience! I enjoyed working with my writer, he delivered my work on time and followed all the guidelines about the referencing and contents."

  • 5-paragraph Essay
  • Admission Essay
  • Annotated Bibliography
  • Argumentative Essay
  • Article Review
  • Assignment
  • Biography
  • Book/Movie Review
  • Business Plan
  • Case Study
  • Cause and Effect Essay
  • Classification Essay
  • Comparison Essay
  • Coursework
  • Creative Writing
  • Critical Thinking/Review
  • Deductive Essay
  • Definition Essay
  • Essay (Any Type)
  • Exploratory Essay
  • Expository Essay
  • Informal Essay
  • Literature Essay
  • Multiple Choice Question
  • Narrative Essay
  • Personal Essay
  • Persuasive Essay
  • Powerpoint Presentation
  • Reflective Writing
  • Research Essay
  • Response Essay
  • Scholarship Essay
  • Term Paper
We use cookies to provide you with the best possible experience. By using this website you are accepting the use of cookies mentioned in our Privacy Policy.