Tuesday, October 8, 2019
Internet Security Essay Example | Topics and Well Written Essays - 1000 words
Internet Security - Essay Example In this report, section one will throw light upon two main problems that may usually affect a computer without security: hacking and viruses. The next section will compare two different types of security programs that can be used to protect the computer. The last part will discuss the advantages and the disadvantages of the proposed solutions in this paper. __ Hacker is a person who breaks into computers. Hackers have the ability to access any file or personal information from their own computers to other users. One of the most people who are able to hack any user are the computer scientist, but that does not mean that others are not able because at the end hacking depends on practicing and knowing all the strategies. With this information, users must use an internet security to protect their computers from any hackers to access their computers and hack it. However, that does not mean that only hackers can destroy any user computer but even emails or websites may contain viruses. Desktops and laptops can be at risk without any security program and there are different types of protection programs that can be used to protect computers. ... ktops and laptops can be at risk without any security program and there are different types of protection programs that can be used to protect computers. Anti-Virus is software that protects computers from any virus that can occur from downloading files. However, this program can be made by human beings. Many programs can damage the computer in different ways such as Malware, Trojan Horses, Viruses, and Worms. Antivirus software is the most useful way to protect a computer from any harmful viruses. Laptops develop every year and different anti- virus programs are able to be downloaded for the protection of the laptop. However, some of the websites have certificates to tell how secure is the website for the users to feel confident to use it. In addition to this, most of the websites that the user has to check for the secure certificate are the shopping websites because they might contain a type of virus to save their personal information such as the credit card information. At this po int another important point will be highlighted, which is data transmission which is the physical transfer __ data from one point to another. These data transmissions consist of different channels which are: copper wires, wireless, storage media, and optical fibres. These types which a user can share any data with others but there is a security code that can be used for some of them like wireless a security pin number can be set up. This security pin has to be used so no one can access through the user's computer without their permission. 2. Finding new programs to avoid the IT security "comparing two best security programs" 2.1 Firewall Firewalls are a software program that has the ability to block unsecured ports on the laptop. There are three different types of firewalls: stateful
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.