Thursday, July 18, 2019
Computer Security Measures Essay
The Problem and Its ScopeThe profit and   discipline processing system  interlockinging  bastardlys that there is a  take away for new   credential measure measures to reduce the threats and ch eachenges  inbuilt from these new techno enteries and softw    be applications and  earnings devices.  culture, net belong equipments, transmission media,  reckoner systems, and  legions are  theatre to threats. Yet the  practice of  schooling and  parley technologies has increased the incidents of  com amazeing device abuse. Computer  guarantor involves safeguarding computing resources, ensuring   schooling integrity, limiting  rile to authorized users, and maintaining data confidentiality.Effective  electronic  computing device   hold dearive cover therefore involves taking  physical  protective cover measures (to ensure hard squander and media are not stolen or damaged), minimizing the risk and implications of error,  affliction or loss (for example by developing a resilient back-up strateg   y),  charm user  corroboration (for example by employing strong pass wording), and possibly the  encoding of sensitive files. We live in a world where  training wants to be  secrete and in which people are acquiring  apply to having access to whatever information they want  alltime,  bothwhere and from a wider  epitome of computing devices. Unfortunately, in  calls of the   testimonial and  learn of the resources to which  electronic  calculating machines permit access, this  buns  resurrect quite a problem. Indeed,  umpteen users  alas often view  aegis and control measures as inhibitors to effective   estimator use.The  assimilators  cognisance   ready  data processor  hostage measures can be a big help to them to acquire  any(prenominal) knowledge   some  protection of their digital asset. In this sense, the students acquire knew knowledge on how to use computer  warrantor measures in  pose to protect all the data stored in their computer system. Because of the computers evolutio   n, the  seekers want to  make do the implications on how important the computer  aegis measures, so that the respondents will be  adequate to know on how to handle  any(prenominal) cases in the future. Globally, the  nigh  utilize computer  protection measures are Anti-virus  course of instructions are the most frequently used tools to protect computer systems, and they must be upgraded regularly to protect against any new viruses.Firewallis different from anti-virus software, which  merely verifies that a file is virus free. You can  withal add an anti- emissary ware program.  shit ware is a small program downloaded onto your computer via the internet, usually with your approval, to collect information. Anti- emissary ware operates a lot like an anti-virus program,   and its role is to  sustain malicious spy ware (or malware) from sneaking onto your computer and  transmit your personal data. Firewall intercepts and controls traffic  amidst networks with differing  aims of trust. It    is  farewell of the network perimeter defense of an  disposal and should enforce a network security policy. By Cheswicks and Bellovins definition, it provides an  take stock trail. A firewall is a good  belongings to support strong user authentication as well as   parking area soldier or confidential communications between firewalls. As pointed out by Chapman and Zwicky 2 , firewalls are an excellent place to focus security decisions and to enforce a network security policy.They are able to efficiently log internet work activity, and limit the  characterization of an  memorial tablet. The exposure to attack is called the zone of risk. If an organization is connected to the Internet without a firewall, every  force on the private network can directly access any resource on the Internet. Or to put it as a security  incumbent might, every host on the Internet can attack every host on the pri vate network. In the Philippines, some of the businesses are employing security products, such   (prenominal) as violation detection system and firewalls, and  early(a)  inhering controls which are meant to safeguard, physically and logically, all servers and information systems, including the data stored in the systems. In Davao City, many colleges offers IT courses and one of these schools is the Holy Cross of Davao College.  both(prenominal) computer security measures used in some colleges are anti-virus, firewall, ad ware, spy ware and etc. This help to  apprehend data from viruses, unauthorized access,  ironware  nonstarter and hardware theft.Rationale of the  take upThe term Information Technology is the area of managing  technology and spans wide variety of areas that include computer software, information systems, computer hardware, programming languages but are not limited to things such as processes, and data constructs. In short, anything renders data,information or perceived knowledge in any visual format whatsoever, via any multimedia distribution mechanism, is con   sidered part of the Information Technology (IT) domain. Computer security is to prevent or detect unauthorized actions by users of the system.The protection of data stored in your computer system. The protection of data (information security) is the most important. The protection of networks is important to prevent loss of server resources as well as to protect the network from being used for  contraband purposes. The objective of this  account is to know the  direct of   sentiency and  enjoyment of all  commencement ceremony year BSIT students in terms of computer viruses, unauthorized access, and hardware failure and hardware theft.Theories and ConceptThis  take apart was anchored on the  purpose of Dynamic  cognisance  conjecture (DAT) offers an  option to explaining the  beingness of  alive(predicate)ness in distributed work groups. DAT highlights the important role of users and  genial practices in awareness creation. The theory  throw out points to the dynamic nature of awaren   ess creation Awareness emerges over time and depreciates when not being actively attended to by the users.A persons awareness is not a static  relegate which can be arbitrarily  sour on and off. It is rather a  thick build-up of information about his surroundings (Kai Riemer, Russel Haines, 2008).This theory of awareness is use to conceptualize  each(prenominal) individual of their daily awareness about what happen in their community, because awareness requires active maintenance because it diminishes over time.Independent  multivariate Dependent variableFigure 1. conceptual Framework Showing the Variables of the Study The  response of the  counterbalance year BSIT students in the  aim of awareness and  employment about computer security measures in terms of Virus,  unlicenced Access, computer hardware Failure and Hardware thievery depends with the experiencesthey encountered in their system in which it is the  posterior of the reasons for the awareness of the students.Statement of    the Problems1. What is the level of awareness of the respondents about computer security measures against the  interest threatsa.Virusb. unaccredited accessc.Hardware failured.Hardware theft2. What is the level of utilization of the respondents on computer security measures? 3. What is the most  just computer security measure by the respondents? 4. What is the least practiced computer security measure by the respondents? 5. Is there a significant  discrimination between the level of awareness and utilization of the computer security measures by the respondents? systemThe  explorees conduct this type of  investigate in order to obtain  accepted information about the computer security measures. The  searchers used descriptive assessment method in order to meet the objective of the study. To  ruck up data, the researchers use these  routines in order to  canvas the data that has been collected.Research DesignIn order to determine the level of awareness and utilization about computer se   curity measures, the descriptive assessment method of research is used. This is used by the researches because the objective of this study is to determine the level of awareness and utilization within the  initial year BSIT students without  impact them in any way. Descriptive research design exhibits specific subject and as precursor to  more quantitative studies.The  effective survey is conducted during the second semester of the year 2011-2012. The procedure used is carefully, analyzed in order to obtainaccurate information.Research  surroundingsThe researchers conducted a research to a certain private school. The Holy Cross of Davao College is  situated at Sta. Avenue Davao City. The respondents of this research are all first year BSIT students.Respondents of the StudyTo achieve the desire information, all first year BSIT students of Holy Cross of Davao College were the participants of the study. They were elect because they are not more  knowledgeable compared to the higher yea   rs. The selected numbers of respondents were expected to  occur their honest answers.Research InstrumentsIn this study, the researches use questionnaire as research instrument. It is most common instrument or tool of research for obtaining data beyond the physical  dig of the observer. trigger I of the questionnaire is the level of awareness of all first year BSIT students towards computer security measures in terms of Viruses, Unauthorized access, Hardware Failure and Hardware Theft. Part II of the questionnaire is the level of utilization of all first year BSIT students towards computer security measures in terms of Viruses, Unauthorized access, Hardware Failure and Hardware Theft.Data  meeting place ProceduresIn gathering data procedure, first the researchers conceptualized what study to conduct and arrived to a research  appellation Level of Awareness and  use of goods and services of All First Year BSIT students about Computer Security Measures. The research title was approved    by the research advisor with the panel of examiners. After the approval of the title, a questionnaire was established to answer the research study was validated.Data AnalysisThe following statistical tools were employed to answer pertinent problems of the study, as followsFrequency Count This tool was used to count the number of items of the respondents who are aware and unaware about the computer security measures and its utilization.Weighted Mean The weighted mean is similar to an arithmetic mean (the most common type of average), where instead of each of the data points contributing equally to the  terminal average, some data points contribute more than others. The notion of weighted mean plays a role in descriptive statistics and also occurs in a more  planetary form in several other areas of mathematics.  
Subscribe to:
Post Comments (Atom)
 
 
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.