The connectivity of a computer to other of networks that allows communication with other computers presents many risks to the computer. According to Kallol Bagchi, (2003), internet security involves mechanisms and procedures taken to protect and secure files and data in the computer connected to the internet against intrusion by other internet users. The internet being insecure mediums of exchanging information presents high-risk attacks which results in loss of data or files, destruction of computer software or access of information by unwanted or unknown computer users. To protect the transfer of date via internet several methods such as encryption have been employed. (p. 686)
Essays on Information Technology
Argumentative Essay on How Has Technology Changed Communication Practices
Information technology is one of the most dynamic factors in the world today. New developments in this field are made everyday. The world today may not imagine life without gadgets such as the mobile phone, computers, internet, motor vehicles, and marine equipment among others. All these items have been made available due to influences of technology. Information technology has had many influences in the world today. The most profound impacts that information technology has impacted very much is in the area of communication. This article focuses on the ways in which the telephone has changed communication in the last ten years.
Research Paper on Information Security
Security management is a wide subject of management associated to assets control, human resources, as well as physical securities safety operations. It comprises the marking of a company’s data assets and the documentation, growth, and execution of regulations, steps, standards, and outlines. In network control, it refers to the set of operations, which protects systems and telecommunications links from illegal access by individuals, organizations, acts, or effects and they entail a number of sub functions like developing, controlling, and deleting security services and approaches. This also involves allocating security-significant data, presenting essential incidents, managing the allocation of main items and authorizing users’ access, privileges, and rights. A virus scanner is a form of antivirus program with the ability of searching a system to detect virus signatures. These detected virus signatures normally attach themselves to executable applications and programs like e-mail clients. Consequently, a virus scanner has the ability of either searching all the executable programs during the period when the system has been booted or scanning a file. File scanning is important in the sense that viruses can also change the data or the information in the file (Burns, 2007).
Computer Forensics Essay
Computer forensics is a growing branch in the field of computer science and information technology. Occasionally, organizations, big or small, would require an audit of their information systems (Carrier, 2005). This is where the computer forensic experts come in.
This paper is meant to give a clear understanding of some of the tasks involved in computer forensics. Description of activities and tasks involved in investigation, documentation as well as reporting has been captured in the paper. The last part of the paper is a brief analysis of expert witness’s challenges as well as a sample courtroom scenario.