Saturday, January 25, 2020

Computer Security And The Threat Of Hacking Computer Science Essay

Computer Security And The Threat Of Hacking Computer Science Essay Computer security is a safety operating system that is an important feature to install on a computer. It ensures safety and protection from unknown users and threats. If a safety operating system is weak, unknown users, or hackers, are able to break into the database and install harmful viruses, as well as steal personal information. Computer security and hacking can have both disadvantages and advantages. Computer security has evolved from early on to being a key component to own. Hacking, as well as computer security, has developed into a more harmful and dangerous activity. Currently, security programs have been developed to stop hacking and viruses from encroach onto a users computer. Computer security and hacking have had impact on society today, globally and locally. Users use computer security to their benefit when keeping personal information stored on their database. Hacking can destroy a users identity, or possibly their reputation. Businesses and organizations have benefit ed from security, by its protection of information and protection from outside harm. Hacking can be used as a good way to check a computers sustainability to dangers through networks and the internet. Computer security and hacking are two important issues discussed and recognized today. Computer Security is an important element of safety precaution when using a computer. These operating systems run on computers to ensure the safety of personal and financial information, along with protection. Computer security can be a very useful component to acquire [1]. If an unknown user tries to access a computer database, computer security will ensure that that user will not be let in [2]. Besides keeping unknown users out of others computer databases, computer security also provides protection from harmful threats and viruses. Once these viruses find their way onto a users computer, information and control access can be stolen [3]. There are significant advantages and disadvantages of having a strong computer system, one advantage being protection from viruses and other harmful attacks [4]. Hacking has found its way into the world of computers. Hacking can be destructive, harmful, and can have some bad impact on peoples lives. If a computer system is not protected by a security operating system, hackers can find their way into that database easily. Once in, hackers can obtain personal, financial, and important information [5]. This can cause ruin in a users business and personal life, and much more. While being branded a bad thing, hacking can help many as well. Some hackers are able to test the reliability of a computers security system, to find weak spots in the barrier [6]. Like computer security, hacking can have both costs, but benefits too [2]. The purpose of this report is to allow computer users to gain insight on the aspects of computer security and the ethical issue of hacking. Computer security can allow users to feel comfortable knowing their personal information is being kept hidden. But even with a high-level computer security system, one is still vulnerable to a hacking intrusion. A computer users private information, such as social security, credit card numbers, passwords, email addresses, and other information is at risk to being taken. There are a number of objectives covered in this report. First, computer security is used to keep personal, financial, and other private information kept confidential. Second, computer security blocks viruses and attackers from encroaching on ones computer. Third, even with this security, one is still susceptible to a hacking attack. And lastly, hacking can be easily hurtful, but could in some cases be just as helpful for users. The main contents of this report include computer security, and the issue of hacking. Computer security is described as a protection technique for personal information, and for blocking unwanted threats from the internet. Hacking is described as being a harmful way to obtain information from other users databases. Viruses and threats are each described in order for other users to know the differences between them all. Also in this report are ways to check a computers security and ways to keep it protected from harm too. 2 Background 2.1Computer security is an operating system used on computer databases to protect and provide safety to users. Besides preventing unauthorized access, computer security provides protection for personal, financial, and classified information [1]. One type of this security system requires a validation of a username and password provided by the user, in order to gain access into the computer database [2, pg.267]. Besides validating who the user is, it also confirms that the user is not trying to attempt an unlawful operation [2, pg.31]. As shown in Figure 1, computer security requires a key, or username and password, in order to access the database. Many businesses and organizations have benefited greatly from this operating system, because it allows their private information to stay confidential and secret [1]. http://comtrec.com/wp-content/uploads/2010/05/Computer-Internet-Security.jpg Figure 1 Picture representing the security operating system, with the binary representation inside a computer. Computer security had begun physically in the 1950-60s. Computer systems then were guarded by security officers, to stop the attempt of gaining unauthorized access. Later on in the 60s and 70s, access could be granted over telephone lines, which caused a change in the way computers were externally guarded [2, 266-7]. By the 90s, companies sprang up to provide a more modern way of securing computer systems. Secure Sockets Layer (SSL) was developed by Netscape Communications, (which was an early web browser) to get secure transfer of info when buying online. By 1999, the Transport Layer Security (TLS) had been developed, and was very similar to the Secure Sockets Layer, but with a few important improvements [2, 350-1]. Hacking can be defined as the encroachment of ones personal or business computer system by an outside source [7]. Hackers, or the outside sources encroaching on the personal computer, can have many motives to these intrusions. Some hackers have admitted to only wanting to enjoy the challenge of overcoming a security system [8]. Other hackers have admitted to wanting private or financial information for their own personal gain [7]. There are different ways a computer can be hacked into. These ways include: through downloads, internet-based programs, and through fraud emails. Through these, hackers can plant viruses and attacks which make it possible to overcome a security system [3]. A hacker has had many definitions from early on. In the Middle Ages, a hacker was in the business of creating tools known as hoes. Later on into the 17th Century, a hacker had become a strong worker that handled a hoe. Today, a hacker has nothing to do with an actual tool, but is capable of being a strong worker, when it comes to intruding upon anothers computer system [2, pgs.657-8]. The earliest form of hacking was known as phreaking. This involved hacking using telephone lines [9, pgs.12- 13]. 2.2There are a number of advantages and disadvantages when it comes to computer security. Some advantages include: greater storage space, resource and file sharing, an increase in cost efficiency, and security of private information. Some disadvantages include: the expensive cost, it could have a number of weak spots, and some security issues [4]. Hacking has some important costs and benefits when it comes into play. Some costs include: the owner loses control over his or her information, harmful viruses and threats on users computers, and loss of data either being intentional or unintentional by hacker. An important benefit is ethical hacking, because users can determine where the weak spots in their system are [2, pg.659]. 2.3 There are some theories to deciding whether hacking can be good or bad. In some ways, it can be dangerous, hurtful, and devastating. Many can lose their personal information, such as social security, credit card numbers, emails, addresses, and much more, and can be left with nothing. In some ways, hacking could be a good thing. This is true because many hire ethical hackers to test their computers security strength to find weak areas in their systems. It is an undecided theory, because hacking can be labeled good and bad, and each argument can be supported [2, 659]. 2.4 A class for viruses, threats, worms, Trojans, spyware, and other forms of attacks is known as malware. [7]. A small portion of software that can enter a users computer secretly and in other easy ways is known as a virus. Trojans are similar to a virus, but different in the fact that once installed, it allows the Trojan horses creator the ability to see everything on the users computer. Spyware is capable of being installed within a users database with or without the user having knowledge of it [3]. These types of threats and attacks are hidden within programs that come as fake emails, internet-programs, and downloads. Figure 2 below demonstrates all the different types of harmful threats that can be uploaded onto your computer by hackers. http://www.dreamstime.com/computer-and-network-security-hand-thumb4123007.jpg Figure 2 This is a collection of all the different types of viruses and threats that can be harmful for a users computer. 3 Computer Security and Hacking 3.1Society has been impacted by computer security in a number of ways. Computer security ensures users that their personal, financial, and other information will be kept secret from the eyes of others. It impacts businesses and organizations by keeping their confidential data safe from view and harm and helping them in staying successful [1]. It allows users to share files and resources, an increased amount of storage space, and an increase in cost efficiency [4]. As well as protecting information, computer security has impacted users and their computers from nasty viruses, threats, and malware as well [3]. Computer security is an important piece of technology that has impacted society since its beginning. Hacking is impacting society today in many ways. Hacking impacts users by taking their personal information, and could possibly display it over the internet [7]. It is causing an increase in cost for companies and organizations to fix their computer systems after a security breach, and to obtain better security. There has been recent documentation dealing with an increased amount of threats found in web sites that can easily be uploaded onto databases. [10]. Hacking impacts businesses and organizations if these do not have a strong security system. Hacking can have a number of impacts on society, especially taking personal information from other users [5]. 3.2 Computer security involves another component, called a firewall. This component, software or hardware, is made to block unwanted threats and viruses from a users computer. A firewall is used to prevent the intrusion of hackers, viruses, and many other threats from gaining access and information onto a computer [11]. An example of a strong firewall that provides protection and dependability is the Cisco PIX Firewall [10]. A well-known security system used by many is called Symantec. Symantec had originated in 1982. It has become the worlds largest software company, with business internationally, and with over 17,000 workers. Symantec ensures security of the computer, its infrastructure, and all the components within it. Symantec has a research lab where new technologies are developed to ensure even more security [12]. Norton AntiVirus is Symantecs current security program. Norton provides safe networking, protection online, and a scanner to check for viruses and threats. Norton is a very trusting program, because it ensures safety for users and for their computers. Figure 4 is a picture of the program Norton AntiVirus. Figure 5 represents the Norton program at work. This main screen alerts the user if their system is not secure, and what types of protection the user would like to be on or off. [12] http://www.amitbhawani.com/blog/wp-content/uploads/2010/06/Norton360-Box-Package.png http://www.windows7hacker.com/wp-content/uploads/blog/DownloadNortonAntivirus2010BetaonWindows_E88F/NewNortonAntiVirus.png Figure 3 Picture of the Norton Figure 4 This figure represents the Norton AntiVirus program AntiVirus main screen 3.3 Even though hacking is labeled as dangerous, some have found hacking to be a blessing. Some computer users hire ethical hackers, which are those who imitate an actual attack onto a users computer system, in order to test that computers security system and its blocking power. While imitating this attack, ethical hackers are also looking for weaknesses within the system, and what could be stolen in a real hacking attack [6]. Another way to check a networks security is by sending a vulnerability scanner over the computer. Like ethical hacking, a vulnerability scanner will check for weaknesses in the security, and will increase the security as well. Besides scanning for weaknesses in the security wall, users should consistently be checking their computers for any type of threats or attacks. If these threats or attacks are not resolved, all types of malware could corrupt the database [10]. 4 Conclusion Computer Security is described as being a protection mechanism for computer databases. This mechanism can come in different shapes, styles, and forms [1]. One of the types of computer security is a validation code. The user of the computer must provide his/her own username and password to access the database [2]. Another type is AntiVirus security, such as Norton AntiVirus by Symantec. This program will provide protection from harmful threats and viruses, and hackers as well [12]. Computer security has provided many with comfort knowing that their private and financial information will be kept safe from other eyes on their computers. Big companies and organizations have benefited from computer security, because with it they have a comforting feeling that their important information will be kept safe [1]. Hacking is a dangerous and unfortunate activity that occurs on vulnerable computers [7]. Hackers find their way into other users systems, and depending on what they want, credit card numbers, social security, or anything of the like, they are likely to succeed in getting [5]. Hackers can plant harmful viruses and threats into a users system with or without that user knowing [7]. It can be a very upsetting and unlucky event to happen, because users are susceptible to having their personal information stolen or revealed to the public [2, pg.659]. But in the light of things, hacking could be a good thing for some users. Ethical hacking can be a useful method for checking a computers security barrier. It finds the weak spots that a computer hacker, virus or threat could enter the database through [6]. There are ways to improve computer security and to keep hackers and viruses out of computer systems. Ethical hacking could be a method used to find the vulnerable areas in the security, which would inform the user that better security is needed [6]. Similar to ethical hacking, a vulnerability scanner runs over the system scanning for weak spots, and improves security too [10]. Certain antiviral programs could be purchased and installed to increase security. Such programs as Norton AntiVirus will alert the user of any threats, scans the system, and will keep a computer safe [12]. There are conclusions Ive drawn from researching computer security and hacking. First, computer security is a very important component to have on a computer. Businesses and companies have impacted from it, because they are able to keep valuable information stored on their computers. Without it, users should not be on the internet or network at all. Hacking can be a very uncomforting and hurtful activity to users and their computers. Users can have their private and financial information taken from them, as well as being made public. There are many types of viruses and threats that can harm users computers, especially the ones thought to be low risk. The reason I drew these conclusions is because they are important things to know and understand. If one is naÃÆ'Â ¯ve to the risks of the internet and hackers, their computers, as well as themselves are in peril. There are some issues that I would like to address in future studies. I would like address the issue of weak spots in a computers security. I would like to see this security to not have these weak spots, and to fix them before using them on computers. Second, I want users to realize how dangerous it is to not have a computer security operating system, before they find it is too late. I would like to see programs such as Facebook and MySpace not allow users to put as much information as they allow now. Because of this displaying of information, many are susceptible to danger. I would like these issues to be addressed in future studies.

Friday, January 17, 2020

Nursing Practice Act Essay

I came to realize just how fare we have come. My article includes information on the scope of practice for the nursing profession. The’re alson many different responsabilities of nurses, and the exams and prcedures they go though to become licensed are something else. There are a lot of things that a person can do to lose their license. The’re are also many avenues you can take in nursing, there are a lot of opertunities to grow. The definition of Nursing Practice is to provide individuals and groups with nursing care requiring specialized knowledge, judgment, and skill derived from the principles of biological, physical, behavioral, social, and nursing sciences. A nurses scope of practice focuses on identifing patterns of human responses to actual or potential health problems amenable to a nursing regimen. They are to execute a nursing regimen through the selection, performance, management, and evaluation of nursing actions, assessing health status, and to provide health counseling and health teaching. The scope of practice includes administering medicatons, treatments, and to execute regimens that are by authorized personal. The scope of practice also includes teaching, administering , supervising, delegating, and evaluating nursing practice. The standards related to the RN’s responsibilities in implementing the nursing process and as a member of the nursing profession is to be knowledgable in your work, always use the best possible route, and always make informed decisions. An advanced practice nurse is a registered nurse who has been certified under a certain chapter to practice in a certain field, by the board of nursing. They have certified registered nurse anesthetist, clinical nurse specialist, certified nurse- midwife, and certified nurse practitioner. Nurse practitioners have to also obtain prescriptive authority, which grants them the authority to prescribe medication. The nursing licensure requirements for a new graduate is first to send in an application for the licensure. The application has to include evidence that the applicant has completed requirements of a nursing education program approved by the board or approved by another jurisdiction’s board that regulates nurse licensure. The application will also include information requied by the board. There will be an application fee required by section 4723. 08 of the revised code. You also have to pass a background check that was brought into effect after June 1, 2003. The board of nursing may revoke, suspend or refuse to grant a nursing license, if a person is found by the board to have committed fruad in passing an examination required to obtain the license. A nurse can also have there license suspended or revoked if caught selling, giving away, or administering drugs or therapeutic devices for other than legal and legitimate therapeutic purposes. To renew a license that was issued for a two-year renewal period you have to have 24 hours of continuing nursing education. At least one hour of the education must be directly related to the statutes and rules pertainig to the practice of nursing in this state. The law and rule that sets the requirements for schools of nursing is section 4723. 07. Section 4723. 07 explains the different precedures and precautions that have to be taught to maintain proper sanitation and cleanliness. Handeling and disposal of needles and other sharp instruments. Wearing and disposal of gloves and other protective garments and devices. All in all the responsibilities of the Ohio state Board of Nursing is to assume and exercise all the powers and perform all the duties required of it by chapter 4723. In the nursing world everything has to go through the Board of nursing and they decide everything by vote. The board of nursing follows specific guidelines that are all mentioned with in the Nursing Practice Act and it is constantly changing. To continue on into advanced practice nursing you have to aquire your masters degree. It is also illegal to call yourself an RN with out being licensed but the board of nursing. The Nursing practice Act is where you want to look to find out what you have to do to get certain licenses and certifications.

Thursday, January 9, 2020

Justice Age Or Actions - 1643 Words

Justice: Age or Actions? In our society, a juvenile is eligible to vote at the age of 18, allowed to drive in some states at the age of 16, and permitted to drink at the age of 21. Therefore, it is logical to determine that a juvenile under the age of eighteen is mature enough to be charged as an adult when they commit violent crimes (Chiou, 131). According to the Justice Department, about ten percent of homicides occurring in the United States are committed by juveniles under the age of eighteen (abcnews.go.com). When the question of whether or not juveniles who commit violent crimes should be tried as adults arises, debates always surface. The debaters have a difficulty resolving this conflict because there are multiple perspectives on†¦show more content†¦Meanwhile, in a juvenile court, the delinquent has a â€Å"fact-finding hearing† and the amount of time the juvenile spends in a juvenile detention facility is determined by a single judge (www.lawcollective.org). The juveniles who commit ted violent crimes acquire an understanding that violating the law and harming people is not taken lightly. Allowing the young adult to speak in front of a jury on their own behalf provides opportunity for the public to determine if sentencing a dangerous juvenile to an adult prison will be beneficial to their safety. Furthermore, with adult crime comes adult sentence. When adults are found guilty of murder, there are certain states, such as Texas, that allow the criminal to receive the death penalty, therefore, when juveniles commit murder, a life is still lost. Conversely, there are people who say that the violent behavior children demonstrate is caused by their life experiences with poverty. As support of this belief, Don Boys declared, â€Å"However, poverty does not cause crime; crime causes poverty. Juveniles, like adults, commit crimes because they choose to do so. And they must be held accountable.† (www.chattanoogan.com). This is true because if a juvenile and an adu lt were to undergo the same life issues, and both commit murder, both should receive the same consequence. When an adult murders or rapes, the jury does not sympathize with the criminal

Wednesday, January 1, 2020

Industry Analysis the Five Forces - 6821 Words

Purdue extension EC-722 Industry Analysis: The Five Forces Cole Ehmke, Joan Fulton, and Jay Akridge Department of Agricultural Economics Kathleen Erickson, Erickson Communications Sally Linton Department of Food Science Overview Assessing Your Marketplace The economic structure of an industry is not an accident. Its complexities are the result of long-term social trends and economic forces. But its effects on you as a business manager are immediate because it determines the competitive rules and strategies you are likely to use. Learning about that structure will provide essential insight for your business strategy. Michael Porter has identified five forces that are widely used to assess the structure of any industry. Porter’s†¦show more content†¦Reducing the Bargaining Power of Suppliers Most businesses don’t have the resources to produce their own inputs. If you are in this position, then you might consider forming a partnership with your supplier. This can result in a more even distribution of power. For instance, Dell Computer uses partnering with its components suppliers as a key strategy to be the low-cost/high-quality leader in the market. This can be mutually beneficial for both supplier and buyer if they can: †¢ Reduce inventory costs by providing just-in-time deliveries, †¢ Enhance the value of goods and services supplied by making effective use of information about customer needs and preferences, and †¢ Speed the adoption of new technologies. Another option may be to increase your power by forming a buying group of small producers to buy as one large-volume customer. If you have the resources, you may choose to integrate back and produce your own inputs by purchasing one of your key suppliers or doing the production yourself. Factors Affecting the Bargaining Power of Suppliers Suppliers have the most power when: †¢ The input(s) you require are available only from a small number of suppliers. For instance, if you are making computers and need microprocessors, you will have little or no bargaining power with Intel, the world’s dominant supplier. †¢ The inputs you require are unique, making it costly to switch suppliers. If you use a certain enzyme in aShow MoreRelatedPorters Five Forcesï ¼ a Model for Industry Analysis-2porters Five Forcesï ¼ a Model for Industry Analysis-21752 Words   |  8 PagesPorter s Five Forcesï ¼ A MODEL FOR INDUSTRY ANALYSIS-2 (2006-04-27 16:38:39)[pic]è ½ ¬Ã¨ ½ ½ IV. Supplier Power A producing industry requires raw materials - labor, components, and other supplies. This requirement leads to buyer-supplier relationships between the industry and the firms that provide it the raw materials used to create products. Suppliers, if powerful, can exert an influence on the producing industry, such as selling raw materials at a high price to capture some of the industry s profitsRead MorePorters Five Forces Analysis Of The Brewing Industry1421 Words   |  6 Pagesconsumption, and as such, is a fascinating industry to follow. By analyzing large and medium-sized brewers, we intend to provide an analysis of the current brewing industry, covering the topics of 1) Industry Structure and Attractiveness, 2) Key Success Factors and Influencers, 3) Environment and 4) Porter’s Five Forces. Our focal firm throughout the analysis will be the Boston Brewing Company. Industry Structure and Attractiveness Our definition of the brewing industry includes â€Å"alcoholic beverages madeRead MoreFive Forces Analysis of the Swedish Construction Industry1281 Words   |  6 PagesFive Forces analysis of the Construction Industry in Sweden â€Å"The authors conclude that the less competitive a market environment, the higher will be the amount of corruption by giving public servants the incentive to extract some of the monopoly rents through bribes.† (Lambsdorf, 1999) Industry background: The Swedish construction business consists of four main actors namely JM, NCC, PEAB and Skanska that historically have had exclusive rights to bid on large-scale governmental projectsRead MoreFive Forces Analysis of the Video Game Industry943 Words   |  4 PagesFive Forces Analysis of the Video Game Industry The video game industry is the economic sector involved with the development, marketing and sale of video and computer games. It includes video game consoles, game software, handheld devices, mobile games and online games. The video gaming industry has been growing exponentially in recent years with Sony, Microsoft and Nintendo competing for the higher profits in the market. This essay will analyze each of the five forces acting on the industry:Read More. Soft Drink Industry Five Forces Analysis:1734 Words   |  7 Pages. Soft Drink Industry Five Forces Analysis: Soft drink industry is very profitable, more so for the concentrate producers than the bottler’s. This is surprising considering the fact that product sold is a commodity which can even be produced easily. There are several reasons for this, using the five forces analysis we can clearly demonstrate how each force contributes the profitability of the industry. Barriers to Entry: The several factors that make it very difficult for the competition toRead MoreThe Evergreen Five Forces Framework For Industry Analysis1804 Words   |  8 PagesAlthough as wanted by our teachers, this essay will be focused on the evergreen five forces framework for industry analysis set up by Mr. Michael Porter to ascertain the desirability of an industry along with its usefulness and limitations in the formulation of various strategies but first and foremost I’d like to throw some light on this very enlightened being, Mr. Porter, whose name is taken at least twice every lecture we attend (Not forgetting that the first two were totally on him only!). WhyRead MoreFive Forces Analysis of Retail Car Industry1840 Words   |  8 PagesModule Code: PICS01C Student Number: 7305-272-8 Due Date: 15 March 2011 [pic] a) Five-forces diagram for analysis of the retail car industry in the greater Johannesburg area 1. Competitive Rivalry Competitive rivalry exists between companies with the same or similar products/services and similar markets. Factors to be considered include: †¢ The number and size of competitors †¢ The rate of industry growth †¢ Differentiation and switching costs †¢ Fixed costs or perishable productsRead MorePorters Five Forces Model for Industry Analysis3909 Words   |  16 PagesThis essay is an attempt to apply the Five Forces Model for industry analysis and business strategy development formed by Michael E. Porter of Harvard Business School in 1979 that draws upon industrial organization (IO) economics to derive five forces that determine the competitive intensity and therefore attractiveness of a market. Within the ambit of Porter’s typology, this essay aims to analyze the attractiveness of industries for investment and seeks to identify their potential for change orRead MoreGlobal Clothing Industry Overview And Five Forces Analysis776 Words   |  4 PagesClothing Industry overview and five forces analysis From 2005 the liberalization textiles and clothing industry, the exports of this industry increased from 480 $ billion to 709 $ billion until 2012. (WTO.2005, 2013) The textiles and clothing industry accounts for a 4 per cent share in global merchandise exports. (The ILO, 2014) Garment industry has particularly characteristics, which selectivity and pertinence at production and market. (Adhikari, R. Yamamoto, Y. 2007) Garment industry providesRead MorePorter ‘Five Forces Analysis’ for the Banking Industry in Ghana3902 Words   |  16 PagesUndertake a Porter ‘Five Forces Analysis’ for an industry with which you are familiar (1000 words). Introduction This essay is aimed at analyzing Porter’s five forces for the banking industry in Ghana. It gives a brief introduction to the industry and provides a detailed application of the five forces to the industry. Porter’s Five Forces Analysis in the Ghanaian Banking Industry â€Å"Competition for profits goes beyond established industry rivals to include four other competitive forces as well: customers