Saturday, May 11, 2019

Internet Security Essay Example | Topics and Well Written Essays - 1000 words

Internet Security - assay ExampleIn this report, section one will throw light upon both main problems that may usually affect a figurer without certificate pluging and viruses. The next section will comp ar two dissimilar types of security programs that throne be employ to harbor the computer. The last part will cover the advantages and the disadvantages of the proposed solutions in this paper.__ Hacker is a person who breaks into computers. Hackers have the ability to access either file or personal information from their own computers to other substance abusers. One of the most people who are adapted to hack any user are the computer scientist, but that does not mean that others are not able because at the end hacking depends on practicing and knowing all the strategies. With this information, users must use an internet security to protect their computers from any hackers to access their computers and hack it. However, that does not mean that only hackers can destroy any user computer but even emails or websites may contain viruses.Desktops and laptops can be at pretend without any security program and there are unalike types of protection programs that can be used to protect computers. ... ktops and laptops can be at risk without any security program and there are incompatible types of protection programs that can be used to protect computers. Anti-Virus is software that protects computers from any virus that can occur from downloading files. However, this program can be made by human beings. Many programs can detriment the computer in different ways such(prenominal) as Malware, Trojan Horses, Viruses, and Worms. Antivirus software is the most recyclable way to protect a computer from any harmful viruses. Laptops develop every year and different anti- virus programs are able to be downloaded for the protection of the laptop. However, whatever of the websites have certificates to tell how secure is the website for the users to tone confident to use it. In addition to this, most of the websites that the user has to check for the secure certificate are the shopping websites because they might contain a type of virus to save their personal information such as the credit card information. At this point another important point will be highlighted, which is data transmission which is the physical transfer __ data from one point to another. These data transmissions consist of different channels which are copper wires, wireless, storage media, and optical fibres. These types which a user can share any data with others but there is a security code that can be used for some of them like wireless a security pin number can be set up. This security pin has to be used so no one can access through the users computer without their permission. 2. Finding new programs to avoid the IT security comparing two best security programs2.1 FirewallFirewalls are a software program that has the ability to block unsecured ports on the laptop. There are three different types of firewalls stateful

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.