Verified Document

Protection Of Computer Systems Essay

System Security and Internet Privacy Personal computers have become an important component of today's society given their role in helping stay connected with the contemporary world. Actually, computers are currently used for a wide range of purposes and across a variety of settings. Consequently, computers are used to keep personal information, which implies that they have become critical parts of everyday life. However, the use of computers requires ensuring privacy in order to guarantee the security of information. Computer users are constantly faced with the need to ensure the security of their systems through implementing various measures towards systems security.

System Security

I have just received a new computer for my home environment and can easily connect to the Internet and perform some online banking through the already existing Internet Service Provider. However, I need to ensure systems security in order to promote security of personal information, especially banking information. The first step towards ensuring the system remains as secure as possible is configuring my network in a manner that promotes privacy. This is primarily because connecting the computer to the Internet implies that it is connected to millions of other online users, which enhances vulnerability to hackers and attackers.

The configuration of the network would entail configuring the router's settings through consulting the user's guide. Once the predefined IP address or URL has been identified, I will configure the network to utilize WPA2-AES encryption for confidentiality of data and change the default login information (Kent & Steiner, 2012). This process will be followed by filtering Media Access Control (MAC) address to identify computers connected to the network. The final step in configuration of the network will be changing the default SSID of the network in order to prevent access by any unauthorized persons. The browser privacy settings that I will use in the system include appropriate tracking settings,...

The firewall is usually enabled and configured in the operating system that comes with the Operating System. Since the computer came with Windows 10 operating system, it has a software firewall that needs to be enabled to control the flow of information. The firewall settings I intend to use for the system will include turning on Windows firewall, blocking any incoming connections as well as those in the list of permitted programs, and providing of notifications when it blocks a new program.
Given that the option of turning on Windows Firewall is selected by default in Windows 10, many programs are prevented from communicating through the firewall. However, I'll create a list of allowed programs that can communicate through the firewall. This will help in ensuring that certain programs are allowed to communicate through the firewall while most programs are prevented. Blocking all incoming connections will help in preventing unwanted attempts to connect to the computer. This firewall setting will be used because it provides maximum protection to the computer, especially when a worm is spreading throughout the Internet. Even though the setting does not allow the provision of notifications when blocking incoming connections, most of the basic online activities like viewing websites and sending and receiving emails will still be carried out. The third firewall setting will entail enabling notifications when the firewall blocks a new program. This is essential because it will provide the option of unblocking that program so that wanted programs can still be used in the system.

The third system security feature is the…

Sources used in this document:
Reference

Kent, J. & Steiner, K. (2012). Ten Ways to Improve the Security of a New Computer. Retrieved from United States Computer Emergency Readiness Team website: https://www.us-cert.gov/sites/default/files/publications/TenWaystoImproveNewComputerSecurity.pdf
Cite this Document:
Copy Bibliography Citation

Related Documents

Computer Systems Are Used, One Has to
Words: 2506 Length: 8 Document Type: Article Critique

computer systems are used, one has to delve a bit deeper into how those issues occur and what they mean for the people who use computers. Addressed here will be a critique of two articles addressing DNS attacks and network intrusion detection, in order to determine the severity of the issues these attacks are causing and what can be done in order to lessen the risks and protect the

Computer Systems and Computer
Words: 1079 Length: 3 Document Type: Research Paper

TMP (Trusted Platform Module) is an international standard dedicated to secure hardware by integrating the security cryptographic keys into hardware devices. In other words, the TMP is a secure cryptoprocessor integrated into the computer motherboards enabling full disk encryption without using extremely long paraphrases. When a user buys a personal computer, the TPM is built into the computer's motherboard with the goal to offer security into the computer systems

Computer Systems Are Increasingly Being Used to
Words: 1916 Length: 6 Document Type: Essay

computer systems are increasingly being used to cause widespread damage, with nation-states or individuals sponsored by nation-states making use of malicious codes to compromise 'enemy' information systems. In essence, cyber warfare has got to do with the attack on the information networks, computers, or infrastructure of another entity by an international organization or nation-state. In the context of this discussion, cyber war will be taken as the utilization of

Computer Security: Corporate Security Documentation Suitable for
Words: 5280 Length: 19 Document Type: Essay

Computer Security: Corporate Security Documentation Suitable for a Large Corporation Item (I) in-Depth Defense Measures (II) Firewall Design (III) Intrusion Detection System (IV) Operating System Security (V) Database Security (VI) Corporate Contingency of Operation (VII) Corporate Disaster Recovery Plan (VIII) Team Members and Roles of Each (IX) Timeline with Goal Description (X) Data Schema (XI) Graphical Interface Design (XII) Testing Plan (XIII) Support Plan (XIV) Schematics Computer Security: Corporate Security Documentation Suitable for a Large Corporation (I) In-Depth Defense Measures Information Technology (IT) Acceptable Use Policy The intentions of

Computer Security Briefly Support Your
Words: 2728 Length: 8 Document Type: Term Paper

The public-key cryptography approach also creates a more efficient means of cryptographic security by ensuring RSA-compliant encryption and decryption throughout the secured network (Sarkar, Maitra, 2010). As a result the use of public-key cryptography hardens and makes more secure each connection and node on a network (Chevalier, Rusinowitch, 2010). C3. What will help you trust a public-key that belongs to an unfamiliar person or Web site, and why does it

Computer Viruses: A Quantitative Analysis
Words: 2542 Length: 10 Document Type: Term Paper

This report will hopefully pull together the research available with regard to this issue, and also identify what users are most at risk for virus attacks. The research currently available also confirms that modern viruses are becoming more insidious and complex, with the potential to incur more damage to computers and data than in the past. Studies suggest that newer versions of viruses may escape detection using standard anti-viral software.

Sign Up for Unlimited Study Help

Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.

Get Started Now