Get Instant Help From 5000+ Experts For
question

Writing: Get your essay and assignment written from scratch by PhD expert

Rewriting: Paraphrase or rewrite your friend's essay with similar meaning at reduced cost

Editing:Proofread your work by experts and improve grade at Lowest cost

And Improve Your Grades
myassignmenthelp.com
loader
Phone no. Missing!

Enter phone no. to receive critical updates and urgent messages !

Attach file

Error goes here

Files Missing!

Please upload all relevant files for quick & complete assistance.

Guaranteed Higher Grade!
Free Quote
wave
Computer Information System Security: Enhancing Protection Against External Threats

Abstract

Through learning about Computer Information System Security, interested individuals shall be able to:

  1. Highlight Information Security triad,
  2. Identify and comprehend the high level basic concepts connected to security information tools,
  3. Digitally secure one’s own computer.

There’s an upcoming comprehension on the complicated nature of the computer security for individuals and organizations. This complexity has been prompted by advancement of hacking techniques and computer systems in general. Therefore, it has become necessary to come up with ways in which systems can keep track of external threats and proving information pertaining to the attacks and probable ways of thwarting those attacks. Quantitative research methods will be used and some of the simulation tools that will be used include Topgen, and Greybox. The expected results include to fasten the response to threats within minutes thus reducing the feedback time of the corresponding authorities in related threats, and advanced automatic threat acknowledgement will be implemented for optic cameras essentially to realize exact and thorough automatic recognition.

Computers and various digital gadgets are considered vital to business and other income generating activities. Consequently, more compromises on hacking these computers have been increasingly witnessed. Therefore, for a personnel or organization to engage any computing gadget fearlessly, they must be certain on particular device not being complicated and that all communications must be secure (Li, 2012). Information security triad must therefore be reviewed and it entails;

  1. Confidentiality where an access is only restricted to particular permitted individuals.
  2. Integrity where the information given truly shows its intended meaning.
  3. Availability where information can be easily traced by authorized personnel when need arises.

Motivational factors for security systems include;

  1. The threats are vivid and available. This makes it necessary for companies to engage cyber security to sidestep attack of sensitive data.
  2. Driving experts to a life of curbing cyber-crime thus provides potential for adjustment.
  3. Maintaining high cyber security talented employee thus resulting to job satisfaction and favorable satisfaction.
  4. Consistency in surveillance aimed at trapping hackers is a motive.

Since computing resources have become core part of business activities, they have also become a target of criminals.  Companies should be focused with the means to secure their resources.

The research method that will be used to facilitate the study of computer security architecture will be quantitative in nature since the experiment research designs will be embraced to gather the necessary data. This method is apposite for the research on the grounds that it will impel theory testing, including explanation of new phenomenon pertaining to computer security architecture. Also, experimentation plays pivotal roles in solving practical problems, and in determining the impact caused by a specific phenomenon. 

The proposed model will be implanted through pilot implementation method. This method is appropriate on the grounds that it minimizes risks that can be elicited by ineffective model of system features. Besides, the pilot group can be trained easily (Parfiryev et al., 2019). It is essential to note that security of information systems is an important factor in an organization and can lead to several issues, including data breach. Therefore, it is important for the new model or features to be implemented in a particular section within an organization as opposed to the entire sections at once. In this context, the selected companies will be required to test the new model and give feedback which aids in identifying problems of the model and fixing them accordingly before implementation.

The simulation will be performed by several tools including Topgen, Greybox and ghosts. Topgen tool assists in training networks, and it permits a single virtual machine to deliver various co-hosted virtual application-layer services; for example DNS views. While the greybox is used to simulate internet infrastructure and it augments users’ experiences by permitting integration of peer-to-peer software. The ghosts perform tasks like human beings and they can simulate users’ slipups that contributes to vulnerability of computer systems (Mayes, 2019). In additional to the three provided tools, vTunnel will be also used in simulation. This tool assists in getting rid of the particular network activities; therefore preventing some individuals from seeing particular network traffic. It conceals every single administrative activity that could otherwise interfere with users’ attention during the training course. This makes it possible for the users to concentrate on the simulation event. It also offers an opportunity for the guests to keep in touch with the management networks, while simultaneously preventing the participants from keeping track of the in-game networks (Mayes, 2019). Welle-D and TopoMojo will also be utilized in the simulation and the former will impel configuration of wireless access points. The latter tool i.e. TopoMojo is made up of lab player and builder. The lab player enables individual to access available labs (Mayes, 2019). In a nutshell, this tool enhances collaboration among the participants. Therefore, the discussed six tools will help in simulation and they are apposite in this context.     

The experiment will follow a scientific method that entails a series of steps. Firstly, a hypothesis will be created, such as thorough automatic recognition enhances system security. Subsequently, the experiment will be carried out and analysis of the collected data. Finally, the data will be interpreted and inferences made. These series of steps will be iterated contingent on the inferences.  

Analysis

Researcher’s expected results on computer security include;

  1. The system will fasten the response to threats within minutes thus reducing the feedback time of the corresponding authorities in related threats.
  2. The advanced feature in the system for user-experience will also be represented for cyber security to permit variety of asserts to be under a single operator.
  3. Advanced automatic threat acknowledgement will be implemented for optic cameras and photonic coastal radar network so that exact and thorough automatic recognition to be realized.

support
Whatsapp
callback
sales
sales chat
Whatsapp
callback
sales chat
close