Through learning about Computer Information System Security, interested individuals shall be able to:
There’s an upcoming comprehension on the complicated nature of the computer security for individuals and organizations. This complexity has been prompted by advancement of hacking techniques and computer systems in general. Therefore, it has become necessary to come up with ways in which systems can keep track of external threats and proving information pertaining to the attacks and probable ways of thwarting those attacks. Quantitative research methods will be used and some of the simulation tools that will be used include Topgen, and Greybox. The expected results include to fasten the response to threats within minutes thus reducing the feedback time of the corresponding authorities in related threats, and advanced automatic threat acknowledgement will be implemented for optic cameras essentially to realize exact and thorough automatic recognition.
Computers and various digital gadgets are considered vital to business and other income generating activities. Consequently, more compromises on hacking these computers have been increasingly witnessed. Therefore, for a personnel or organization to engage any computing gadget fearlessly, they must be certain on particular device not being complicated and that all communications must be secure (Li, 2012). Information security triad must therefore be reviewed and it entails;
Motivational factors for security systems include;
Since computing resources have become core part of business activities, they have also become a target of criminals. Companies should be focused with the means to secure their resources.
The research method that will be used to facilitate the study of computer security architecture will be quantitative in nature since the experiment research designs will be embraced to gather the necessary data. This method is apposite for the research on the grounds that it will impel theory testing, including explanation of new phenomenon pertaining to computer security architecture. Also, experimentation plays pivotal roles in solving practical problems, and in determining the impact caused by a specific phenomenon.
The proposed model will be implanted through pilot implementation method. This method is appropriate on the grounds that it minimizes risks that can be elicited by ineffective model of system features. Besides, the pilot group can be trained easily (Parfiryev et al., 2019). It is essential to note that security of information systems is an important factor in an organization and can lead to several issues, including data breach. Therefore, it is important for the new model or features to be implemented in a particular section within an organization as opposed to the entire sections at once. In this context, the selected companies will be required to test the new model and give feedback which aids in identifying problems of the model and fixing them accordingly before implementation.
The simulation will be performed by several tools including Topgen, Greybox and ghosts. Topgen tool assists in training networks, and it permits a single virtual machine to deliver various co-hosted virtual application-layer services; for example DNS views. While the greybox is used to simulate internet infrastructure and it augments users’ experiences by permitting integration of peer-to-peer software. The ghosts perform tasks like human beings and they can simulate users’ slipups that contributes to vulnerability of computer systems (Mayes, 2019). In additional to the three provided tools, vTunnel will be also used in simulation. This tool assists in getting rid of the particular network activities; therefore preventing some individuals from seeing particular network traffic. It conceals every single administrative activity that could otherwise interfere with users’ attention during the training course. This makes it possible for the users to concentrate on the simulation event. It also offers an opportunity for the guests to keep in touch with the management networks, while simultaneously preventing the participants from keeping track of the in-game networks (Mayes, 2019). Welle-D and TopoMojo will also be utilized in the simulation and the former will impel configuration of wireless access points. The latter tool i.e. TopoMojo is made up of lab player and builder. The lab player enables individual to access available labs (Mayes, 2019). In a nutshell, this tool enhances collaboration among the participants. Therefore, the discussed six tools will help in simulation and they are apposite in this context.
The experiment will follow a scientific method that entails a series of steps. Firstly, a hypothesis will be created, such as thorough automatic recognition enhances system security. Subsequently, the experiment will be carried out and analysis of the collected data. Finally, the data will be interpreted and inferences made. These series of steps will be iterated contingent on the inferences.
Analysis
Researcher’s expected results on computer security include;