Main Menu

term paper on computer security

Sorry, Readability does not yet present PDFs in a reading view.[View Original.
This course covers selected topics related to theory and practice of computer security. It is organized around 26 selected research papers. These papers, taken from the past 40 years of computer security research, reflect the instructor's personal taste and are not intended to give a comprehensive survey of modern computer security.
In this age where the use of computers and networks related to them has become commonplace, there has developed problems concerning cyber security. Cyber security is an important factor to be considered if one is to be able to protect oneself from malicious people and software from the internet. Most of the threats to computer networks come from the internet and these are often intentional, having been developed by people with malicious intent. Cyber security is, therefore, an attempt by individuals to protect their personal information and other digital assets from attacks from the internet. Cyber security involves various steps the most important of these being an individual’s understanding of the different forms of attacks that they are likely to encounter. Once one has knowledge of this, then it is his or her responsibility to ensure that they have put in place the best security system they can get their hands on. There exist different types of threats and these can be considered to be of varying levels and risks to an individual’s personal information in their computers. The higher the possibility of an attack, the more advanced the security system that is to be put in place to ensure that the threat is minimized. Cyber security involves dealing with threats that range from malicious codes, which are known as malware and spyware, to computer viruses. Some of these viruses are so serious that they have the ability to erase entire operating systems of computers. These viruses also enable hackers to have access to all the data stored in the infected computers, ensuring that they have access to information, which can be used for personal gain. It is, therefore, necessary for individuals to avoid such intrusion into their computer systems by having the best cyber security systems. These involve the acquisition of antivirus software that is reliable as well as.
1. A review of cyber security risk assessment methods for SCADA systemsFebruary 2016Yulia Cherdantseva | Pete Burnap | Andrew Blyth | Peter Eden | Kevin Jones | Hugh Soulsby | Kristan StoddartThis paper reviews the state of the art in cyber security risk assessment of Supervisory Control and Data Acquisition (SCADA) systems. We select and in-detail examine twenty-four risk assessment methods.2. SecKit: A Model-based Security Toolkit for the Internet of ThingsOctober 2015Ricardo Neisse | Gary Steri | Igor Nai Fovino | Gianmarco BaldiniThe control and protection of user data is a very important aspect in the design and deployment of the Internet of Things (IoT). The heterogeneity of IoT technologies, the large number of devices and.3. The cyber threat landscape: Challenges and future research directionsNovember 2011Kim-Kwang Raymond ChooCyber threats are becoming more sophisticated with the blending of once distinct types of attack into more damaging forms. Increased variety and volume of attacks is inevitable given the desire of financially.4. Intelligent financial fraud detection: A comprehensive reviewMarch 2016Jarrod West | Maumita BhattacharyaFinancial fraud is an issue with far reaching consequences in the finance industry, government, corporate sectors, and for ordinary consumers. Increasing dependence on new technologies such as cloud.5. Security of Software Defined Networks: A surveySeptember 2015Izzat Alsmadi | Dianxiang XuSoftware Defined Networking (SDN) has emerged as a new network architecture for dealing with network dynamics through software-enabled control. While SDN is promoting many new network applications.6. Profiling user-trigger dependence for Android malware detectionMarch 2015Karim O. Elish | Xiaokui Shu | Danfeng (Daphne) Yao | Barbara G. Ryder | Xuxian JiangAs mobile computing becomes an integral part of the modern user experience, malicious.



« (Previous News)