Essentials for Computer Operating System Security
Individual Assignment #1 Essentials for Computer Operating System SecurityJeffrey ReyesCSEC 630 9081 Prevention and Protection Strategies in Cybersecurity (2158)University of Maryland University College Dr. Tsun ChowTable of ContentsAbstract3Introduction to Computer Operating Systems4-5Design of Computer OS Security Measures & Ratings5-7Cryptography as a Security Measure- Advantages and Disadvantages 7-8User Authentication: Biometrics- Advantages and Disadvantages 8-11Firewalls: Advantages and Disadvantages 11-12IT Security Awareness Training, Polices & Procedures: Advantages and Disadvantages 12-15Conclusion 15-16The Security Measures and Severity Rating (table)17References 19-23Tables 24-25        AbstractAttacks against computers, in both home and business environments, have grown steadily over the past several years. According to the U.S. FBI, as cited by Mueller (2003) “worldwide digital attacks reached an all-time high of nearly 20,000 in January, causing more than $8 billion in damages” (Kadel, 2004). Incidents of identity theft – the act of impersonating another person for profit or gain – are growing at an alarming rate. Research as cited by Pollock and May (2002) state that identity theft is considered one of the fastest growing crimes in the United States, affecting an estimated 900,000 new victims every year (Kadel, 2004).  The need for information security should be apparent, but the knowledge and ability to design and implement an effective security program requires substantial research, and often a great investment of time and resources (2004). To compound the problem, many home users lack the knowledge and experience to identify and understand their risk (2004). Moreover, while small businesses may understand, they either do not grasp the severity of the problem, or lack the resources to rectify it (2004). Agreeing with Kadel, in examining this issue, numerous topics become ostensible: “1). Incidents of computer related crime are steadily rising”. 2). “Attacks against computers, in both the personal and business arenas, are becoming more sophisticated”. 3). “Software companies, including application and operating system vendors, are unable to keep up with the rapidly growing and ever-changing threat”. 4). “A properly designed and implemented security program can significantly reduce the exposure to these threats, and limit the damage caused in the event of an attack”. 5). “For a security program to remain effective, it must be reviewed and maintained on a regular basis” (2004).

Get Your Essay

Cite this page

Computer Operating System Security And Disadvantages 7-8User Authentication. (July 11, 2021). Retrieved from https://www.freeessays.education/computer-operating-system-security-and-disadvantages-7-8user-authentication-essay/