• Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

Systems Security: Threats to computers

Extracts from this document...


* SPAM email - Unwanted mail that can cause stress, slowdowns and can mess with your hard drive. To deal with a current situation of SPAM, you can acquire SPAM removal software, and use that to search your system and mail applications to remove all unwanted SPAM. To prevent future cases of SPAM, install SPAM filtering software, alter ports and keep your email private without sharing it to unknown sources. * Viruses - These can infect a computer and corrupt, delete and alter personal, general, and system files. To deal with a current situation of this, try running anti-virus software. If it is unable to run, try and load it from a portable device. If that doesn't work, use search engines on the internet to gain knowledge and possible solutions to the problem at hand. If the virus has stopped any possible access to the internet from your computer, then use another source to search the internet, e.g. a friend's computer, or an internet-enabled library. To prevent any future viruses from infecting your computer, acquire anti-virus software, steer clear of unknown sites and material, and also use software that blocks unwanted IP's from your network. ...read more.


another HDD, or an external hard drive. * New updates to an Operating System (such as Microsoft Windows Service Packs or similar) - A new set of updated system files could overwrite needed files and could make the computer unstable. To deal with this kind of situation, you could contact the provider of the updates and get any information from them concerning your new system problems. Also you could analyze previous experiences from users who have applied the updates before by using search engines on the internet. To prevent any future cases of this, don't install updates to your OS without checking details such as the system requirements, and analyze other users' experiences and outcomes with the updates you're thinking of installing. * New updates to Applications (such as a new version of Microsoft Office) - An application can get updated to fix bugs and errors, however this can make files that previously worked incompatible with the new version. To deal with a current situation like this, you could contact the provider of the updates and get any information from them concerning your new application problems. ...read more.


* Theft - The whole system can be stolen which obviously means physical access is lost. To deal with a situation like this, contact the authorities, and let them know what has happened. Also analyze the area where your computer was stationed for any evidence of the theft, and note down anything that could possibly trace back to the thief. To prevent future cases like this, you could place your computer in a higher-security location, with more safety. Also, install security measures such as cameras, and guarding for your computer. On a further note, you could install software that could lock or possibly destroy your data/components if the computer is stolen again to render the stolen property useless to the thief and to protect your data from unwanted people. * Damage to keyboard, mouse, power/network cables or monitor - These are required to use the operating system properly, if these aren't present, then access is lost. To deal with a situation like this, replace the damaged parts, or take the parts to a specialist. To prevent future cases like this, get more reliable parts, and make sure they remain in suitable locations and conditions. ?? ?? ?? ?? John Bonham Unit 15 - Systems Security 1 ...read more.

The above preview is unformatted text

This student written piece of work is one of many that can be found in our AS and A Level Information Systems and Communication section.

Found what you're looking for?

  • Start learning 29% faster today
  • 150,000+ documents available
  • Just £6.99 a month

Not the one? Search for your essay title...
  • Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

See related essaysSee related essays

Related AS and A Level Information Systems and Communication essays

  1. Marked by a teacher

    Database Coursework on a Vehicle Rental System: Analysis

    5 star(s)

    or demoted to a different job in the shop, in which case the job title, job description and perhaps the working hours fields will need updating. With regards to vehicles within the system, their availability will constantly be changing so this must be recorded in the availability field, and they

  2. Information: G061 - Systems and Communication

    and kept to a minimum - help messages should be useful and clear - information should be in a logical order - interface should be easy to learn and use (minimising training) - commonly used functions (back, search, sort, etc.)

  1. IT Security Threats to Users and Businesses.

    Where this is then a bogus site and your giving your details striaght to the criminal. Damage to or destruction of systems or information: Natural disasters Damage can be caused to systems through natural disasters and can cause things from floods to fires and power loss.

  2. Assignment 1 unit 7 Security Assessment Report (.coursework.info)

    Human Error This could include spelling mistakes. Spelling mistakes are quite easy to make and if you make a mistake in a name or programme, it can have consequences when you come to use email or sending letters out to customers. It shows a lack of professionalism or lack of care and makes your business look careless as though your custom doesn't matter to them.

  1. Custom Load Trucking

    * 4096MB Corsair DDR II 667 Memory * 1000GB SATA II Seagate Data Storage * NEC 7170 Multi Format DVD/CD ReWriter * ATI Radeon HD 2600 512MB PCI Express Graphics Card * 7.1 HD Surround Sound * Intel Core 2 Duo Deluxe Motherboard * Sony Floppy Disk Drive * DVD/CD

  2. Database Coursework on a Rental System: Design

    Integration of VBA (Visual Basic for Applications) code: - Visual Basic is an event driven programming language and integrated development environment from the Microsoft Corporation developed for its COM (Component Object Model) programming model. Pieces of code can be designed that increase the functionality and flexibility of the standard user interface, customised appropriately to the system's unique requirements.

  1. AO3 Investigate how search engines work

    instead of the crawler based search results Meta- this uses different types of search engines to generate a overall listing of the best sites from the search engines e.g Google, Bing, Yahoo. Search engines that use the system of meta search is not a search engine on its own but instead borrows the results from other search engines.

  2. Describe the future of the Internet.

    many companies now make apps for mobiles phones so that they can connect with customers and advertise using these apps so that they can connect constantly with all there customers instantly. Now smart phones face much better capability?s and give the user a better interface and example of this is the point and zoom making browsing much easier.

  • Over 160,000 pieces
    of student written work
  • Annotated by
    experienced teachers
  • Ideas and feedback to
    improve your own work