Professional academic writing service

Experts provide help with assignments of all academic levels and disciplines.

EssayRatings
4.93
895 reviews
SiteJabber
4.97
577 reviews
Trustpilot
4.91
321 reviews
Estimate your price
Word count
~255 words $10
100% Plagiarism-Free Essays. Any Topic or Difficulty can be handled!

reviews

Different Architecture of Romanesque and Gothic Inspired Buildings There have been numerous pilgrimages made across France and Spain, each one j...

Architecture,
Shanghai Tang
  • 1
  • 2
  • 3
  • 4
  • 5

Shanghai Tang was established by David Tang in Hong Kong in 1994. It was a store selling high quality item made in China, such as conventional C...

Brands,Business,Business Management,Business Success,China,Company,Corporation,Customer,Global Marketing,Industry,Management,Marketing,Share Market,Shopping,

Individuality- Being unique and not seeing a person with their illness. This is important to make someone feel like his/her own person. Rights- ...

Person Centred Care,Privacy,Social Work,

In the book Bird by Bird by Anne Lamott, she writes an excerpt, Shitty First Drafts, which is about the impact and importance of the first draft...

Literature,Writer,Writing,

FALSE:: ERROR: UNSUPPORTED ENCODINGIt doesn’t appear this improves the solution shown in question 1. The plants that are at capacity in p...

Business,Case Study,

In our daily lives, too often do we judge others based solely on their appearance; whether it’s by the clothes that a person is wearing or even ...

Helping Others,Mother Tongue,

Our everyday communication involves talking to friends, lovers, family members, acquaintances, co-workers and people in service positions. We do...

Communication,Electronics,Internet,Mobile Phone,Nonverbal Communication,Print Media And Electronic Media,

In his book Urban Location, Michael Pacione, talks about the “Future City-Cities of the Future”. In his analysis there are several principl...

City

Quality and efficiency is the key to American Connector Company (ACC) success. ACC has lost market share to DJC over the recent years, which wil...

America,Business,Company,Technology,

When you think about a gated neighborhood, what enters your mind? Most likely things like safety, security, exclusivity, pricey homes, and more....

Community,Price,Pros and cons,

Electricity has been part of our lives. It has brought many things that surely have made many wonders and life would seem so hard without it. El...

Building,Nature,Service,

How can community health nurses apply the strategies of cultural competence to their practice? A nurse can be a part of helping a patient’s cult...

Community,Health,Health Care,Nursing,

In his book of short stories, The Lone Ranger and Tonto Fistfight in Heaven, author Sherman Alexie explores the theme of Native Americans as out...

Explore,Sherman Alexie,

An important conflict in the novel ‘The Hunger Games’, by Suzanne Collins, is the conflict between the districts and the Capitol.

Conflict,Hunger Games,

What do you view as the relationship in between the 2 texts you have studied?How are form, structure and image used in each of the two te...

The Great Gatsby,

People all over the world, time and again, have made similar advances and mistakes states Wright in his book A Short History of Progress (Wright...

History,Mesopotamia,Progress,

In order to evaluate the extent to which Freud’s theory can help to understand a client’s presenting issue, an understanding of the theory will ...

Development,Philosophy,Sigmund Freud,

In the last twenty years technology has advanced ever-so quickly. Like with every good thing there are some drawbacks. One of those drawbacks is...

Addiction,Health,health,psychology,Psychology,Technology Addiction,

According to psychologist Diana Baumrind there are four parenting styles; Authoritarian, Authoritative, Permissive and Uninvolved parenting. Bau...

Family,Parenting,Parenting Styles,

I have chosen The Marriage of the Virgin as a document analysis because I want to contrast this work with works of Perugino, especially Christ g...

Marriage,Visual Arts,

Computer Security Measures

The Problem and Its Scope

The Internet and computer networking means that there is a need for new security measures to reduce the threats and challenges inherent from these new technologies and software applications and network devices. Information, network equipments, transmission media, computer systems, and servers are subject to threats. “Yet the use of information and communication technologies has increased the incidents of computer abuse.” Computer security involves safeguarding computing resources, ensuring data integrity, limiting access to authorized users, and maintaining data confidentiality.

Effective computer security therefore involves taking physical security measures (to ensure hardware and media are not stolen or damaged), minimizing the risk and implications of error, failure or loss (for example by developing a resilient back-up strategy), appropriate user authentication (for example by employing strong pass wording), and possibly the encryption of sensitive files. We live in a world where “information wants to be free” and in which people are getting used to having access to whatever information they want anytime, anywhere and from a wider range of computing devices.

Because of the computers evolution, the researchers want to share the implications on how important the computer security measures, so that the respondents will be able to know on how to handle some cases in the future. Globally, the most used computer security measures are Anti-virus programs are the most frequently used tools to protect computer systems, and they must be upgraded regularly to protect against any new viruses.

Firewall is different from anti-virus software, which simply verifies that a file is virus free. You can also add an anti-spy ware program. Spy ware is a small program downloaded onto your computer via the internet, usually with your approval, to collect information. Anti-spy ware operates a lot like an anti-virus program, but its role is to prevent malicious spy ware (or malware) from sneaking onto your computer and transmitting your personal data. Firewall intercepts and controls traffic between networks with differing levels of trust. It is part of the network perimeter defense of an organization and should enforce a network security policy. By Cheswick’s and Bellovin’s definition, it provides an audit trail. A firewall is a good place to support strong user authentication as well as private or confidential communications between firewalls. As pointed out by Chapman and Zwicky [2] , firewalls are an excellent place to focus security decisions and to enforce a network security policy.

They are able to efficiently log internet work activity, and limit the exposure of an organization. The exposure to attack is called the “zone of risk.” If an organization is connected to the Internet without a firewall, every host on the private network can directly access any resource on the Internet. Or to put it as a security officer might, every host on the Internet can attack every host on the pri vate network. In the Philippines, some of the businesses are employing security products, such as intrusion detection system and firewalls, and other internal controls which are meant to safeguard, physically and logically, all servers and information systems, including the data stored in the systems. In Davao City, many colleges’ offers IT courses and one of these schools is the Holy Cross of Davao College. Some computer security measures used in some colleges are anti-virus, firewall, ad ware, spy ware and etc. This help to secure data from viruses, unauthorized access, hardware failure and hardware theft.

Rationale of the Study

The term Information Technology is the area of managing technology and spans wide variety of areas that include computer software, information systems, computer hardware, programming languages but are not limited to things such as processes, and data constructs. In short, anything renders data, information or perceived knowledge in any visual format whatsoever, via any multimedia distribution mechanism, is considered part of the Information Technology (IT) domain. Computer security is to prevent or detect unauthorized actions by users of the system.

The protection of data stored in your computer system. The protection of data (information security) is the most important. The protection of networks is important to prevent loss of server resources as well as to protect the network from being used for illegal purposes. The objective of this study is to know the level of awareness and utilization of all first year BSIT students in terms of computer viruses, unauthorized access, and hardware failure and hardware theft.

Theories and Concept

This study was anchored on the concept of Dynamic awareness theory (DAT) offers an alternative to explaining the creation of awareness in distributed work groups. DAT highlights the important role of users and social practices in awareness creation. The theory further points to the dynamic nature of awareness creation: Awareness emerges over time and depreciates when not being actively attended to by the users.

A person’s awareness is not a static state which can be arbitrarily turned on and off. It is rather a slow build-up of information about his surroundings (Kai Riemer, Russel Haines, 2008). This theory of awareness is use to conceptualize each individual of their daily awareness about what happen in their community, because awareness requires active maintenance because it diminishes over time.

Independent variable Dependent variable

Figure 1. Conceptual Framework Showing the Variables of the Study The response of the first year BSIT students in the level of awareness and utilization about computer security measures in terms of Virus, Unauthorized Access, Hardware Failure and Hardware Theft depends with the experiences they encountered in their system in which it is the basis of the reasons for the awareness of the students.

Statement of the Problems
1. What is the level of awareness of the respondents about computer security measures against the following threats:
a.Virus
b.Unauthorized access
c.Hardware failure
d.Hardware theft
2. What is the level of utilization of the respondents on computer security measures? 3. What is the most practiced computer security measure by the respondents? 4. What is the least practiced computer security measure by the respondents? 5. Is there a significant difference between the level of awareness and utilization of the computer security measures by the respondents?

Method

The researches conduct this type of research in order to obtain certain information about the computer security measures. The researchers used descriptive assessment method in order to meet the objective of the study. To gather data, the researchers use these procedures in order to analyze the data that has been collected.

Research Design

In order to determine the level of awareness and utilization about computer security measures, the descriptive assessment method of research is used. This is used by the researches because the objective of this study is to determine the level of awareness and utilization within the first year BSIT students without affecting them in any way. Descriptive research design exhibits specific subject and as precursor to more quantitative studies.

The actual survey is conducted during the second semester of the year 2011-2012. The procedure used is carefully, analyzed in order to obtain
accurate information.

Research Environment

The researchers conducted a research to a certain private school. The Holy Cross of Davao College is located at Sta. Avenue Davao City. The respondents of this research are all first year BSIT students.

Respondents of the Study

To achieve the desire information, all first year BSIT students of Holy Cross of Davao College were the participants of the study. They were chosen because they are not more knowledgeable compared to the higher years. The selected numbers of respondents were expected to give their honest answers.

Research Instruments

In this study, the researches use questionnaire as research instrument. It is most common instrument or tool of research for obtaining data beyond the physical reach of the observer. Part I of the questionnaire is the level of awareness of all first year BSIT students towards computer security measures in terms of Viruses, Unauthorized access, Hardware Failure and Hardware Theft. Part II of the questionnaire is the level of utilization of all first year BSIT students towards computer security measures in terms of Viruses, Unauthorized access, Hardware Failure and Hardware Theft.

Data Gathering Procedures

In gathering data procedure, first the researchers conceptualized what study to conduct and arrived to a research title “Level of Awareness and Utilization of All First Year BSIT students about Computer Security Measures”. The research title was approved by the research adviser with the panel of examiners. After the approval of the title, a questionnaire was established to answer the research study was validated.

Data Analysis

The following statistical tools were employed to answer pertinent problems of the study, as follows:
Frequency Count: This tool was used to count the number of items of the respondents who are aware and unaware about the computer security measures and its utilization.

Weighted Mean: The weighted mean is similar to an arithmetic mean (the most common type of average), where instead of each of the data points contributing equally to the final average, some data points contribute more than others. The notion of weighted mean plays a role in descriptive statistics and also occurs in a more general form in several other areas of mathematics.

Date: Jan 28,2022
StakeOnline