Thursday, June 20, 2019

System safety Research Paper Example | Topics and Well Written Essays - 1500 words

System safety - Research Paper ExampleToday, people, organizations, and companies are each(prenominal) technologically advancing, and information technology is a backbone of these advancements. All these technological changes are controlled potentially by a computer, making a computer administration the most delicate device in the world, and, therefore, a lot has been done to make computers more reliable and safe by implementing security measures that protect their environment (Leveson 38). These computers are all controlled by systems incorporated in them. These systems have general security measures.Software safety is provided by a complex of security measures against programs that take a system. It involves recognizing and neutralizing security threats and prevention measures against substances affecting normal operation of computer software. These threats includeIt is when software disguised as something else is installed in a system with the ken of a system manager. The Tr ojan horses contain either a trigger that sets itself when a specific event reaches or occurs in a system or a back door which allows entry of different users into a system when Trojan-infected software is in use.Viruses constitute the most common threat for a system. They drub by replicating themselves and then spreading into a systems sub-system. Through this entry, they attack and destroy the host system.They attack and consume available resources quietly, overloading a system and finally making it dysfunctional. They work by reproducing and spreading as wide as possible in a system so as to contact their goal, and they are always developed for only a certain type of system. Worms are primarily aimed at high or large systems to collect selective information and feed it to unauthorised users. (Storey 27)This happens when malicious websites that support security holes and use them in certain technologies in a network trigger an organizations web browser to do and perform unauthor ised

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.