Unit 1 Assignment

Improved Essays
COMPUTER ARCHITECTURE AND
IMPLEMENTATION

Assignment 1
Name: Bhargavi Bussu
Student Id: 10000126759

Professor: Paul Wang

1.3 Traditionally a user's view of a Computer system like an Onion. Explain why this concept is outdated and draw a new diagram based on the concept proposed in this book.

In Today's current generation the Computer systems are wide opened to the Internet, however threat towards the Computer system have been increasing rapidly at a faster rate.
Despite of increasing counter attacks on Computer systems people have started developing invented and used different solving techniques to prevent from them such as Firewall, User authentication , Norton Antivirus so on ....

Even after putting lot of efforts to prevent the counter attacks on Computer systems still we are standing way back. Data bleach and Computer have to compromises are still remains very common and same. In older days for our Computer system counter attack techniques most of them used to detect based on passive techniques. We use to get alerts for Computer system once after attacks have taken place. In Robotics, Japanese scientist have been spent a Trillions of dollars to develop a new Robots to have a secured and privacy life for humans, However in our ancient days people had secured their life in person by their own for their secured and privacy life.
…show more content…
This is the same as now the so called Secured human privacy life. If we apply same above technique for Computer systems we can conclude that we not only build the Norton for preventing counter attacks, in near feature we have to build the Computer systems in such a way that it has to detect the counter attack before they get affected. In the year 2005, a United States of America patent was filed to introduce new technology that can actually prevent the getting out information stored in the Computer system from the hackers. The technology has drawn the attention of entire United States of American government, world, industries and academics. Below is the diagram for conceptual diagram of secured computer system. In traditional to Computer system apart from Hardware and Software we added another additional layer so called Virtual semi conductor it allows the computer operator to access the data and control information. So that the hackers will not be able to find any route to steal the data or information from the Computer systems. CONCEPTUAL DIAGRAM OF SECURED COMPUTER SYSTEM 1.7 Draw a diagram of Neumann architecture and a Single-bus diagram of Neumann architecture. 1.11 Discover the NIC(s) on your computer? Is it wired or wireless? NIC: Network Interface Card (and also known as Network Interface Controller, by similar called network adapter, LAN adapter) in my computer is wireless not wired and also handles data communication. 1.18 Suppose Alice is an employee of a hospital called FX Hospital, and her job responsibility is to order medical equipment for the hospital from a company called GEE. GEE has a Web site that Alice to procure medical equipment for her hospital. Answer the following questions. 1. Alice has to log into GEE and give that Web site her username and password through SSL protocol so that GEE knows that it is Alice. This is called Authentication. Authorization, authentication, confidentiality, integrity 2. If Alice tries to

Related Documents

  • Improved Essays

    Nt1310 Unit 3 Case Study

    • 835 Words
    • 4 Pages

    Firewalls: Firewall acts as a defense weapon against hacking into your network. There are lot of software’s are available in the market but the best and highly recommended would be Zone Alarm. It sets you for individual Internet access for individual programs and allows automatic programs. It also blocks intrusion if anyone trying to hack into your system. Virus scanner and removal: Virus scanner and removal are included with our antivirus software’s because antivirus software will be running in background, your computer is protected from new viruses.…

    • 835 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    Managing Threats to Data Common threats to data consist of Botnets, DDoS (Distributed denial of service), Hacking, etc. You can manage and prevent data threats with antivirus/malware/hacking/etc software. By downloading a legitimate program you can protect your computers data. The software will alert you if there is something out of place in your computer before it’s too late, so you can get it removed.…

    • 1963 Words
    • 8 Pages
    Improved Essays
  • Improved Essays

    Njilla starts on his presentation, asking the question “How can we serve our power grid?”. Attackers he calls them adapt to defender’s efforts making it a never-ending race to try to stay on top of each other. An ongoing effort that has no sense of ending, which probably means constant employment. Attackers can develop or purchase zero- day exploits that expose the vulnerabilities within a system that can be used for very malicious intent. Which explains why he called cyber security a “race”, it is nearly impossible to be 100 percent secure so being as secure as possible by upgrading and updating technology, and applying patches to vulnerabilities when they are discovered is the best route to protecting systems.…

    • 505 Words
    • 3 Pages
    Improved Essays
  • Great Essays

    The goal of this step is to identify a list of system weakness, by using security test of system, audit comments and security requirements that could be exploited. These weaknesses generate the threat/vulnerability pair. Control Analysis For every threat/vulnerability pairs, identify all the possible existing and planned controls to decrease the risk of the threat to exploit vulnerability. Security controls involve the use of technical and non-technical approaches.…

    • 1790 Words
    • 8 Pages
    Great Essays
  • Decent Essays

    Protecting the Internet is a difficult task. Cybersecurity can be obtained only through systematic development;…

    • 188 Words
    • 1 Pages
    Decent Essays
  • Great Essays

    Security Analysis Of Yahoo

    • 1989 Words
    • 8 Pages

    As such, the company’s information technology department is concerned with the process of making sure that each of the organization’s computer systems are safe and free from any internal and external threats that may affect the operations of the business. As the company offers its services to different clients, the IT department makes sure that all operations are streamlined and that every system made to effect its operations is functional. Additionally, the department takes a center role in protecting its users from malicious attacks that could lead to different security threats being posed to the organizational product users. As such, some of the important personnel’s in the Information Technology include a number of programmers, different moderators, and system control engineers among other people who have the ability to detect any threat and any form of inappropriateness’ in the…

    • 1989 Words
    • 8 Pages
    Great Essays
  • Improved Essays

    Essay On Cybersecurity

    • 1115 Words
    • 5 Pages

    However, the hackers are always a step ahead of us. Is there a way to stop the hackers? Cybersecurity, as known as Computer Security, is the “method of protecting information, computer programs, and other computer system assets (“Computer Security”).”…

    • 1115 Words
    • 5 Pages
    Improved Essays
  • Superior Essays

    Physical Security

    • 1193 Words
    • 5 Pages

    Companies have witnessed robbery attack, terrorist attack, shooting rampage by disgruntled employees or students in an institution of learning. It was also vividly mentioned in this chapter that if any security measures such as closed-circuit TV (CCTV) surveillance, security guards, intrusion detection systems (IDSs) failed, then of course the fault is from a human being considered as the weakest link in information security. This chapter also noted that people did not embrace physical security the…

    • 1193 Words
    • 5 Pages
    Superior Essays
  • Great Essays

    Risk Analysis Assignment

    • 1273 Words
    • 6 Pages

    Finally, it is possible to reduce an attacker 's chances by keeping systems up to date with items such as security patches and system software and hardware…

    • 1273 Words
    • 6 Pages
    Great Essays
  • Improved Essays

    avoiding such attacks such as Intrusion Detection System (IDS) which is the most popular method of defense [29]. A defense federation is used in [29] for guarding against such attacks. Under this technique each cloud is loaded with separate IDS. The different intrusion detection systems work on the basis of information that is exchange between these systems.…

    • 745 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    Obeying the law, rules or regulations means the act of a person need to follow the command or restriction of the rule of law in legal system, and regulations or rules set up by respective organization, otherwise penalties might be applied. For such instance, as a citizen of Malaysia, and on the land of Malaysia, a person should always follow the law stated in the legal system of Malaysia, for example, according to Dangerous Drugs Act 1952, Malaysia prohibit the dangerous drug, those who possess the drugs more than the amount stated in the law will receive the mandatory sentence of death by hanging. Besides the law of a country, a person should always follow the rules or regulations set up by the organization, if the person is a member of the…

    • 876 Words
    • 4 Pages
    Improved Essays
  • Superior Essays

    Introduction In order for you to plan for security. You must first conduct a full risk assessment. The whole point of security planning is to develop some security polices so that you can implement some controls that will help to prevent the risks to your systems from becoming a reality. This paper will discuss some cybersecurity strategies and other various frameworks.…

    • 1045 Words
    • 4 Pages
    Superior Essays
  • Great Essays

    Detection Malware

    • 1657 Words
    • 7 Pages

    230). Countermeasures should be implemented as part of the prevention method to ensure that the network and computers are secured as possible. Systems should be patched accordingly; access controls must be put in place to reduce potential infection to files. If prevention fails, then detection, identification and removal should be put in effect to successfully minimize denial-of-service costs. In addition, prevention mechanisms include anti-virus programs such as host-based scanners, generic decryption (GD) technology, host-based behavior-blocking software, spyware detection, rootkit countermeasures and intrusion prevention systems…

    • 1657 Words
    • 7 Pages
    Great Essays
  • Improved Essays

    Secure Computer Security

    • 1115 Words
    • 4 Pages

    Computer security is important to an Information system to ensure the Confidentiality, Integrity, and availability is not compromised. There are many ways to secure a computer based information system. The most important way to secure the system is to physically secure it. When securing a system it is advantageous to use layers of defense.…

    • 1115 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    These days Internet has made it easier to send and receive accurate data from any destination, which is a rapid development. There are different transmission media to transfer the data to destination such as social sites, emails, file sharing sites, etc. Also, it might be easier to modify and misuse the significant data by hacking. There are many approaches to transfer the data securely to the destination without any modifications like cryptography and steganography.…

    • 1064 Words
    • 5 Pages
    Improved Essays