Top Special Offer! Check discount
Get 13% off your first order - useTopStart13discount code now!
Experts in this subject field are ready to write an original essay following your instructions to the dot!Hire a Writer
Since the world has become a global village, especially since the information technology and Internet revolutions. Users of technologies are often confronted with security and privacy issues. Several cases of data leaks, theft, and fraud were identified by users at the start of the dot-com revolution. However, over time, hardware service providers such as makers of USB flash drives, internet service providers, smart printer manufacturers, cloud software service providers, cloud infrastructure service providers, cloud network service providers, and others have figured out how to avoid security and privacy breaches, hacking and other cybercrimes. The manufacturers and service providers developed cryptography/access control mechanisms as a part of their routine operations. This study examines the security evaluation of the technology system implemented for the security of personal computing, a user who is exposed to the potential computing threats.
Three possible threats that can be dangerous and damaging for losing personal information and assets are malware or spyware virus attack and hacking. It is a normal practice that every computer user saves his/her personal information such as credit card details, social security number, emails, business and office data, personal and family pictures, videos and other personal data to the hard drive of his/her personal computer. This actually exposes him/her to the greatest security risk. The area where every computer user needs to put special consideration to make his/her computing experience secure and to make the security impeccable is using the highly reputable, renowned, and big security service providers such as an anti-virus, anti-malware, and anti-spyware software and cyber security services (Liang and Xue 400). Indeed, with the passage of time, improvement and evolution process is also taking its place to secure personal computing. In fact, today’s computing is much safer. There are lots of service providers in the market that ensure their customer cyber security. These service providers render their professional services to computer users for protecting their computer data, and they implement an impeccable cyber security and privacy solution for their customers. Nowadays, technology components that are placed for security are foolproof. Large internet service providers such as Google, Firefox, MSN, large antivirus service providers, antispyware and antimalware service providers have implemented the components which consist of information security, data center physical security, server and software stack security, platform security features, secured service APIs and authenticated access, data encryption, secure global network, intrusion detection, security scanning, compliance and certifications, network firewall rule maintenance, penetrating tests, sensitive data management logging, and monitoring PCI as well as HIPAA regulation compliance. These are the real impeccable technology remedies for possible threats. Therefore, in today’s personal computing there are fewer security risks are involved, everything is protected and safe (Liang and Xue 405).
In my opinion, the potential safeguards and controls which large and reliable service providers have implemented for their customers to mitigate vulnerabilities are enough to deal with the current security risks to personal computing. However, new challenges are continuously coming and the process of protecting computer users should not be stopped here. A foolproof security should be ensured. Indeed, a reliable and concrete security system is the only way to make sure that the technology the company is providing to users is fully protected.
Liang, Huigang, and Yajiong Xue. "Understanding Security Behaviors in Personal Computer Usage: A Threat Avoidance Perspective." Journal of the Association for Information Systems, vol. 11, no. 7, 2010, p. 394-413.
This sample could have been used by your fellow student... Get your own unique essay on any topic and submit it by the deadline.
Hire one of our experts to create a completely original paper even in 3 hours!