Saturday, May 11, 2019

Chief Security Officer Assignment Example | Topics and Well Written Essays - 2000 words

Chief Security Officer - identification ExampleComputer abuse cab be described as any unlawful natural process involving a combination of a network and a computer. Some examples of computer crimes include hacking, pornography, copyright trespass and many others. In essence, the issue of computer crime has elicited heightened debates among heads of various institutions of higher learning. As a chief security officer in the institution I have to establish effective strategies that counter the occurrence of computer crimes and mitigate any losses that might be suffered in case a cyber-crime occurs.The neighboring institutions of higher learning have established various measures to curb the paradox of computer crime. In essence, from the available studies, it can be affirmed that the challenge of cyber-crimes affectsmanyinstitutions of higher learningacross theUS. In this regard, the ministry of education in conjunction with the various institutions of higher learning have initiated several strategies to handle the puzzle of cyber-crime. In essence, most institutions have established backup information systems to ensure that important information is not lost to cyber-crime. Maintaining an information backup system has proved to be one of the effective strategies for handling the problem of computer crime. Essential a backup system ensure that the stored information is not lost by means of computer viruses or other computer related malfunctions. Essentially, it is imperative to identify that the problem of computer crime is quite diverse. For instance, one of the mechanisms employed to execute computer crime is the use of viruses. The viruses are spread with the various websites found on the internet including emails. Apparently, the people who conduct computer crimes share some relate on the websites and send some random relate containing viruses to peoples email. Following such links transfers the virus

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.