All papers examples
Get a Free E-Book!
Log in
HIRE A WRITER!
Paper Types
Disciplines
Get a Free E-Book! ($50 Value)

The Power of Procrastination, Term Paper Example

Pages: 4

Words: 1008

Term Paper

Part 1: The self-test multiple choice questions required much more thought and consideration than many of the questions in the previous chapters. This was due in large part to limited knowledge regarding some of the acronyms and their meanings. Therefore, these questions required significant thought and consideration in order to answer them correctly. On first glance, I missed many of these questions because I was not fully prepared with the knowledge that was required to answer them correctly. Based on these self-test questions, I have much more to learn about these chapters that I must consider in order to be successful in mastering the knowledge and terminology that is provided within these sections. This is an important step in my learning curve in facing these obstacles, as it will enable me to be successful in understanding these terms and in applying them to real-world situations.

Part 2: The concept of virtual private networks (VPNs) is interesting because it enables individuals to connect with networks on remote services without difficulty, using a code or other method of access. VPNs possess the ability to connect across networks and to enable individuals to share and transmit data to others in a private setting through this connection (Ivanovic, 2012). This may include the ability to access work computers, printers, and databases, among other uses (Ivanovic, 2012). This alternative also supports connectivity in a secure manner that requires authentication so that access to unauthorized users is prohibited (Ivanovic, 2012). These factors represent a means of creating a remote environment to access the necessary data and information to conduct business or for other activities for which remote data is required (Ivanovic, 2012). VPNs are very common in modern organizations and bridge the gap between remote users and networks, thereby enabling many employees to telecommute with full access to databases, systems, and other work-related resources in a remote environment (Ivanovic, 2012). This alternative also supports Internet access in a controlled manner and in supporting the needs of employees and other users in remote areas when traditional systems and hardware are not available (Ivanovic, 2012).

Malicious code is an increasingly common problem in information technology that requires significant attention to prevent permanent and lasting complications for computer users. In this context, individual users often face a serious risk of malware, which threatens the security and viability of many computer systems (Kolbitsch et.al, 2011). As a result, many systems may experience slowness and even irreversible damage as a result of malicious code that is part of malware (Kolbitsch et.al, 2011). In many instances, malware developers are creative with the codes that are used, and they are able to mask these codes rather effectively to avoid widespread detection (Kolbitsch et.al, 2011). As a result, the end user is dramatically affected, as the malicious code may wreak havoc on many levels that may contribute to slow networks, compromised data, and other concerns that may impact computer-based and human performance on many levels (Kolbitsch et.al, 2011). An organization must be apprised of its risks associated with malicious code and the efforts that are required to ensure that data is not compromised in any way (Kolbitsch et.al, 2011). A number of anti-malware programs are available for use in scanning computers to detect malicious code; however, these codes have become increasingly sophisticated to the extent that they may be masked and go undetected, even with the most advanced anti-malware programs (Kolbitsch et.al, 2011). Therefore, organizations must be prepared to manage these risks and to demonstrate the importance of new and improved strategies to detect malicious code more quickly and more effectively in order to prevent long-term complications that could negatively impact data (Kolbitsch et.al, 2011).

Antivirus software is a common and essential alternative for all computer users that is designed to protect computers from being invaded by viruses, worms, and other hackers that could disrupt operations and take valuable and even confidential information without difficulty. Antivirus programs are available in many shapes and sizes and provide different levels of protection; therefore, it is important to identify these resources and to take the steps that are required to protect data and information from unnecessary attacks. However, some of these programs are unsuccessful in overcoming the most emerging threats that are developed by skilled hackers and experts.

Once antivirus software is installed on a computer, it is important to maintain all required upgrades regarding this access. Many users might purchase antivirus software or download free versions, but may never perform the required upgrades (Zhang-Kennedy et.al, 2014). In this context, many users have a tendency to ignore update requests for a period of time and then become increasingly vulnerable to new viruses or other types of attacks (Zhang-Kennedy et.al, 2014). These factors are critical because they place many computers at a much higher level of risk, even when users recognize that these updates are required on a regular basis (Zhang-Kennedy et.al, 2014). This is only one aspect of antivirus protection that must be considered, but it demonstrates the importance and timeliness of these software programs in order to achieve optimal protection of data and systems (Zhang-Kennedy et.al, 2014). Therefore, antivirus protection, when utilized and updated properly, may be an effective means of protecting data and information from unnecessary risks (Zhang-Kennedy et.al, 2014). It is important to recognize these requirements on a continuous basis and to explore the options that are available to support systems and individuals from hackers or other vulnerabilities that could ultimately compromise their general health and the integrity of the data that is stored within an organization or on an individual computer. These factors include ongoing upgrades to achieve maximum protections for these services (Zhang-Kennedy et.al, 2014).

References

Ivanovic, J. (2012). Virtual private networks. Retrieved from http://www.australianscience.com.au/technology/virtual-private-networks/

Kolbitsch, C., Kirda, E., & Kruegel, C. (2011, October). The power of procrastination: detection and mitigation of execution-stalling malicious code. In Proceedings of the 18th ACM conference on Computer and communications security (pp. 285-296). ACM.

Zhang-Kennedy, L., Chiasson, S., & Biddle, R. (2014). Stop clicking on “update later”: Persuading users they need up-to-date antivirus protection. In Persuasive Technology (pp. 302-322). Springer International Publishing.

Time is precious

Time is precious

don’t waste it!

Get instant essay
writing help!
Get instant essay writing help!
Plagiarism-free guarantee

Plagiarism-free
guarantee

Privacy guarantee

Privacy
guarantee

Secure checkout

Secure
checkout

Money back guarantee

Money back
guarantee

Related Term Paper Samples & Examples

5 Ways Intersectionality Affects Diversity and Inclusion at Work, Term Paper Example

I have always been interested in politics and how the government functions as a young man. I now have a plethora of information and understanding [...]

Pages: 5

Words: 1355

Term Paper

Combating Climate Change Successfully Through COP26 Glasgow 2021, Term Paper Example

The 26th conference of the parties COP26 held in Glasgow in 2021 was a significant moment in global politics to pursue the participation of various [...]

Pages: 9

Words: 2580

Term Paper

Telehealth, Term Paper Example

Telehealth technology has been increasingly used as a means of providing healthcare services to patients, especially during the COVID-19 pandemic. The use of telehealth technology [...]

Pages: 3

Words: 848

Term Paper

Impact of Spanish, Mexican, and Anglo Social Ordering on Mexican-American Culture in California, Term Paper Example

Since California has been ruled by the Spanish, the Mexicans, and the English, the culture of Mexican Americans in the state has evolved at various [...]

Pages: 7

Words: 1809

Term Paper

Empowerment and Social Change, Term Paper Example

The films Calendar Girls (2022) and Raise the Bar (2021) explore empowerment and social change themes. Both films revolve around female protagonists who challenge stereotypes [...]

Pages: 2

Words: 642

Term Paper

Directed Energy Ethics, Term Paper Example

Introduction The use of directed energy weapons is controversial, with many arguing for and against them. Directed energy weapons are a type of weapon that [...]

Pages: 18

Words: 4973

Term Paper

5 Ways Intersectionality Affects Diversity and Inclusion at Work, Term Paper Example

I have always been interested in politics and how the government functions as a young man. I now have a plethora of information and understanding [...]

Pages: 5

Words: 1355

Term Paper

Combating Climate Change Successfully Through COP26 Glasgow 2021, Term Paper Example

The 26th conference of the parties COP26 held in Glasgow in 2021 was a significant moment in global politics to pursue the participation of various [...]

Pages: 9

Words: 2580

Term Paper

Telehealth, Term Paper Example

Telehealth technology has been increasingly used as a means of providing healthcare services to patients, especially during the COVID-19 pandemic. The use of telehealth technology [...]

Pages: 3

Words: 848

Term Paper

Impact of Spanish, Mexican, and Anglo Social Ordering on Mexican-American Culture in California, Term Paper Example

Since California has been ruled by the Spanish, the Mexicans, and the English, the culture of Mexican Americans in the state has evolved at various [...]

Pages: 7

Words: 1809

Term Paper

Empowerment and Social Change, Term Paper Example

The films Calendar Girls (2022) and Raise the Bar (2021) explore empowerment and social change themes. Both films revolve around female protagonists who challenge stereotypes [...]

Pages: 2

Words: 642

Term Paper

Directed Energy Ethics, Term Paper Example

Introduction The use of directed energy weapons is controversial, with many arguing for and against them. Directed energy weapons are a type of weapon that [...]

Pages: 18

Words: 4973

Term Paper