Information Security
Name:
Tutor:
Course:
Date:
Information Security
The various processed and methodologies designed and implemented in protection, prevention, mitigation and eradication of any threats towards processed data is referred to as information security. It is determined by unauthorized access, disclosure, misuse, use, modification, destruction, or disruption of the information contained (Vacca 13). The operating system Windows 7 has had various vulnerabilities reported in its operational use. Of significance is the alteration of administration rights within the system. The vulnerability exposes the fragile nature of development of threats through bugs, virus, and crafted packets. The bugs in Windows 7 vulnerability sources use features of power, which can be exploited by hackers at any given time without easy detection. The threat from virus uses similar administration routes through the system of the operating system. They can go unnoticed or embedding to the preinstalled programs (Prince). The level of the threats is significant to the information security and sharing from one user to another.
Vulnerability
of Windows 7 through crafted packets requires sophistication with the
administration rights guaranteed by the different users towards access of
information. The presence of Java Script within the tactics of social
engineering, development of malware and embedding requirements increases the
threshold of the contained risks. In addition, the use of attributes in
cracking the win32k.sys files results in exploitation of the security
availabilities within the systems. However, it is worthy to note that majority
of the vulnerability measures can be mitigated with advice on the
administration rights of the systems. McCallion argues that by elimination of
the administration rights or reverting back to default, not tinkering with the
security systems in place and authentic purchases of required packets can help
offset the vulnerability threats. There is no guarantee nonetheless.
Works Cited
McCallion, Jane. “The Windows 7 and 8 Vulnerability You Need to Know.” ALPHR, 4 December 2014. Web. 27 June 2015. <http://www.alphr.com/security/1000131/the-windows-7-and-8-vulnerability-you-need-to-know-about>
Prince, Brian. “Microsoft Investigating Windows 7 Vulnerability Reported as Highly Critical.” SecurityWeek, 20 December 2014. Web. 27 June 2015. <http://www.securityweek.com/microsoft-patches-critical-windows-security-vulnerability>
Vacca, John R. Computer, and Information Security Handbook. Amsterdam: Morgan Kaufmann Publishers is an imprint of Elsevier, 2013. Print.
Top-quality papers guaranteed
100% original papers
We sell only unique pieces of writing completed according to your demands.
Confidential service
We use security encryption to keep your personal data protected.
Money-back guarantee
We can give your money back if something goes wrong with your order.
Enjoy the free features we offer to everyone
-
Title page
Get a free title page formatted according to the specifics of your particular style.
-
Custom formatting
Request us to use APA, MLA, Harvard, Chicago, or any other style for your essay.
-
Bibliography page
Don’t pay extra for a list of references that perfectly fits your academic needs.
-
24/7 support assistance
Ask us a question anytime you need to—we don’t charge extra for supporting you!
Calculate how much your essay costs
What we are popular for
- English 101
- History
- Business Studies
- Management
- Literature
- Composition
- Psychology
- Philosophy
- Marketing
- Economics