Information Security

Name:

Tutor:

Course:

Date:

Information Security

            The various processed and methodologies designed and implemented in protection, prevention, mitigation and eradication of any threats towards processed data is referred to as information security. It is determined by unauthorized access, disclosure, misuse, use, modification, destruction, or disruption of the information contained (Vacca 13). The operating system Windows 7 has had various vulnerabilities reported in its operational use. Of significance is the alteration of administration rights within the system. The vulnerability exposes the fragile nature of development of threats through bugs, virus, and crafted packets. The bugs in Windows 7 vulnerability sources use features of power, which can be exploited by hackers at any given time without easy detection. The threat from virus uses similar administration routes through the system of the operating system. They can go unnoticed or embedding to the preinstalled programs (Prince). The level of the threats is significant to the information security and sharing from one user to another.

            Vulnerability of Windows 7 through crafted packets requires sophistication with the administration rights guaranteed by the different users towards access of information. The presence of Java Script within the tactics of social engineering, development of malware and embedding requirements increases the threshold of the contained risks. In addition, the use of attributes in cracking the win32k.sys files results in exploitation of the security availabilities within the systems. However, it is worthy to note that majority of the vulnerability measures can be mitigated with advice on the administration rights of the systems. McCallion argues that by elimination of the administration rights or reverting back to default, not tinkering with the security systems in place and authentic purchases of required packets can help offset the vulnerability threats. There is no guarantee nonetheless.


Works Cited

McCallion, Jane. “The Windows 7 and 8 Vulnerability You Need to Know.” ALPHR, 4 December 2014. Web. 27 June 2015. <http://www.alphr.com/security/1000131/the-windows-7-and-8-vulnerability-you-need-to-know-about>

Prince, Brian. “Microsoft Investigating Windows 7 Vulnerability Reported as Highly Critical.” SecurityWeek, 20 December 2014. Web. 27 June 2015. <http://www.securityweek.com/microsoft-patches-critical-windows-security-vulnerability>

Vacca, John R. Computer, and Information Security Handbook. Amsterdam: Morgan Kaufmann Publishers is an imprint of Elsevier, 2013. Print.

Calculate your order
275 words
Total price: $0.00

Top-quality papers guaranteed

54

100% original papers

We sell only unique pieces of writing completed according to your demands.

54

Confidential service

We use security encryption to keep your personal data protected.

54

Money-back guarantee

We can give your money back if something goes wrong with your order.

Enjoy the free features we offer to everyone

  1. Title page

    Get a free title page formatted according to the specifics of your particular style.

  2. Custom formatting

    Request us to use APA, MLA, Harvard, Chicago, or any other style for your essay.

  3. Bibliography page

    Don’t pay extra for a list of references that perfectly fits your academic needs.

  4. 24/7 support assistance

    Ask us a question anytime you need to—we don’t charge extra for supporting you!

Calculate how much your essay costs

Type of paper
Academic level
Deadline
550 words

How to place an order

  • Choose the number of pages, your academic level, and deadline
  • Push the orange button
  • Give instructions for your paper
  • Pay with PayPal or a credit card
  • Track the progress of your order
  • Approve and enjoy your custom paper

Ask experts to write you a cheap essay of excellent quality

Place an order
Verified by MonsterInsights