Expensive Security Software for Pcs Discussion Chapter

Total Length: 980 words ( 3 double-spaced pages)

Total Sources: 0

Page 1 of 3



6.a.

What I like particularly about this set of requirements is the backup suggestion. While one might take great pains to protect one's machine and actions by means of software, there is always the possibility that something may go fatally wrong. Hence, it is vital to back up one's work in order to ensure that it remains safe, regardless of any dangers to the computer itself.

b.

In this segment, I believe that the suggestion of parental control is vitally important. With the increasingly free availability of information on the Internet, children have much more access to questionable material than the case was in the past. This means that it is the responsibility of parents to ensure that they are safe. In a household with children, this is therefore a very important component.

7.1.

What kind of cryptography is being developed for cloud computing? It is important to know this answer in order to determine what types of information might safely be stored and manipulated in the cloud. Is there any such technology currently available, or is it only being developed as yet?

2.

What kind of cryptography is available for cellular phones other than Kryptomobile? The importance of this question lies in the fact that the user might be able to determine the best type of technology that is available for his or her specific phone.

3.

If I use a Bluetooth device, how might I determine what type of cryptography is available for it, and what type should I use to optimize my security? This is important to know in order to help a user understand what strategies to use to improve the security of his or her Bluetooth devices.

Stuck Writing Your "Expensive Security Software for Pcs" Discussion Chapter?



8.a.

With the widespread use of cellular phones, many users have become concerned about the safety of the information and conversations they have on these devices. There is indeed cryptography available to ensure the privacy and safety of such conversations. One example is Kryptomobile, which cannot be intercepted. It therefore protects the user against privacy invasions such as call tapping or intercepting for investigation, commercial purposes, or espionage.

b.

While cloud computing is a useful infrastructure for data storage and application use, there is not as yet a good cryptography application to secure the information that users store on this platform. Indeed, cloud operators can manipulate client data, and may not be trustworthy as doing this. Experts are involved in developing cryptographic protocols to mitigate these security risks; however, no standard seems to be in place as yet. Users should therefore exercise care when using cloud computing.

c.

Cryptography is, however, available for Bluetooth devices, especially when the more recent versions of this technology are used. Additional approved cryptographic mechanisms are available at the application layer to help users protect their information. New Bluetooth technology might not require additional cryptographic applications, although it is best if users check whether….....

Show More ⇣


     Open the full completed essay and source list


OR

     Order a one-of-a-kind custom essay on this topic


sample essay writing service

Cite This Resource:

Latest APA Format (6th edition)

Copy Reference
"Expensive Security Software For Pcs" (2011, November 25) Retrieved June 28, 2025, from
https://www.aceyourpaper.com/essays/expensive-security-software-pcs-47873

Latest MLA Format (8th edition)

Copy Reference
"Expensive Security Software For Pcs" 25 November 2011. Web.28 June. 2025. <
https://www.aceyourpaper.com/essays/expensive-security-software-pcs-47873>

Latest Chicago Format (16th edition)

Copy Reference
"Expensive Security Software For Pcs", 25 November 2011, Accessed.28 June. 2025,
https://www.aceyourpaper.com/essays/expensive-security-software-pcs-47873