Computer Fundamentals the Pace of Essay

Excerpt from Essay :



Subtopic 6: Job management and protection; include a serious discussion of security aspects

The most commonly leveled criticism of operating systems is the inherent lack of security they have (Funell, 2010). Defining operating systems to have partitioned memory is just the start, as Microsoft learned with their Windows NT platform. Dedicated memory partitions by user account can be hacked and have been (Funell, 2010). The need for greater levels of user authentication is required, including the use of biometrics for advanced systems that have highly confidential data within them. The reliance on security-based algorithms that also seek to analyze patterns of use to anticipate security threats are increasingly in use today (Volkel, Haller, 2009). This aspect of an operating system can capture the levels of activity and the patterns they exhibit, which can provide insights into when a threat is present or not. The use of predictive security technologies, in addition to biometrics, is changing operating systems rapidly in 2011 (Funell, 2010).

References

Boudreau, K.. (2010). Open Platform Strategies and Innovation: Granting Access vs. Devolving Control. Management Science, 56(10), 1849-1872.

Jason Dedrick, & Kenneth L. Kraemer. (2005). The Impacts of it on Firm and Industry Structure: The Personal Computer Industry. California Management Review, 47(3), 122-142.

Furnell, S.. (2010). Usability vs. complexity - striking the balance in end-user security. Network Security, 2010(12), 13-17.

Larus, J.. (2009). Spending Moore's Dividend. Association for Computing Machinery. Communications of the ACM, 52(5), 62.

(Pankratius, Schulte, Keutzer, 2011)

Pankratius, V., Schulte, W., & Keutzer, K.. (2011). Guest Editors' Introduction: Parallelism on the Desktop. IEEE Software, 28(1),…

Sources Used in Document:

References

Boudreau, K.. (2010). Open Platform Strategies and Innovation: Granting Access vs. Devolving Control. Management Science, 56(10), 1849-1872.

Jason Dedrick, & Kenneth L. Kraemer. (2005). The Impacts of it on Firm and Industry Structure: The Personal Computer Industry. California Management Review, 47(3), 122-142.

Furnell, S.. (2010). Usability vs. complexity - striking the balance in end-user security. Network Security, 2010(12), 13-17.

Larus, J.. (2009). Spending Moore's Dividend. Association for Computing Machinery. Communications of the ACM, 52(5), 62.

Cite This Essay:

"Computer Fundamentals The Pace Of" (2011, January 14) Retrieved May 26, 2020, from
https://www.paperdue.com/essay/computer-fundamentals-the-pace-of-5480

"Computer Fundamentals The Pace Of" 14 January 2011. Web.26 May. 2020. <
https://www.paperdue.com/essay/computer-fundamentals-the-pace-of-5480>

"Computer Fundamentals The Pace Of", 14 January 2011, Accessed.26 May. 2020,
https://www.paperdue.com/essay/computer-fundamentals-the-pace-of-5480

Advertisements