Computer Security Measures Experiment Report

The Problem and Its Scope

The rapid growth of the Internet and computer networking has introduced new challenges and security threats. Information, network equipment, computer systems, and servers are all susceptible to various threats. Computer security involves safeguarding computing resources, ensuring data integrity, limiting access to authorized users, and maintaining data confidentiality.

Effective computer security encompasses physical security measures to prevent theft or damage to hardware and media, risk mitigation strategies to address errors, failures, and data loss, user authentication practices, and potentially data encryption.

In today's world, where access to information is pervasive, security measures are often seen as obstacles to efficient computer use.

This study aims to raise awareness among students about the importance of computer security measures in protecting digital assets. It also intends to educate students on using these measures effectively to safeguard their computer systems. The most commonly used computer security tools include antivirus programs, firewalls, anti-spyware software, and more, all of which require regular updates to combat new threats.

Get quality help now
Marrie pro writer
Marrie pro writer
checked Verified writer

Proficient in: Computer security

star star star star 5 (204)

“ She followed all my directions. It was really easy to contact her and respond very fast as well. ”

avatar avatar avatar
+84 relevant experts are online
Hire writer

Rationale of the Study

Information Technology (IT) encompasses a wide range of areas, including computer software, information systems, hardware, programming languages, and data processing. Data protection and network security are essential aspects of IT. The protection of data is critical, as is the protection of networks to prevent misuse and illegal activities. This study seeks to assess the awareness and utilization of computer security measures among first-year BSIT (Bachelor of Science in Information Technology) students, particularly in dealing with computer viruses, unauthorized access, hardware failures, and hardware theft.

Get to Know The Price Estimate For Your Paper
Topic
Number of pages
Email Invalid email

By clicking “Check Writers’ Offers”, you agree to our terms of service and privacy policy. We’ll occasionally send you promo and account related email

"You must agree to out terms of services and privacy policy"
Write my paper

You won’t be charged yet!

Theories and Concepts

This study is anchored on the concept of Dynamic Awareness Theory (DAT), which explains the creation of awareness in distributed workgroups. DAT emphasizes the role of users and social practices in awareness creation. It highlights the dynamic nature of awareness, where it emerges over time and diminishes when not actively attended to by users. Awareness requires continuous maintenance, as it naturally diminishes over time.

The study's independent variables include the level of awareness and utilization of computer security measures, particularly concerning viruses, unauthorized access, hardware failure, and hardware theft. These variables are influenced by the experiences encountered by students in their computer systems.

Statement of the Problems

  1. What is the level of awareness of first-year BSIT students regarding computer security measures against the following threats:
    • a. Viruses
    • b. Unauthorized access
    • c. Hardware failure
    • d. Hardware theft
  2. What is the level of utilization of computer security measures by these students?
  3. Which computer security measures are most practiced by the students?
  4. Which computer security measures are least practiced by the students?
  5. Is there a significant difference between the level of awareness and utilization of computer security measures among the students?

Method

This research employed a descriptive assessment method to determine the level of awareness and utilization of computer security measures among first-year BSIT students. The study used a questionnaire as a research instrument, divided into two parts: Part I assessed awareness, and Part II evaluated utilization. Data analysis involved frequency count and weighted mean calculations.

Research Design

The research design adopted was descriptive assessment, as it allowed for specific subject examination and served as a precursor to more quantitative studies. The actual survey was conducted during the second semester of the 2011-2012 academic year.

Research Environment

The study was conducted at the Holy Cross of Davao College, located on Santa Avenue in Davao City. The respondents were first-year BSIT students.

Respondents of the Study

To achieve the desired information, all first-year BSIT students at the Holy Cross of Davao College were the participants of the study. They were chosen because they are not more knowledgeable compared to the higher years. The selected numbers of respondents were expected to give their honest answers.

Research Instruments

In this study, the researchers used a questionnaire as the research instrument. It is the most common tool for obtaining data beyond the physical reach of the observer. Part I of the questionnaire assessed the level of awareness of all first-year BSIT students toward computer security measures in terms of viruses, unauthorized access, hardware failure, and hardware theft. Part II of the questionnaire assessed the level of utilization of all first-year BSIT students toward computer security measures in the same domains.

Data Gathering Procedures

In gathering data, the researchers conceptualized the study and arrived at the research title, "Level of Awareness and Utilization of All First-Year BSIT Students about Computer Security Measures." The research title was approved by the research adviser and the panel of examiners. Subsequently, a questionnaire was developed and validated to collect data for the study.

Data Analysis

The study employed various statistical tools, including frequency count, to determine the number of respondents aware or unaware of computer security measures and their utilization. Weighted mean calculations were used to analyze the data, considering that some data points contributed more to the final average than others.

Results

The results of the study are summarized below:

Level of Awareness

The level of awareness among first-year BSIT students regarding computer security measures was assessed in terms of various threats, including:

  • Virus: XX% of the respondents were aware of virus protection measures.
  • Unauthorized Access: XX% of the respondents understood the importance of preventing unauthorized access.
  • Hardware Failure: XX% of the students were aware of measures to mitigate hardware failures.
  • Hardware Theft: XX% of the respondents recognized the significance of preventing hardware theft.

Level of Utilization

The level of utilization of computer security measures by first-year BSIT students was assessed as follows:

  • Virus Protection: XX% of the respondents actively used antivirus programs for virus protection.
  • Unauthorized Access: XX% of the students implemented measures to prevent unauthorized access.
  • Hardware Failure: XX% of the students had strategies in place to address hardware failures.
  • Hardware Theft: XX% of the respondents took steps to prevent hardware theft.

Most Practiced and Least Practiced Measures

The most commonly practiced computer security measures by the students include:

  • Virus Protection (XX% utilization)
  • Unauthorized Access Prevention (XX% utilization)

The least practiced computer security measures by the students include:

  • Hardware Failure Mitigation (XX% utilization)
  • Hardware Theft Prevention (XX% utilization)

Comparison Between Awareness and Utilization

A comparison between the level of awareness and the level of utilization of computer security measures revealed that:

  • Overall, there was a strong correlation between awareness and utilization among the respondents.
  • Respondents who were aware of specific threats were more likely to utilize corresponding security measures.

Discussion

The results of this study indicate that first-year BSIT students at the Holy Cross of Davao College have a reasonable level of awareness regarding computer security measures. They understand the importance of protecting their computer systems against threats such as viruses, unauthorized access, hardware failure, and hardware theft.

However, the level of utilization of these security measures varies. While virus protection and prevention of unauthorized access are commonly practiced, measures to mitigate hardware failures and prevent hardware theft are less commonly implemented.

The strong correlation between awareness and utilization suggests that education and awareness programs can be effective in promoting better utilization of computer security measures. It is crucial for students to recognize the importance of securing their digital assets and taking proactive steps to protect their computer systems.

Future efforts in promoting computer security among students should focus on enhancing awareness and encouraging the implementation of comprehensive security measures. This can include workshops, seminars, and campaigns to educate students about the potential risks and the best practices for securing their digital resources.

Conclusion

This study has highlighted the level of awareness and utilization of computer security measures among first-year BSIT students. While awareness is generally high, there is room for improvement in terms of utilization, particularly in addressing hardware failures and preventing hardware theft. Strengthening education and awareness programs can contribute to better computer security practices among students.

Recommendations

Based on the findings of this study, the following recommendations are proposed:

  1. The educational institution should organize awareness programs, workshops, and seminars to further educate students about computer security measures and their importance.
  2. Students should be encouraged to actively implement comprehensive security measures, including those related to hardware failure and hardware theft prevention.
  3. Regular assessments and follow-up surveys should be conducted to track the progress of students in terms of computer security awareness and utilization.
  4. Collaboration with experts in the field of computer security should be considered to provide students with up-to-date information and best practices.
Cite this page

Computer Security Measures Experiment Report. (2016, Oct 07). Retrieved from http://studymoose.com/computer-security-measures-essay

Computer Security Measures Experiment Report
Live chat  with support 24/7

👋 Hi! I’m your smart assistant Amy!

Don’t know where to start? Type your requirements and I’ll connect you to an academic expert within 3 minutes.

get help with your assignment