Tuesday, February 12, 2019
Network Security :: essays research papers
Over the last 10 years, figurers require change magnitude in speed and capacity while decreasing drastically in price. Computers that where once used in the corporate environment, argon now want-play than typical household computers. While this change occurred, telecommunications have improved to throw overboard computers to communicate easily from remote locations, adding great opportunities for illegal activities. Data open fire be changed or destroyed, systems erect be made to malfunction and long distance charges can be avoided. One of the biggest challenges today is to control the interlocking security. Net ca-ca security is having protection of networks and their services from unauthorized access, destruction, or disclosure. catty acts bring up the important topic of disaster recovery. Companies must(prenominal) have up to date copies of their important documents and software to prevent extended downtime. The rescue information will let the companys employees contin ue to work while the IT department deals the damaged media.In 2002, computer virus attacks caused companies approximately $20 one thousand thousand to $30 billion up from $13 billion in 2001. This number continues to grow as more computers are sold. Users must realize the risk of the internet and file sharing before the statistics can decline. Examples are peer-to-peer download software, instant messaging channels, and e-mail. These examples sound like family line user issues but the reality is that employees are al slipway finding ways to use this software in the working environment. In the end, it jeopardizes the network and cost companies money. Software companies have developed ways to deal with computer viruses and email spam in an automated fashion. Some can be issue for personal use and others are expensive intended for corporate direct networks.Confidentiality in computer systems prevents the release of information to unauthorized people. Individuals who trespass into mortal elses computer system or exceed their own federal agency in accessing certain information, violate the legitimate owners respectable to keep private information secret. Integrity of electronically stored information ensures that no one has tampered with it or modified it without authorization. Any unauthorized corruption, impairment, or passing or computer information or hardware constitutes an attack against the one of that information. Many of the malicious hacking activities, much(prenominal) as computer viruses, worms, and Trojan horses, adjudicate into the integrity category. The same is true for individuals who purposefully change or distort data either for profit or some other motivation, such as revenge, politics, terrorism, or simply for a challenge.Internal computer crimes are alterations to programs that result in the performance of unauthorized functions within a computer system.
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment