This website uses cookies to ensure you have the best experience. Learn more

Securing The Computer Network Essay

1251 words - 5 pages

Whether a person is an occasional computer user, works in a major corporation, or within a government agency there is a dangerous risk out there. That risk is one that everyone must be concerned with, inadequate computer security. Computer security has become essential in today’s well connected digital world. Everyone wants to communicate with someone at sometime, and normally these communications need to be secure. If these communications are going through any sort of electronic device they are passing through some type of communications network. Whether the information is traveling around the world or just across the room to another computer this information is at risk. Safeguards must be implemented to the computers and networks that they use to protect them from viruses, intruders, and system failures.
“A computer security risk is any event or action that could cause a loss of or damage to computer hardware, software, data, information, or processing capability” (Shelly). One of the most common risks is a computer virus. A virus can change software on a computer for the purpose of spreading itself to other files. This can cause failure of a program or even the operating system itself. Another common threat is known as a worm. “A worm is a program that copies itself repeatedly, for example in memory or on a network, using up resources and possibly shutting down the computer or network” (Shelly). These computer viruses and worms are launched in four basic ways: when a user opens an infected file, runs an infected program, boots the computer with infected removable media inserted in a drive or plugged in a port, or connects an unprotected computer to a network. A very common way these viruses and worms spread is as e-mail attachments, when opened by an unsuspecting user the file begins doing what is programmed to do. Lastly, there are programs known as Trojan horses, they are programs that hide within or look like a legitimate program (Shelly). They wait for certain conditions or actions to trigger them. A Trojan horse will not normally spread to other computers. In 2008 there were more that 180,000 know viruses, worms, and Trojan horse programs (Shelly).
The term hacker is well known in the computer world it can be defined as someone one who accesses a computer or network illegally. They often claim the intent of their security breach is to improve security by exposing weaknesses within the system (Shelly). There is a slightly different type of individual that is referred to as a cracker. They break into computer systems like the hacker, but their intent is to destroy data, steal information or other malicious actions.
These threats to computer security cannot be totally eliminated, but there are ways to greatly reduce the chances of a security compromise. Such as never booting up a computer with removable media inserted or plugged in to it. These are item such as cds, dvds, usb flash drives to name a few. Even if the boot up is...

Find Another Essay On Securing the Computer Network

Network Security Essay

1567 words - 6 pages Network Security 1. What is network security? Network security has changed significantly over the past years. There is more and more data to monitor and analyze in order to detect the activity of your data and systems. Securing a network has many variables. Password authentication, network access, patches, anti-virus protection, intrusion detection, firewall and network monitoring tools are just a few of the things you can do to

All about Network Security Essay

873 words - 4 pages Network security is as important as securing your own home. There are networks all around us and large or small businesses all rely on their computer network to keep running smooth. Network security is not as easy an issue as it sounds. There are many technicalities involved especially when your network is the backbone of your business. Increment in the number of networks brings with it new and lethal security threats. All the important

Investigation of Network Security Requirements and their Impact on Performance with the aim of establishing configurations fit for the purpose

1015 words - 5 pages software such as Microsoft project on a server and therefore, enabling every one that has access to the server to use the resource. This saves the organization expenses as they don’t have to buy separate licenses for every user’s computer. However, this great development has led to a number of security threats and challenges in the organization from outsiders through intrusions, once hackers identify a loop hole in the network they can be able to

Consolidated Electronics Group Incident Response Plan

952 words - 4 pages logs, and assigning permissions based on a system of least privilege. Network security is primarily concerned with securing the perimeter of the network to prevent unauthorized intrusion. This includes the use of firewalls, intrusion detection systems (IDS), securing VPN, and blocking unnecessary ports. All hosts on the network must run and regularly update malware protection software. And all employees should participate in periodic security

The Internet's Impact on Information Technology Security

1408 words - 6 pages /0,3800013656,39166479,00.htmPrince, B. (2007, July 3). Experts: enterprises must focus on VoIP security. eWeek, n/a. Retrieved February 19, 2008, from General OneFile database.Stevens, A. (2007, July 12). Securing a small business network. Personal Computer World, n/a. Retrieved February 19, 2008, from General OneFile database.Trombly, M. (2007, October 1). Hackers up the ante, network protectors respond. Securities Industry News, n/a. Retrieved February 19, 2008, from General OneFile database.

Intorduction To IT Security

1201 words - 5 pages measures to safeguard the network from intrusion. Effective administrative procedures that ensure personnel are properly trained and continually advised of updates and/or changes to security. In today’s world the collection, processing, and sharing of information has reached all time highs. It is because of this that the Internet as well as "IT Networks" occasionally referred to as "Intranets" need securing to protect from

Your Career As An IT Professional

2128 words - 9 pages Abstract Information technology, or IT for short, is the backbone of today’s advanced technology. Network and computer systems administrators design, install, and support business’s computer systems. Responsibilities include maintaining a LAN or WAN, Internet and intranet structures. These IT professionals maintain network hardware/software, analyze and repair problems, and oversee networks to make sure it is available to users. Administrators

Suggestions for Securing your Windows and Linux/Unix Servers

894 words - 4 pages . It is important to secure the Windows and Unix/Linux servers from known shortcomings and vulnerabilities or ensure that your network infrastructure is more secure, bear in mind that “securing your system can be a lot of work, but the payoff in protection against attacks is well worth it. Just as having insurance costs a little money but pays off by covering large expenses in case of accident, securing your system may cost time (and money

What is Digital Forensic?

1795 words - 8 pages RAM, present network connections, logon sessions, network traffic and logs, and any open files because various sources of data have various degrees of protection, an order of volatility should be used to maintain the most ephemeral data first. Order of volatility is defined as “ the sequence of volatile data that must be preserved in a computer forensic investigation” (Ciampa, 2012). The table below lists the sequence of volatility of data in a

Computer Security Since 2001

2099 words - 8 pages INTRODUCTION Computer security is now an important area for any network administrator, systems analyst, information technology technician, databases administrator to the computer scientist. Although this list shows the professionals dabbling in Information Technology, it should not be misconstrued that the average computer user at home should not be concerned about computer security. A computer, be it a personal computer, a laptop or a simple

Wireless Network Technology

1921 words - 8 pages organizations. As a result of wireless networks computer users have become more mobile. There is no need for users to be near the connection point to use internet (Solms, BV & Marais, E 2004). However, wireless technology also generates new threats and alters the existing information security risk profile. It is crucial to secure a wireless network if we want to avoid the unauthorized users from accessing our data and downloading materials. These days

Similar Essays

The Life Of A Network & Computer Specialist

1821 words - 8 pages Lee JohnstonConnie WongGen 300February 2, 2004The Life of a Network & Computer SpecialistInformation Technology is an exhilarating profession that requires commitment and hard work. A specialist may sit at a desk or out in the field correcting problems. The problems could consist of fixing programs, technical briefs, and an assortment of other assignments. In the beginning, a specialist starts below an analyst. In several years a specialist

What Is Network Security Essay

631 words - 3 pages essential it is an often overlooked business component. Securing an organization's computer system can cost anywhere from $500 and exceeding $50,000, depending upon a company's size and needs. A properly secured network can end up saving untold amounts of money in terms of keeping up with the safety and soundness of the reputation of a company, client trust and sales. Maintaining a secure system can also end up saving money on equipment and software

Network Administrator Essay

1025 words - 4 pages in securing computer networks ( Bureau of Labor Statistics, U.S. Department of Labor, Occupational Outlook Handbook, 2006-07 Edition, Computer Support Specialists and Systems Administrators, on the Internet at (visited September 25, 2007). References Education Online (2007) Career articles/Network System Administrator. Retrieved September 25, 2007, from (

Overview Of Network Security Essay

1050 words - 4 pages Prevention System that helps detects intrusion by monitoring suspicious activity. It also prevents the suspicious activity from doing harm to your computer by eliminating it. “Effective network security targets a variety of threats and stops them from entering or spreading on your network.” (Cisco’s Network Security Article). Effective ways of securing a network communication are authentication and encryption. Encryption is a process of where you