This website uses cookies to ensure you have the best experience. Learn more

Computer Network & Information Security Essay

1478 words - 6 pages

Media has focused on computer security of big businesses and how they have been breached, yet individuals do not stop and think about their own personal computer safety. Information can be stolen or damaged, access of personal computers can be gained without permission, viruses and worms can enter creating problems for a user, and our computers may be susceptible to cyber-attacks from hackers. Yet most computer users are new to the technology or do not realize the dangers at hand. This is why users need to learn how to keep their personal computer safe. To achieve a good level of security, there are many important elements that must be taken into account: authentication, access control, data ...view middle of the document...

If your computer is connected to the internet then you don’t need some hacker to personally attack your system. There are thousands of computer programs to do this job on the net. Even if you use your internet just to check your e-mails, you could still be a huge
target for attackers. Is it easy to break into my system? Well yes and no. Intruders are always on the lookout for new vulnerabilities in the system and computer software companies are in a race with them to patch up those vulnerabilities. It is a matter of who wins the race and it’s a never ending race. On one side there are antiviruses, firewalls, network admins etc. to help in the security of our systems and on the other hand there are hacking tools and unending information to break into computer systems. Information security is concerned with three main areas: (1.) Confidentiality – information should be available to only those who rightfully have access to it. (2.) Integrity – information should be modified only by those who are authorized to do so. (3.) Availability—information should be accessible to those who need it when they need it. These concepts apply to home Internet users as well as businesses.

At this point, I would like to discuss the various kinds of attacks and risks on Personal computers connected to the internet. (1.) Trojan horse program: Trojan programs are a common way to trick users to install 'Backdoor' programs. These can allow the attackers to easily access the computer without the knowledge of the user and change configuration or infect all the files. (2.) Denial of Service: This type of attack loads your system beyond capacity so that it crashes. In most cases these attacks can be prevented through latest patches. (3.) Cross-site scripting: In this kind of attack a web developer may attach a script to something sent to a web site in the form of an URL etc. When the website responds to you, the malicious script is transferred to your browser. These scripts can do damage to the system. (4.) E-mail spoofing: E-mail 'spoofing' is when an e-mail message appears to have originated from one source when it actually was sent from another source. E-mail spoofing is often an attempt to trick the user into revealing sensitive information like bank info, passwords etc. E-mail spoofing can range from harmless pranks to social engineering ploys. (5.) E-mail viruses: Viruses and other types of malicious code are often spread as attachments to e-mail message. Before opening an attachment, it is best to make sure you know the real source of that attachment. The Melissa virus spread precisely because it originated from familiar address. (6.) Chat client: Internet chat applications, such as IRC network, provide a mechanism
for information to be transmitted bi-directional between computers on the internet. Chat clients provide groups of individual with the means to exchange dialog, web URL’s, and in many cases, files of any type. (7.) Packet sniffing: A packet sniffer is...

Other Essays Like Computer Network & Information Security

Ntc 411 Week 5 Individual Assignment

1045 words - 5 pages such as IPS, network scanners, IDS, and vulnerability assessment kits should; be part of the system. It is essential to protect one’s computer network in today’s global market environment. Intrusion detection system (IDS) is one of the significant software that can monitor intrusion activities. In Afghanistan we utilize and IPS, IDS, web proxy, event collector, and firewall as a security solution. As the demand of network, technology in the

IS4680 Lab 2 Questions Essay

662 words - 3 pages Certification Name CMSEI Computer Security Incident Handler ( CSIH ) CompTIA A+ CompTIA Network+ CompTIA Security+ EC-Council Certified Ethical Hacker( CEH ) (ISC)² Certification and Accreditation Professional ( CAP ) (ISC)² Certified Information Systems Security Professional  ( CISSP ) (or CISSP Associate ) (ISC)² Information Systems Security Architecture Professional  ( CISSP-ISSAP ) (ISC)² Information

A Comparison of Information Security Surveys

3096 words - 13 pages findings will be discussed. An analysis and comparison of the surveys to include both methodologies and findings will also be offered. Computer Security Institute (CSI) CSI is a professional membership organization serving practitioners of information, network and computer-enabled physical security from the level of system administrator to the Chief Information Security Officer (About the Computer Security Institute, 2009). CSI

Network Research Proposal

1693 words - 7 pages . Network Security Devices Business Needs Cyber security threats are increasing on a daily basis. Schools and Universities are no exception. Because the university contains sensitive personal and financial information of thousands of students and faculty members, securing a network is essential to this network design proposal. Proposed Network Security Devices To protect and secure our network we will utilize Cisco NAC appliance

Context of the Problem

796 words - 4 pages Context of the Problem Anthony Smith-Ranson Research Methods RES 531 Context of the Problem Information technology (IT) is now solidly a vital part of any organization (Stockman, Leung, Nyland, & Said, 2013). As the use of computer networks, especially the Internet, has become pervasive, the concept of computer security has expanded to denote issues pertaining to the networked use of computers and their resources (Kinkus, 2002

Computer Security

1158 words - 5 pages , firewalls , network admins etc to help in the security of our systems and on the other hand there are hacking tools and unending information to break into computer systems. Information security is concerned with three main areas: Confidentiality – informations should be available to only those who rightfully have access to it Integrity – information should be modified only by those who are authorized to do so Availability—information should be

Information Security

3489 words - 14 pages measures in place, the protection tends to be ineffective with staff taking a reactive approach over a proactive approach. The article by Allen Johnston and Ron Hale examine the planning for information security and enhancing the quality of security. “A survey conducted by the Computer Security Institute and the Federal Bureau of Investigation found:” 56% of respondents reported unauthorized computer system use during the past year. These

Security Monitor

543 words - 3 pages wrongdoing or security vulnerability. Rudolfsky (1983-2010), “It will be difficult for a company to achieve information security objectives without security event monitoring. Security event monitoring is derived from the general practice of monitoring activities that occur on a computer system. Security event monitoring involves (1) recording information that represents activity and (2) analyzing recorded information to identify and respond to

Security Policy Framework

1330 words - 6 pages still maximizing on all monies as well as protecting all information. With data you must always think of ways to help ensure that it is being kept secure, gets to the correct recipient, and keeps its integrity. There are so many different ways that we can make this happen. Security policies being set on the network by administrators, setting group polices that restricts what someone will be allowed to do on the network, or by implementing input

Heartbleed Bug

601 words - 3 pages Computers and the software used to operate them in my opinion are the most fascinating tools created by man. As a result of the computer arise all kind of computer viruses and hackers which intrigued me even more so I decided to study in the field of network security. During this learning process, I would to obtain a vast knowledge of the different kinds of computer viruses; how these programs are written by hackers and the security programs

A Fully Functional Network Design for Shelly Fashion

2974 words - 12 pages , unanticipated, or unintentional modification. Examples: Census information, economic indicators, or financial transactions systems. * Availability: The system contains information or provides services that must be available on a timely basis to meet mission requirements or to avoid substantial losses. Examples: Systems critical to safety, life support, and hurricane forecasting. Our security strategy involves establishing computer security

Related Papers

Computer And Network Security Essay

1798 words - 8 pages introducing malicious code, including, but not limited to, viruses, worms, Trojan horses, e-mail bombs, spyware, adware, and keyloggers. * Port scanning or security scanning on a production network unless authorized in advance by Information Security. Purpose/Objectives The purpose of this policy is to establish acceptable and unacceptable use of electronic devices and network resources at XYZ Credit Union/Bank at all locations. XYZ

Information Technology/Network Security Threats Essay

1465 words - 6 pages . Integrity verification procedure (IVP): Procedure that scans data and confirms its Integrity. Transformation procedure (TP): Procedure that only allows changes to a constrained Data item all subjects and objects References : Michael Whitman Ph.D., CISM, CISSP, Herbert Mattord copyright © 2010 Cengage Learning Shirley Radack, Editor Computer Security Division Information Technology Laboratory National Institute of Standards and Technology

Assignment Information Use Paper

671 words - 3 pages . What I’m trying to learn programmer C++ TCP/IP network. Also I want to learn anytime of network security programs. I’m trying to become a cyber security for my job in future. I know I need to the follow requirement to become a cyber security If you'd like to train to become a cyber security specialist, you should obtain a 4-year bachelor's degree in computer programming, computer science, information science or computer engineering. English

A Key Concept In Information Systems

1049 words - 5 pages Computer and network security has become very important to businesses, government, military, and individuals. Many companies have been compromised and personal information obtained and used without authorization. It is very important to have computer and network security to keep hackers and malware from collecting data and destroying a computer system and network. Computer security protects all of the data that is stored on your computer. Every