Thursday, November 21, 2019
Summary Essay Example | Topics and Well Written Essays - 1000 words - 3
Summary - Essay Example Intruders try to gain control on the computer systems to access confidential information. Someone may place harmful programs in oneââ¬â¢s computer. To challenge these eventualities, understanding technologies that govern the internet and introducing them into the system without delay is the answer. Some of the networking systems are Broadband, Cable Modem Access with ââ¬Å"shared mediumâ⬠topology and DSL Access. From the point of view of technology, broadband services are different from traditional dial-up services. In the latter case, computer connects to the Internet when it has something specific act to perform. As soon as the action is over, after the specified idle time, the computer will disconnect the call. A different IP address is assigned on each call, since the Internet connection is part of the pool system of the modems. An intruder finds it tough to break-in, into the data in this system. Since Broadband is ââ¬Å"always-onâ⬠service, the intruder has the fixed target to attack. Large networks like corporate and government have protection systems by many layers of security, in the form of firewalls to encryption. The same may not be possible for an individual user of internet. Your ISP takes care about maintaining the services offered to you. The ultimate responsibility for operating the home network is with the concerned individual. Many protection systems are in use for safeguarding the operations and communications of the computers. Protocol, Internet Protocol, IP Addresses, static vs. dynamic addressing, NAT, TCP and UDP Ports, Software firewall - specialized software running on an individual computer, or Network firewall - a dedicated device designed to protect one or more computers. Antivirus software system is one of the important agents that guard oneââ¬â¢s computer against viruses. They indicate the possible presence of viruses. New viruses are discovered daily and there is no fool-proof method to stop them altogether. Pr ofiles needs to be kept up-to-date, and appropriate solutions must be found to tackle the new viruses. The important information security areas are confidentiality, integrity and availability. These fundamental rules are applicable to individual users of networking system, as well as to the corporate and government networks. The user must be constantly on the lookout for new threats, and keep oneââ¬â¢s knowledge up-to-date with the help of new technologies that are introduced for the protection of the networking community. Eternal vigilance and taking simple protective steps are assurances that the system will not be affected by the common threats. The risks in the networking field are both accidental and intentional. Intentional risks are the handiworks of the intruders, and this has to be challenged immediately, as no network user likes to reveal oneââ¬â¢s information to others. Curtailing Information Security Vulnerabilities through Situational Crime Prevention Internet rev olution has engulfed and impacted majority of the segments of life of humankind. Information has taken over the center-stage of business activities, whether it is administration, production or marketing. Consequently, an unfortunate aspect of this positive development is the rapid increase in cyber-crimes. To counter this, many security systems meant to protect computer applications are on the anvil. The business houses and government departments have resolutely reacted to the exploitation of
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.