Monday, June 10, 2019

Information Security and Privacy Essay Example | Topics and Well Written Essays - 1500 words

Information Security and Privacy - Essay ExampleAlthough there are several methods to go along un classic entryway personars occasionally are able to get through the security systems, and it is therefore essential for organizations to also be adequate to(p) f find intruders.Before beginning to discuss how networks can be secured to improve the prevention f intruders, the reason why it is important to prevent intruders will be pointed bulge out to help understand why network security is vital for many telephone circuites.As organizations around the world rely heavily on computers for all their cultivation storage and processing, unprotected computers and networks can be an easy means for anyone to obtain this information. Also as organizations become increasingly dependent on computers and networks to run the business any damage can cause numerous problems for a business with possible costs within the millions. (Fitzgerald 1-7)These costs are cause by the inability to use comp uters therefore affecting productivity and sometimes causing the complete inability to run the business. As computer systems assist heavily in running businesses and investment firm many f the organizations private data it is easy to see why organizations need to secure their computer systems or it will cost them.Passwords is a comparatively easy and cheap ... It might seem that if companies do not connect their networks to the internet there will be no security problems. Therefore nitty-gritty security is needed on networks even if it is not connected to the internet. Two main types f security can be used here passwords and visible security. (Fitzgerald 1-7)Passwords is a relatively easy and cheap form f security that can be implemented on a network, it also provides a bully level f security as long as passwords are well kept by employees. With the use f passwords network managers can superintend the use f the network by its users by being able to see who logs in and where the ir logged in to, as well as what they have done. With to a greater extent advanced technology network managers can also detect when and where there is an intruder and what the intruder has done. Fundamentally passwords will keep those who are not authorised away from restricted sections f the network, ultimately sustaining an adequate level f security. Physical security is basically using physical means to prevent original employees from using certain sections or computers on the network. This may include computers being kept in secure rooms with key card or recognition security.As organizations connect their networks to the internet, the risk f intruders rises dramatically as there are millions f users online it also allows users from any part f the world to access your private network. This security issue is heightened as users within the network begin to access areas f the internet that are less secure. The most commonly used method to help prevent intruders and improve the sec urity f the network when connected to the internet is the use f internet firewalls. Basically a firewall is capable f preventing

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.

Winston Churchill Britains Guardian Angel - 759 Words

Winston Churchill: Britain’s Guardian Angel The date was August, 1940. London was a mess of smoking ruins and rubble. Somber visag...