Securing the Computer Network Essay

1162 Words 5 Pages
Whether a person is an occasional computer user, works in a major corporation, or within a government agency there is a dangerous risk out there. That risk is one that everyone must be concerned with, inadequate computer security. Computer security has become essential in today’s well connected digital world. Everyone wants to communicate with someone at sometime, and normally these communications need to be secure. If these communications are going through any sort of electronic device they are passing through some type of communications network. Whether the information is traveling around the world or just across the room to another computer this information is at risk. Safeguards must be implemented to the computers and networks that …show more content…
They wait for certain conditions or actions to trigger them. A Trojan horse will not normally spread to other computers. In 2008 there were more that 180,000 know viruses, worms, and Trojan horse programs (Shelly). The term hacker is well known in the computer world it can be defined as someone one who accesses a computer or network illegally. They often claim the intent of their security breach is to improve security by exposing weaknesses within the system (Shelly). There is a slightly different type of individual that is referred to as a cracker. They break into computer systems like the hacker, but their intent is to destroy data, steal information or other malicious actions. These threats to computer security cannot be totally eliminated, but there are ways to greatly reduce the chances of a security compromise. Such as never booting up a computer with removable media inserted or plugged in to it. These are item such as cds, dvds, usb flash drives to name a few. Even if the boot up is unsuccessful a malicious file could still be transferred. Also never open an e-mail attachment unless it is from someone you trust and are expecting it. Many unscrupulous people will send viruses as attachments and try to get you to forward it to your friends. One of the best ways to cut down on the chances of getting and even spreading of these malicious

Related Documents