The paper “ Information Security – Risks, Security Plans, and Defensive Measures” is a potent variant of an essay on information technology. The aim of providing this computer security may differ but it mostly entails protecting computer network information from corruption, hackers, theft, or its preservation. This will depend entirely on security policy. Network security enforces constraints on computers which vary from other systems requirements as they mostly are applied as restrictions on what a network is supposed to undertake. Network traffic analysis and threat assessment should be done at regular intervals. One of the most important elements in ensuring network security is keeping the users of the system informed of possible threats and how to avoid them. IntroductionsIn the world today, people rely on computers and the internet for almost everything such as communicating, entertainment, shopping as well as making bank transactions and investments.
Without information security, computers, and users’ facts and data are at risk. This statement proves that information technology avoids or catches all possible threats and repair unavoidable vulnerabilities. It, therefore, stands that this process provides important work to remain all information intact and avoid future attacks from outsiders or hackers.
As a result, information security is perceived as information’ s refuge from corruption and unexpected aggression. These criminals are capable of designing software that will enable them to infiltrate computer systems and retrieve personal and confidential information. These programs also cause great damage to computer systems. Different kinds of PC/LAN security programs such as antivirus and anti-spyware are thus necessary and all of them have to be updated upon expiry. The use of firewalls, as well as authentication features, can restrict the people who try to gain access to computer systems. It is not an easy task to set up an effective PC/LAN security system but it is a necessary thing for an individual to do in order to protect computer systems, information as well as children.
There are a lot of harmful programs that internet users should protect themselves from on the internet but they keep changing their features frequently and there are newer threats that appear over and again. This is because the intruders are constantly discovering vulnerabilities to exploit in computer programs.
This is the reason why an evaluation of the potential risks of a home PC/LAN is required to protect the computers and the users. This evaluation could create perfect procedures to maintain all information and data accurately with minimal flaws. The usual approaches used to enhance security on computer networks comprises of the understated points Physically restrictions to accessing computers and only those authorized personnel allowed to access the computers Using hardware means which enforce regulations on computer programs, hence evading depending on any specific computer programs to offer security The use of operating systems approaches which enforce regulations on computer programs to evade depending on computer programs Application of programming strategies in order to enhance computer programs reliability and challenge subversion RisksThere are many kinds of attacks, and there are subtle variations on each kind.
Some threats are common, only too real in actual experience, while others are hypothetical, theoretically possible but never yet observed. Despite the variety, threats can be divided into categories: external attacks, intrusions, and viruses, and worms.
Dittrich, D., 2006. Network monitoring/Intrusion Detection Systems (IDS); University of Washington.
Branch, P., 2013. Formulating the security policy and introduction to firewalls, Swinburne University of Technology.
Hill, D. G. (2009). Data Protection: Governance, Risk Management, and Compliance. Boca Raton, FL: CRC Press.
Institute for Career Research, 2000. Computer Security Management. Chicago, IL: Institute for Career Research.
Kaufman. C, Perlman. R. & Speciner, M., 2002. Network Security: Private Communication in a public world. New York: Prentice-Hall.
Luker, M. A. & Petersen, R. J., 2003. Computer and Network Security in Higher Education. San Francisco, CA: Jossey-Bass Inc Pub.
Pfleeger, C. P., Pfleeger, S. L., & Shah, D. N., 2006. Security in Computing. Mumbai: Pearson Education, India.