StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Unauthorized Access to a Computer System and Defensible Networks - Assignment Example

Cite this document
Summary
The paper "Unauthorized Access to a Computer System and Defensible Networks" will describe ethical issues regarding hacking and related certifications, and also defensible networks. Sometimes there are ethical reasons for unauthorized access to a computer system depending on the motives. …
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER92.5% of users find it useful
Unauthorized Access to a Computer System and Defensible Networks
Read Text Preview

Extract of sample "Unauthorized Access to a Computer System and Defensible Networks"

If someone is involved in criminal operations and security agents feel that getting into his system without his permission may be the way to get evidence against him then that will be ethical. Also, if a company suspects something wrong is going on with its network then it may be ethical to investigate the network connected to its network ( Bejtlich, 2003).

            Ethical hacking is a good practice as it helps companies to enhance the security of their computer system. Without a proper audit of the computer system, no real computer security exist. However, the certificate must be issued with a lot of caution and the authorized hackers should testify on oath.  

Question 2

            A Defensive Network Architecture is an information planning for the network security system which is well maintained and controlled and very closely monitored to identify weaknesses in the system (McClure et al., 1999). This architecture must be up to date to resist current forms of attack. Defensive network architecture is important mostly for large organizations since it helps to monitor their networks. Network monitoring also assists in evaluating environmental changes (McClure et al., 1999). For example, when there is an increase or decrease in traffic and assets which are currently maintained and secured. Our organization has an architecture in place that they use to control and monitor their security system. Since it is an organization that deals with confidential documents, this helps to secure its data.

            In conclusion, a defensible network has become so important that on 14th March 2014, Scott Air Force Base III marked a major progression when they signed a Department of Defense's Joint Information Environment (Shelly, 2014).

Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“606 week 1 Assignment Example | Topics and Well Written Essays - 250 words”, n.d.)
606 week 1 Assignment Example | Topics and Well Written Essays - 250 words. Retrieved from https://studentshare.org/information-technology/1638472-606-week-1
(606 Week 1 Assignment Example | Topics and Well Written Essays - 250 Words)
606 Week 1 Assignment Example | Topics and Well Written Essays - 250 Words. https://studentshare.org/information-technology/1638472-606-week-1.
“606 Week 1 Assignment Example | Topics and Well Written Essays - 250 Words”, n.d. https://studentshare.org/information-technology/1638472-606-week-1.
  • Cited: 0 times

CHECK THESE SAMPLES OF Unauthorized Access to a Computer System and Defensible Networks

Cyber Attacks on America

Cyber-attack refers to an attack originated from a computer system against another computer system or a website, aimed at altering, stealing or erasing information or have the functionality of the targeted computer system impeded or destroyed (Lee, 2013).... Additionally, Lee (2013) observes the incapacity to protect all computer networks or cell phones or pagers from attack, especially now that 95% of these gadgets are operated and owned by the private sector....
10 Pages (2500 words) Literature review

Physical Security Related to Computer Systems

In terms of computers and the internet, physical security is defined as a blockade placed about a computing system using secured operating systems and other protective measures to prevent unauthorized access to the information stored on it.... This report provides a good and basic understanding of the field of physical security and its importance in sustaining the livelihood and success of an organization or a home-made business with a foolproof system to avoid physical access to the enemy....
8 Pages (2000 words) Term Paper

Information securtiy

nformation security is generally defined as the protection of information from a wide variety of threats, such as, getting accessed by unauthorized persons, disclosed, sold or destroyed, without the consent of the owner of the information.... The report is divided into two parts explicitly....
12 Pages (3000 words) Essay

Hacker Gary McKinnon

First of all, Gary McKinnon's hacking exposes the lack of effective security measures within highly confidential computer networks of the US Military and NASA.... He was able to hack the NASA and the Department of Defense computers so easily because he was so conscious about his presence in these networks.... First of all, installation of regularly updated Firewall or other security programs can keep hackers away from accessing computer networks....
2 Pages (500 words) Essay

Network/System Forensics

Cyber attack can be referred to as the computer to computer attacks that are carried out to erase, alter, or steal information or to impede or destroy the functioning of the targeted computer system.... This is so when there is downloading of the spyware onto the hard drive or the server without the prior knowledge or the permission of the owner of the system or the equipment....
10 Pages (2500 words) Research Paper

Tools Used in Tightening Information Security

Information security is about the protection of information as well as information systems from unauthorized access, use, leak, disruption, modification, scrutiny, inspection, or obliteration.... Therefore, information security involves protecting the information as well as information systems against unauthorized access or information interference, whether in storage, processing, or transfer, and against denying services to authorized users.... Most of this data is collected, processed, and stored electronically, and transmitted across networks to other storage devices....
13 Pages (3250 words) Essay

Threats to Information Holdings

A recent review of an organization's information security control system established some deficiencies in certain key areas including, incident response, business continuity and disaster recovery, social engineering use of personnel, lack of employees' awareness on the range of information threats, and defective password security.... Another physical information holding is UPS which is used to avoid computer data loss from unexpected power failures and computer breakdowns....
14 Pages (3500 words) Essay

Information Security - Risks, Security Plans, and Defensive Measures

The use of firewalls, as well as authentication features, can restrict the people who try to gain access to computer systems.... The usual approaches used to enhance security on computer networks comprises of the understated points are presented.... The important element in ensuring network security is keeping the users of the system informed of possible threats.... t is not an easy task to set up an effective PC/LAN security system but it is a necessary thing for an individual to do in order to protect computer systems, information as well as children....
14 Pages (3500 words) Essay
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us