Preview

Computer Security Issues

Better Essays
Open Document
Open Document
1058 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Computer Security Issues
Security of Computer Network System

Abstract: This paper discussed the secure and dependable problem about the computer network system. On some aspects: the importance of network security, basic theory, function, and the method of solving a problem, etc. Good views for solving the problem are put forward. It strengthens people’s consciousness on network security.

Key words: Computer network Virtual private network Encryption techniques Firewall

Introduction: Along with the computer network technology development, the network security and the reliability have become the question of common interest by all users. The people all hoped their own network system can move reliably, not external intruder disturbance and destruction. Therefore solves the network security and the reliable problem carefully, is a guarantee the network normal operation’s premise and safeguard.

First, the importance of the network security. With the informationization developing fast today, the computer network obtained the widespread application, but along with the network information transmission capacity growing faster, some organizations and departments benefit the speedup with the service operation in the network, while, the data has also suffered to extent attack and destruction. The aggressor may intercept the information in the network, steals the user’s password, the database information; also may tamper with the database content, the forge user’s status, denies own signature. And what is more, the aggressor may delete the database content, the destroy node, releases computer virus and so on. This cause data security and own benefit have received the serious threat.

According to American FBI (US Federal Bureau of Investigation) investigation, the network security creates the economic loss surpasses 17,000,000,000 dollars every year. 75% corporation report finance loss is because the computer system security problem creates. More than 50% safe

You May Also Find These Documents Helpful

  • Good Essays

    operations in organisations and business environments. Security threats on the remote machines can always be averted easily and their impacts are not as serious compared to threats on the central computer system (Kaufman et al, 2002).The central computer system is a valuable resource that must be secured to ensure continued operation in the organisation. Securing a central computer network is the key to ensuring network security in any institution (Kaeo, 1999).…

    • 349 Words
    • 2 Pages
    Good Essays
  • Good Essays

    Network: The network should be designed with security in mind. Its structure must support the company’s policies, relevant laws and regulations, without impairing the organization’s ability to conduct business. The network should be logically and physically separated into distinct and manageable security zones. Traffic between the security zones must be inspected and filtered, to ensure that only authorized network use is permitted, and all access is recorded for future auditing. Multiple devices and methods should be used to ensure security across all parts of the network. In preparing this recommendation, network security design principles have been drawn from the Cisco SAFE Reference Guide [33] and the Council on CyberSecurity’s Critical Security Controls for Effective Cyber Defense Version 5.1 [34].…

    • 598 Words
    • 3 Pages
    Good Essays
  • Good Essays

    With the use of computers and networks, there is also a large focus on security. Whenever there is sensitive data being stored and transferred through computer networks, there is the risk of unauthorized individuals gaining access to this information. To lower these chances, we have several different pieces of software and also require multiple passwords that are unique to each authorized individual and a requirement to change the passwords…

    • 791 Words
    • 4 Pages
    Good Essays
  • Better Essays

    computer

    • 1223 Words
    • 5 Pages

    With development of computer networks and the increasing use of Internet, the discussion of security in transferring data has been put forward as one of important subjects. The reason for it is the accessibility of data in Internet, and their easy access by authorized and unauthorized people. Data packets in Internet pass several intermediate public networks before they reach the target; this makes it easy that other people access data. In case of lack of protection of these data packets, it is impossible to work with Internet.…

    • 1223 Words
    • 5 Pages
    Better Essays
  • Good Essays

    Chapter 3 notes

    • 2990 Words
    • 12 Pages

    Introduction to protecting your network Overview • What are the threats to networks? – Hackers, etc. – Authorized users with good intentions – Natural disasters – A network threat is anything that can potentially damage network data, machines, or users • Explore tools and methods for protection © 2012…

    • 2990 Words
    • 12 Pages
    Good Essays
  • Better Essays

    Computer security is a branch of technology known as information security as applied to computers and networks. The objective of computer security includes protection of information and property from theft, corruption, or natural disaster, while allowing the information and property to remain accessible and productive to its intended users. Computers face constant threats from viruses, worms, Trojan horses, spyware, zero-day attacks, and other types of malware. Achieving effective computer security requires a solution that 's designed to fit your needs today and can adapt to tomorrow 's security threats. Security is becoming increasingly complex, as new Internet threats appear daily or even hourly.…

    • 1007 Words
    • 5 Pages
    Better Essays
  • Powerful Essays

    Network Security Analysis

    • 5047 Words
    • 21 Pages

    As technology develops, network is getting more and more mature. It is known to all that security is the second step after that a successful network has been deployed.…

    • 5047 Words
    • 21 Pages
    Powerful Essays
  • Satisfactory Essays

    Monitoring System

    • 1749 Words
    • 7 Pages

    This system is just use when theres a client who wants to purchase an item…

    • 1749 Words
    • 7 Pages
    Satisfactory Essays
  • Good Essays

    computer

    • 873 Words
    • 3 Pages

    In the modern society, information can benefits both groups and individuals in many different areas. Whereas, at the same time, information also can be used to bring out a threat or even an act of war such as if a cyber attack which take down our financial systems or government systems. Computer security arouses the ethics and risk analysis, and is concerned with topics such as computer crime, the prevention, detection, remediation of attacks, identity and anonymity in cyberspace. In this paper, I want discuss the main problems of computer security and its serious threats.…

    • 873 Words
    • 3 Pages
    Good Essays
  • Good Essays

    You Decide week 5

    • 831 Words
    • 3 Pages

    Good day MS Kim, I would like to explain the available options of Access Control Lists what will do and what types of ACLs there are. Complex ACLs can be tricky but will better for security for the network. There are three different types of ACLs, Dynamic ACL, Reflexive ACL, and Time Based ACL. Each ACL is unique to the type of network we have. Dynamic are also called lock-and-key ACLs which only allow IP traffic only. Also the lock-and-key authenticates the user and permits limited access through the firewall router for a host for a time. Time Based ACLs are a specific time that traffic is allowed on the network. When the device determines that an ACL applies to a packet, it tests the packet against the rules. The first matching rule determines whether the packet is permitted or denied. If there is no match, the device applies a default rule. The device processes packets that are permitted and drops packets that are denied. “ACLs protect networks and specific hosts we would be able to specify certain days and hours of which the user will have access to the network. With this type of ACL there is more control over permitting or denying access to resources. Reflexive ACL allows outbound traffic from the network and limits the inbound traffic. This allows greater control over what traffic is on the network and able to expend the control list. Also, with Reflexive when ACL, an unknown IP address is trying to gain access, it will put the IP address in a temporary ACL group and will await replies from the network and the network will automatically remove the IP address when the session is over. It is probably in the best interest for our network to concentrate on Reflexive ACLs for these reasons;…

    • 831 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    Network Monitoring System

    • 3845 Words
    • 16 Pages

    In this information age the network is essential to the organization. Information and the rate at which it can be obtained and distributed, is key to the economic success of companies in the information age. This is the reason why the computer network is the central nervous system of most organizations today. Organizations must have a network that is available and reliable. Since networks consist of a complicated set of software and hardware components, reliability comes at the cost of redundancy, diligence, man power and management.…

    • 3845 Words
    • 16 Pages
    Powerful Essays
  • Good Essays

    General Computer Security

    • 2174 Words
    • 9 Pages

    Computer systems can never have absolute security in real life. They exist to be used; not to be admired in a locked room sealed away from the outside world. Systems can, however, be made more secure than they…

    • 2174 Words
    • 9 Pages
    Good Essays
  • Good Essays

    Retele de Calculatoare

    • 1246 Words
    • 5 Pages

    Network security is a problem that network administrators face. It is something that network administrators should keep a careful eye on. For example, if the home network does not have any security measures in place, then the person is at a high risk of data loss due to hacking. Network security is something that businesses do not take very lightly because they want to protect their valuable information and network resources from hackers. It is a problem because of unauthorized use and can be resolved by increasing the security encryption levels.…

    • 1246 Words
    • 5 Pages
    Good Essays
  • Powerful Essays

    CIS8018

    • 1742 Words
    • 7 Pages

    The aim of present paper is to analyze information security in context of Nickol Bay hospital located in Australia. Information risk management system would be analyzed for the current organization along with several protection mechanisms which are in place in order to safeguard information system against any kind of undesired usage of information system. In addition to protection mechanism role of personnel in information security and consideration for legal & ethical aspect for information security would be considered. Finally present paper would review implementation of PRTG network in context to Nickol Bay hospital so that network traffic in the hospital can be managed in such a manner that possible bottlenecks can be removed. Implementation of PRTG network monitor would help the organization to avoid situation for failure of information system due to excessive load so that data can be saved in such critical situations.…

    • 1742 Words
    • 7 Pages
    Powerful Essays
  • Satisfactory Essays

    Network Security

    • 495 Words
    • 2 Pages

    This paper is going to present an impact on network security. In this present scenario, network security plays an important role. Network security is the process of preventing and detecting unauthorized use of your computer. This paper aims to clear the concept about network security and how to protect (or) secure our messages by using a firewall and the types of network securities are available in the present scenario and also we have tried to point out the problems to computer and networks we have also reveals how to tackle this problems using method like firewall and cryptography.…

    • 495 Words
    • 2 Pages
    Satisfactory Essays