Some Ways of Computer System Protections

Computers became an essential part of our life since the last century. People cannot imagine their lives without computers and especially without the Internet. People search for some information on the Internet, play different online games, sell or buy something, communicate through the Internet, look for a job and offer some vacancies and use the computer for other needs in the present life. It is not a secret that personal computer systems are under threat every minute. Nowadays a lot of companies work under the question of how to protect computer systems and infrastructure.

Let our writers help you! They will create your custom paper for $12.01 $10.21/page 322 academic experts online See more

We are going to consider some ways of computer system protections in this Research Paper. Gary P. Schneider in his “Electronic Commerce” (2006):

covers emerging online technologies and trends and their influence on the electronic commerce marketplace. This edition highlights important security issues, such as spam and phishing, their role in organized crime and terrorism, identity theft, and online payment fraud.

Mark Hoover (2005, July) in his article pays readers’ attention that users’ network security is also under threat when they download and use so-called productivity software such as instant messaging, webmail, peer-to-peer voice over IP, and file-sharing tools, social networks, etc.

Several years ago people used the Internet only for giving or receiving information, nowadays people use the Internet for more complicated purposes. Herrmann M. (2009, February) in his article “Security Strategy: From Soup to Nuts” says that:

The more business is done on the Internet, the more need for regulation of that business. Many of the existing government and industry regulations deal with security measures, and for that reason, it’s more important than ever to secure your company’s IT infrastructure, no matter how large or small your company. Even if for some reason you’re not subject to regulations, it’s still a very good idea to secure your assets as if you were. At some point, your status might change, and besides, nobody wants to be hacked.It is a common knowledge that the easier access to the Internet the person has, the worse security is.

Order now, and your customized paper without ANY plagiarism will be ready in merely 3 hours! Let's go!

For prevention of unauthorized division to the computers all corporate and department networks, and especially enterprises use technology of intranet. The put filters (fire-wall) between an intranet and Internet that actually means an exit from single address space. Yet greater safety will be given by walking away from protocol of Tcp/ip and access in Internet through sluices. Hoover, M. in his article “Network Security: The New Perimeter; Security Threats Can No Longer Be Contained in the DMZ. How Do You Protect Every Resource, and Every User’s Traffic, No Matter Where It’s Coming From?” (2005, July) writes that to protect our computers we should use protective technologies. He made a list of simplest types of protection:

Credential checking Must-have — password, certificate, strong authentication.

Software configuration checking Useful — this configuration management tool reduces infection rates and therefore reduces the work the rest of the solution needs to do.

Host-based or network-based roughly equal in effectiveness, but “eyeballs” network-based is easier to deploy and maintain.

Requires 802.1X? For ease of deployment and incremental migration, other options also should be supported.

Admission granularity Guest Portal is a must-have, but additional granularity is optional for most customers due to the policy complexities.

We'll complete your 1st custom-written order tailored to your instructions with 15% OFF! Use discount

To sum it up it should be mentioned that protecting computer networks is the most important field of study nowadays. The developments in this sphere continue. And a lot of decisions of the problem are given every day, but still there are a lot of problems which are opened and there are no solutions for them.

Works Cited

Herrmann M. (2009). Security Strategy: From Soup to Nuts. Information Security Journal: A Global Perspective, 18 (1).

Hoover, M. (2005). Network Security: The New Perimeter; Security Threats Can No Longer Be Contained in the DMZ. How Do You Protect Every Resource, and Every User’s Traffic, No Matter Where It’s Coming From? Business Communications Review, 35.

Schneider G.P. (2006). Electronic commerce. Thomson Course Technology.

Cite this paper

Select style

Reference

Paperroni. (2022, March 4). Some Ways of Computer System Protections. Retrieved from https://paperroni.com/some-ways-of-computer-system-protections/

Work Cited

"Some Ways of Computer System Protections." Paperroni, 4 Mar. 2022, paperroni.com/some-ways-of-computer-system-protections/.

1. Paperroni. "Some Ways of Computer System Protections." March 4, 2022. https://paperroni.com/some-ways-of-computer-system-protections/.


Bibliography


Paperroni. "Some Ways of Computer System Protections." March 4, 2022. https://paperroni.com/some-ways-of-computer-system-protections/.

References

Paperroni. 2022. "Some Ways of Computer System Protections." March 4, 2022. https://paperroni.com/some-ways-of-computer-system-protections/.

References

Paperroni. (2022) 'Some Ways of Computer System Protections'. 4 March.

Copy this

This essay was added to the database by its author, a student ready to help you with your studies. Feel free to refer to it in your text, but do not forget to cite it appropriately. In case you are the one who wrote this paper, and you no longer want it posted on Paperroni, please let us know using a special form.

Find out the price of your paper