Computers became an essential part of our life since the last century. People cannot imagine their lives without computers and especially without the Internet. People search for some information on the Internet, play different online games, sell or buy something, communicate through the Internet, look for a job and offer some vacancies and use the computer for other needs in the present life. It is not a secret that personal computer systems are under threat every minute. Nowadays a lot of companies work under the question of how to protect computer systems and infrastructure.
We are going to consider some ways of computer system protections in this Research Paper. Gary P. Schneider in his “Electronic Commerce” (2006):
covers emerging online technologies and trends and their influence on the electronic commerce marketplace. This edition highlights important security issues, such as spam and phishing, their role in organized crime and terrorism, identity theft, and online payment fraud.
Mark Hoover (2005, July) in his article pays readers’ attention that users’ network security is also under threat when they download and use so-called productivity software such as instant messaging, webmail, peer-to-peer voice over IP, and file-sharing tools, social networks, etc.
Several years ago people used the Internet only for giving or receiving information, nowadays people use the Internet for more complicated purposes. Herrmann M. (2009, February) in his article “Security Strategy: From Soup to Nuts” says that:
The more business is done on the Internet, the more need for regulation of that business. Many of the existing government and industry regulations deal with security measures, and for that reason, it’s more important than ever to secure your company’s IT infrastructure, no matter how large or small your company. Even if for some reason you’re not subject to regulations, it’s still a very good idea to secure your assets as if you were. At some point, your status might change, and besides, nobody wants to be hacked.It is a common knowledge that the easier access to the Internet the person has, the worse security is.
For prevention of unauthorized division to the computers all corporate and department networks, and especially enterprises use technology of intranet. The put filters (fire-wall) between an intranet and Internet that actually means an exit from single address space. Yet greater safety will be given by walking away from protocol of Tcp/ip and access in Internet through sluices. Hoover, M. in his article “Network Security: The New Perimeter; Security Threats Can No Longer Be Contained in the DMZ. How Do You Protect Every Resource, and Every User’s Traffic, No Matter Where It’s Coming From?” (2005, July) writes that to protect our computers we should use protective technologies. He made a list of simplest types of protection:
Credential checking Must-have — password, certificate, strong authentication.
Software configuration checking Useful — this configuration management tool reduces infection rates and therefore reduces the work the rest of the solution needs to do.
Host-based or network-based roughly equal in effectiveness, but “eyeballs” network-based is easier to deploy and maintain.
Requires 802.1X? For ease of deployment and incremental migration, other options also should be supported.
Admission granularity Guest Portal is a must-have, but additional granularity is optional for most customers due to the policy complexities.
To sum it up it should be mentioned that protecting computer networks is the most important field of study nowadays. The developments in this sphere continue. And a lot of decisions of the problem are given every day, but still there are a lot of problems which are opened and there are no solutions for them.
Herrmann M. (2009). Security Strategy: From Soup to Nuts. Information Security Journal: A Global Perspective, 18 (1).
Hoover, M. (2005). Network Security: The New Perimeter; Security Threats Can No Longer Be Contained in the DMZ. How Do You Protect Every Resource, and Every User’s Traffic, No Matter Where It’s Coming From? Business Communications Review, 35.
Schneider G.P. (2006). Electronic commerce. Thomson Course Technology.