Back to category: Technology

Limited version - please login or register to view the entire paper.

Computer insecurity

Today, both the Internet and corporate intranets are simply crawling with people from all walks of life that are continuously trying to test the security of various systems and networks. Some of these people are seeking some sort of intellectual high, while others are fueled by more treacherous motives such as revenge or stealing for profit. To gain access to your system an attacker may try several different measures to cause you some kind of disruption or takeover your system. In this paper we will discuss a few of the problems associated with computer security in the twenty-first century, best system practices, and some ways you can prevent intrusion related problems.
Data in an IT system is at risk from various sources—user errors, viruses, malicious, and non-malicious attacks. Accidents can occur and attackers can gain access to the system and disrupt services, render systems useless, alter, delete, or steal information. An IT system may need protection for one or more of t...

Posted by: Garrick Christian

Limited version - please login or register to view the entire paper.