Computer Science Having Read Newman's Chapter 1, Term Paper

Excerpt from Term Paper :

Computer Science

Having read Newman's Chapter 1, would you consider the security requirements across all environments to be the same?

Not all security requirements are the same in all network environments. Some systems are more vulnerable to the threat of viruses that permanently infiltrate the network's hardware, other to worms that do not permanently damage the hardware but cause programs to 'crash' through such tricks as forcing programs to infinitely reboot themselves. Certain systems, of which Microsoft and Oracle are good examples, excel at modifying or blocking with firewalls certain systemic vulnerabilities after hackers have found ways to broach these problems, and fixing the problem after the fact, but are not nearly as good at detecting holes prior to such exposure

Do you think SLAs will solve our security problem? Discuss why or why not.

Service Level Agreement, otherwise known as an SLA details the responsibilities of an Informational Technology (IT) services provider and its users, as well as the penalties assessed when the service provider violates any element of the SLA. An SLA also identifies and defines the service offering, the supported products, evaluation…

Sources Used in Document:

Works Cited

Carr, Jim. (2004) "Service Level Agreements." Network Magazine. Retrieved on May 25, 2004 at;jsessionid=YX1YTTMU1B4EUQSNDBCSKHQ?articleId=17601085&pgno=2

Newman, Robert C. (2003). Enterprise Security. Upper Saddle River, New Jersey: Prentice Hall.

Cite This Term Paper:

"Computer Science Having Read Newman's Chapter 1 " (2004, May 25) Retrieved December 15, 2019, from

"Computer Science Having Read Newman's Chapter 1 " 25 May 2004. Web.15 December. 2019. <>

"Computer Science Having Read Newman's Chapter 1 ", 25 May 2004, Accessed.15 December. 2019,