Computer Security By Rozeberger And Zeldich. The Essay

PAGES
2
WORDS
713
Cite

¶ … Computer Security by Rozeberger and Zeldich. The tutorial gave a basic overview of computer security, including viruses, worms, and Trojan horses. It discussed how to avoid attacks or at least to become aware of the potential of attacks. The tutorial also looked at how hackers work, to help explain how breaks are performed. I chose this tutorial because I believe that computer security is one of the most significant and serious issues for any emerging IT professional. It a network is not secure, it will become vulnerable to attack by hackers. Therefore, any other work that an IT professional does on a computer must be considered secondary to the safety of the network. The tutorial began with an extensive history of computer hacking. This history was fascinating. While I do not feel like it would contribute to my daily knowledge as an IT professional, in that I could not use that information to secure current networks, I felt as if it gave me significant background information. For example, I learned that early hackers seemed motivated by profit (they hacked into phone systems to...

...

Hackers exploit vulnerability, so it is up to the computer professional to eliminate vulnerability wherever possible. The two most interesting components were password security and social engineering. While adequate software protection should be able to protect the network from worms, viruses, and Trojan horses, they are useless if users allow access to the network by unauthorized people. What this made me realize is that, as an IT professional, a significant part of my job will necessarily involve the education of and communication with network users, to help keep the network safe.
In Debby Koren's tutorial, Local Area Network Portal, one can learn about the different ways to connect networks. I selected this tutorial because I feel as if connectivity is the key to computer services. After all, a computer that stands alone and is not connected to any other devices…

Sources Used in Documents:

References

Koren, D. (2011). Local area network portal. Retrieved January 9, 2012 from Rad University

website: http://www2.rad.com/networks/infrastructure/lans/main.htm

Rozenberger, A. & Zeldich, O. (2005). Computer security. Retrieved January 8, 2012 from Rad University website: http://www2.rad.com/networks/2005/computersecurity/main.htm


Cite this Document:

"Computer Security By Rozeberger And Zeldich The" (2012, January 09) Retrieved April 26, 2024, from
https://www.paperdue.com/essay/computer-security-by-rozeberger-and-zeldich-53562

"Computer Security By Rozeberger And Zeldich The" 09 January 2012. Web.26 April. 2024. <
https://www.paperdue.com/essay/computer-security-by-rozeberger-and-zeldich-53562>

"Computer Security By Rozeberger And Zeldich The", 09 January 2012, Accessed.26 April. 2024,
https://www.paperdue.com/essay/computer-security-by-rozeberger-and-zeldich-53562

Related Documents
Computer Security
PAGES 4 WORDS 1081

Computer Security In the past few years, viruses like "I Love You" and "SoBig" have generated much publicity and apprehension and highlighted problems of computer security. In the last month alone, experts estimate that 52 new viruses have spread through computer networks. In addition, the growing incidence of identity theft also illustrates the growing sophistication of hackers and their tools. This paper examines the main problems related to keeping the information on

Computer Security
PAGES 4 WORDS 1378

Security Assessment and Recommendations My Name My Teacher SE571 Principles of Information Security and Privacy TOC o "1-3" h z u AS Company Overview Two Security Vulnerabilities Software Vulnerability Recommended Solutions Telecommunications Closet Security Recommendation Impact on Business Processes Budget Aircraft Solutions (AS) is a globally recognized leader in the design and fabrication of component products and services for companies in the electronics, commercial, defense, and aerospace industry. Their manufacturing plants are located in San Diego, California and a second, in Santa

Computer Security: Corporate Security Documentation Suitable for a Large Corporation Item (I) in-Depth Defense Measures (II) Firewall Design (III) Intrusion Detection System (IV) Operating System Security (V) Database Security (VI) Corporate Contingency of Operation (VII) Corporate Disaster Recovery Plan (VIII) Team Members and Roles of Each (IX) Timeline with Goal Description (X) Data Schema (XI) Graphical Interface Design (XII) Testing Plan (XIII) Support Plan (XIV) Schematics Computer Security: Corporate Security Documentation Suitable for a Large Corporation (I) In-Depth Defense Measures Information Technology (IT) Acceptable Use Policy The intentions of

Computer Vulnerabilities Computer Security Vulnerabilities The extent of the problem This is not a small issue. The book "Analyzing Computer Security" lays out the following scenario: "First, 20 million U.S. smart phones stop working. Next follow outages in wireline telephone service, problems with air traffic control, disruptions to the New York Stock Exchange, and eventually severe loss of power on America's East Coast" (Pfleeger & Pfleeger, 2011, 3). The authors are talking about

The public-key cryptography approach also creates a more efficient means of cryptographic security by ensuring RSA-compliant encryption and decryption throughout the secured network (Sarkar, Maitra, 2010). As a result the use of public-key cryptography hardens and makes more secure each connection and node on a network (Chevalier, Rusinowitch, 2010). C3. What will help you trust a public-key that belongs to an unfamiliar person or Web site, and why does it

who have access to the network do not maintain proper security procedures and remain well-informed regarding potential risks and updated procedures and policies (Cobb, 2011; Whitman & Mattord, 2011; ICR, 2008). Any security policy must, after being properly designed and established, be communicated clearly and comprehensively to all relevant personnel, which in today's organizations typically means anyone with access to a company computer and/or the company network, or who