Securing the Computer Network

1169 Words3 Pages

Whether a person is an occasional computer user, works in a major corporation, or within a government agency there is a dangerous risk out there. That risk is one that everyone must be concerned with, inadequate computer security. Computer security has become essential in today’s well connected digital world. Everyone wants to communicate with someone at sometime, and normally these communications need to be secure. If these communications are going through any sort of electronic device they are passing through some type of communications network. Whether the information is traveling around the world or just across the room to another computer this information is at risk. Safeguards must be implemented to the computers and networks that they use to protect them from viruses, intruders, and system failures. “A computer security risk is any event or action that could cause a loss of or damage to computer hardware, software, data, information, or processing capability” (Shelly). One of the most common risks is a computer virus. A virus can change software on a computer for the purpose of spreading itself to other files. This can cause failure of a program or even the operating system itself. Another common threat is known as a worm. “A worm is a program that copies itself repeatedly, for example in memory or on a network, using up resources and possibly shutting down the computer or network” (Shelly). These computer viruses and worms are launched in four basic ways: when a user opens an infected file, runs an infected program, boots the computer with infected removable media inserted in a drive or plugged in a port, or connects an unprotected computer to a network. A very common way these viruses and worms spread is as e-mail at... ... middle of paper ... ... is training.” When the end users are aware of the different threats and understand the importance of the various security measures they will be contributing greatly to the overall security of the computer network. Works Cited Barnett, Brad L. Personal interview. 3 July 2011. "IMPROVING ONLINE SECURITY." Scientific American 299.3 (2008): 96-99. Academic Search Elite. EBSCO. Web. 30 June 2011. Shelly, Gary B., Thomas J. Cashman, and Misty E. Vermaat. Discovering Computers 2008. N.p.: Thomson Course Technology, 2008. 556-605. Print. STAJANO, FRANK, and PAUL WILSON. "Understanding Scam Victims: Seven Principles for Systems Security." Communications of the ACM 54.3 (2011): 70-75. Academic Search Elite. EBSCO. Web. 30 June 2011. Swartz, Nikki. "Securing Your Network. "Wireless Review 15.19 (1998): NR17. Academic Search Elite. EBSCO. Web. 27 June 2011.

More about Securing the Computer Network

Open Document