Security in the Computer World

1126 Words3 Pages

INTRODUCTION

The main purpose of security is to protect assets. Looking back into history, the big walls acted as a safeguard to a fortress or a kingdom. There were massive and strong doors which stopped any perpetuator from entering without permission. The same thing applies in the computer world, with the only difference being that it's virtual.

There are closed networks and open networks. The closed networks are available for a person who belongs to that entity. On the other hand, open networks are available for the rest of the people. Previously, networks were designed as closed for a set of people and sites which do not connect to other people. With the advent of personal computers, LANs, and the wide-open world of the Internet, the networks of today are more openAs e-business and Internet applications continue to grow, the key to network security lies in defining the balance between a closed and open network and differentiating the good guys from the bad guys .
There has been a drastic change in the economy in the last decade. Everything shifted from paper to computers and from manual to automatic, thus giving rise to computers and increasing reliability on them. Consequently, this gave rise to breaches in information system in companies as everything was computerized. All of the works were carried out through networking. Thousands of servers were being used to run a company. The financial transaction became more online.

According to a survey held by Princeton Survey Research Associates International (PSRAI) in 2010, 46% of U.S adults or 58% of internet users said they bank online. In 2011, 18% of cellphone owners said they have used their phone to check their balance or transaction business with a bank.

With the evo...

... middle of paper ...

...uetooth misconception. http://www.sans.edu/research/security-laboratory/article/bluetooth last accessed October 19, 2013
• http://us.norton.com/botnet/ last accessed October 19, 2013
• The economics of Botnets, http://www.megapanzer.com/2009/11/27/the-economics-of-botnets/ last accessed October 19, 2013
• http://www.welivesecurity.com/2012/01/03/bootkit-threat-evolution-in-2011-2/ last accessed October 19, 2013
• The cradle of cyber war, http://hackmageddon.com/2012/08/ last accessed October 19, 2013
• GAO analysis of US-CERT data
• Ponemon Institute/Symantec
• The cost of cybercrime http://money.cnn.com/galleries/2011/technology/1107/gallery.cyber_security_costs/index.html last accessed October 19, 2013
• Network Security 1 and 2 Companion Guide, vulnerabilities threats and attacks http://ptgmedia.pearsoncmg.com/images/1587131625/samplechapter/1587131625content.pdf

Open Document