scroll to top
Stuck on your essay?
Get ideas from this essay and see how your work stacks up
Word Count: 1,473
The world of computers has changed dramatically over the past 25 years Twenty-five years ago most computers were centralized and managed in data centers Computers were kept in locked rooms and links outside a site were unusual Computer security threats were rare and were basically concerned with insiders These threats were well understood and dealt with using standard techniques computers behind locked doors and accounting for all resources Twenty-five years later many systems are connected to the Internet The Internet is a huge network and has no boundaries Businesses find an increasing need to connect to the internet to take advantage of the business opportunities The security framework for systems with internet connections is however very different Information on the internet can be accessed from anywhere in the world in real time While this is good for the spread of information it has also allowed for the proliferation of malicious information Hacker tools are now widely available on the internet Some web sites even provides tutorials on how to hack into a system giving details of the vulnerabilities of the different kinds of systems It does not take an expert programmer to break into a system Anyone with malicious intentions can search the internet for programs to break into a system which is not properly secured It is hence vital for businesses with connections to the internet to ensure that their networks are secure This is important to minimize the risk of intrusions both from insiders and outsiders Although a network cannot be 100 safe a secure network will keep everyone but the most determined hacker out of the network A network with a good accounting and auditing system will ensure that all activities are logged thereby enabling malicious activity to be detected There are basically three overlapping types of security risks 1Bugs or misconfiguration problems in the Web server that allow unauthorized remote users to oSteal confidential documents not intended
@Kibin is a lifesaver for my essay right now!!
- Sandra Slivka, student @ UC Berkeley
Wow, this is the best essay help I've ever received!
- Camvu Pham, student @ U of M
If I'd known about @Kibin in college, I would have gotten much more sleep
- Jen Soust, alumni @ UCLA