StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

The Security of the Computer Network and Computer System - Assignment Example

Cite this document
Summary
The focus of this paper "The Security of the Computer Network and Computer System" is on the use of computers and the internet. In order to avoid becoming victims of cybercrime, an individual is expected to take the necessary steps to protect one against hackers, online scam artists. …
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER98.6% of users find it useful
The Security of the Computer Network and Computer System
Read Text Preview

Extract of sample "The Security of the Computer Network and Computer System"

Cyber Security: Best Practices al Affiliation) Cyber security: Best Practices The internet has improved access to information. Almost everything that anyone needs can be found online. The internet is an important technological tool for information and services and can be of great benefit if used in the right manner. However, the use of computers and the internet requires safety precautions taken. This is because there are increased cases of cyber insecurity. With the internet, there are limitless ways through which an individual can become a victim of cybercrime. In order to avoid becoming victims of cybercrime, an individual is expected to take necessary steps to protect one against hackers, online scam artists and other cyber criminals. The safety of one’s computer, network or personal information need to be protected by viruses, identity thieves, malware and any other form of threat. The steps to be taken to protect the above and safeguard personal systems shall be addressed in relation to two case studies analysed herein. Case Study 1: Protection of Home Network Service and Computer System Upon receiving a new computer for the home environment, it is necessary to ensure this system is as secure as possible. Both the computer and the home network need to be protected from viruses, hackers and malware. The home network should be guarded from external threats because it is used to perform sensitive transactions such as online banking services, online shopping among others that may require one to share private information. It is this information that hackers seek access to, in order to attempt to steal a person’s identity and use their credit card information or bank details, for example, to access the victim’s finances. In addition to numerous security tools and programs that one can install into their computer and use to keep the system secure, it is advisable to take an interest in hacking methods, so that one knows when their system is under threat. It is due to this type of negligence that many victims fail to prepare themselves properly in case of an attack. This lack of preparedness has also seen efforts to recover from cyber-attacks rendered ineffective. Such information can be found online in trusted websites, with training on the latest hacking methods and scams being identified and addressed. It is therefore important for individuals to take up some time and learn about hacking and methods of countering the same. In order to secure this type of network, the following steps should be undertaken. Setting up security tools on the home network The setting up of a home network has the advantage that an individual can have access to the internet from any point within the premises either through a router or a modem. However, most people fail to secure these systems, exposing themselves to a lot of risk. Hackers have been known to take advantage of unsecured networks to spread malicious viruses or steal personal information, what is called identity theft. The main aim of establishing security settings for a home network is to make it impenetrable to any unwanted or unauthorized persons. While this can be done, security measures can also bar people around the home from using the network as they please. For example, visitors may have to request for settings to be able to access the network. While it is voluntary to keep security information away from the reach of everyone, control over who can see and use one’s wireless network is important. The protection of the home network ensures the IP address of the network is not used by hackers around the world as a portal to take part in cybercrime. Hackers can gain unauthorized access to one’s network and implant viruses that will destroy the system. Once hacking into one’s system is done successfully, hackers’ online crimes can be traced back to the owners of the system as their IP address is being used to perform online criminal activities. In addition to that, hackers can access personal information stored in the computers connected to the system. In setting up security tools to protect the home network from hackers, one needs to enable encryption of the network and security of the router. Companies that set up wireless networks offer instructions with the product on how to encrypt the network. Network encryption in one of the most basic tools of system security and plays an important role in keeping the network safe from intruders with malicious intentions. Setting up of a password of considerable strength is also important. A password should be unique and complex, with many different characters used together. This password is not to be publicly shared, as that would reverse security gains made to secure the system. Installation of Antivirus Software, Anti-malware Programs and Firewalls The main reason for installing Antivirus software is so that cyber criminals are blocked from forcibly entering the system. Protection of the home IP address will go a long way in protecting the network from intrusion and controlling activities in the network, but will not do much to protect the computer itself. This is the purpose that the Antivirus is meant to serve. The Antivirus protects the computer from being intruded by cyber criminals with bad intentions. In provides an extra layer of defence when the computer or the network is already under attack. Investment in a strong antivirus will prevent intrusion by viruses and other malicious software from entering the computer and messing up files and the software on which the computer is running. Viruses can completely shut down the software programs in a computer, exposing one to loss of vital documents. They can create crippling issues for the computer by slowly working to infiltrate programs, files and folders and infecting them with a code that then attacks the core of the computer system. Antiviruses should run automatically and update itself regularly to stay current with the new malware threats and viruses that are found in the internet. Constantly updating the Antivirus protects the computer from hackers who find it easy to attack a computer whose Antivirus software is out-dated. Firewalls and antimalware programs should be used together to offer the strongest protection to a person’s computer. Use of these coupled with good security habits considerably reduce the risk of falling victim to cybercrime. Most PCs use the windows operating system, which is susceptible to attacks. The Macintosh by Apple is more secure and less targeted than the Windows operating system. This makes it the Mac more preferable option. The use of less targeted operating systems like the Linux operating system and the Ubuntu 12.04 LTS is encouraged as they are prone to fewer attacks. The use of browsers such as Mozilla Firefox which have privacy features and built-in security is also a contribution towards securing private networks and computers. Recommended Firefox Add-ons include Better Restricting Personal Information to Trusted Sites One’s internet activity has a bearing on the security of one’s computer network and computer system. It is therefore essential to form the habit of not sharing personal information with every other website. Some websites are not entirely safe and do not guarantee the safety of personal information that one provides to them. Personal information is targeted by hackers because it with access to such information, they can use sophisticated and sneaky methods to steal a person’s identity and use it for their personal gain. Millions of people fall victim to identity theft by cyber criminals every year because in one way or another, their personal information found itself in the wrong hands. Identity theft has become a very serious concern for law enforcement agencies. In almost every country, there is a division of the police that works to curb cybercrime. However, this is made more difficult by the emerging trends in hacking developed by the ‘black hats’, a name coined for malicious hackers. It is very difficult to detect and trace illegal internet activities to the real source. Hackers constantly come up with new ways to hide their identity and remain undetectable in the course of performing cybercrimes. Even when the law enforcement officers have a potent lead on a suspect, this evidence can still be altered and covered up making the authorities unable to trace the suspect. People should learn how to discern between trustworthy online websites and scam sites that are out to defraud innocent internet users. Due diligence should be paid especially when an individual attempts to make an online purchase and undertake online banking from a home computer. These activities require one to submit personal information to websites for verification and authentication before the transaction is performed. If the company running the website does not take measures to encrypt personal information to protect access by intruders, the information is exposed to everyone who would look for it online as it travels from a person’s computer to the destination. It is not advisable to give out personal information to websites that do not exercise care of personal information through encryption. It is easy to know a website that does not encrypt personal information. Those that encrypt information have an ‘s’ after the ‘http’ in their URL. The ones that do not have the ‘s’ are exposed and have high chances of being compromised and personal information stolen. Companies that do not secure people’s personal information owe no duty of care, thus such care is a personal initiative of the internet user. Hackers also frequently attack servers that store credit card information for millions of people. Some hackers are highly skilled and have attempted to hack into government and private systems, sometimes with considerable success. Their operations are highly advanced and this complexity helps them perform uncoordinated attacks, which are difficult to secure against even for big companies. It is therefore not prudent to save personal information online, especially credit card information despite the convenience it offers. Internet users should also avoid clicking on pop-up information that requires one to fill in personal details with the promise of rewards as they are mostly scams. Creation of Strong Passwords and Backup Files As mentioned before in this document, cyber criminals and hackers employ highly sophisticated methods of cracking passwords and accessing personal files in computers. The easier the password combination is the easier it is for them to find a way around it and have unlimited access to one’s private information. It is therefore advisable that individuals create long and complex passwords to make hacking more difficult. It is important to note that no computer is completely protected from threats from hackers and viruses. Efforts should be made to create backup files of every important file and program in one’s computer. This way, if the computer is attacked the loss of programs and files can be mitigated by recovery from the backup files. Internet users should act responsibly whenever they are online to protect themselves from the dangers of viruses and malware that are prominent on the internet, causing a constant threat to users’ computer systems. Case Study 2: Protection of Child Internet Users Teenagers are increasing accessing the internet today more than ever. This is because the younger population is drawn to social networking sites that are used for communication and are virtual meeting places for friends, colleagues and business partners. However, their access to information on the web should be restricted, as a lot of information online is not good for consumption by kids. The internet has a lot of information which should be kept away from children. The benefits of exercising parental guidance when it comes to teenagers cannot be overstated. There are several steps that parents can take to ensure their teenage children are not exposed to harmful and explicit content on the web. Knowledge about the Internet and Social Networking Sites As a parent, keen interest in the activities of your child online should be taken. In order to understand such activities, it is important to take time to learn about the internet, its contents and what your child has access to. This will assist in determining the level of restrictions one can place that will protect their children from undesirable internet content. Knowledge on the workings around social networking sites should also give a parent an idea of the level of exposure that their teenage children are exposed to. Some social networking sites offer unrestricted access to pornographic materials while some have restrictions that prevent the uploading of such content. Facebook is one such site that discourages the uploading of pornographic data like photos and videos. It has an option of reporting offensive content for investigation by the authorities. Holding Discussions with Children about the Dangers and Risks of Internet Use. Children who use the internet can easily disclose too much information online either knowingly or otherwise. Children can also involve themselves in talks on topics that may put them in trouble. This gives a strong case for parental control. Parental Controls program is used by parents to address problems that may arise in relation to children accessing social networking sites and community websites. Communication between children and other people over the internet can be monitored by the Parental Monitoring application to avoid exposure of children to harmful internet content. It is also important for parents to let their children know what they are prohibited from browsing on the internet, and the potential risks involved. Parents can make some rules to guide the internet activities of their children, and advice against sharing of true information and identities especially on social networking sites. Use of Antivirus and Parental Control Software This measure is a bold step in ensuring the safety of children when they access the internet. Children may submit vital information such as the telephone numbers and even the home address unsuspectingly to malicious people, creating an unwelcomed exposure to invasion by cyber criminals. Hackers can use such information to invade the privacy of private network users and in internet thefts. Parental Monitoring software is used by parents to assess the internet activity of their children. It enables parents to set limits on what teenagers can view when online. The use of such software is useful in the protection of personal information that could prove costly when it finds its way into the hands of the wrong people. Watching Out for Danger Signs Prevention is better than cure. Parents are encouraged to keep an eye out for signs that show irregular internet behaviour in their children. The internet has unlimited content that could have a negative influence in behaviour of a young user. One such sign is the time spent online. It is a sign of danger when a teenager spends too much time on the internet, especially late into the night. Parents can ensure their children do not develop this habit by setting strict and specific times for accessing the internet. The network can also be shut when it is time for bed. Teenagers may also be reluctant to leave the room where there is internet access. This shows some level of addiction to the internet, and should be discouraged by encouraging involvement in more outdoor activities. It is very dangerous for children to be hooked to the internet to the point they have to access it at particular times. Another sign is the discovery of improper links on the computer. These may include links to adult content. Other signs are receiving mails from strangers, isolation from family and friends for long hours and weird behaviour like rushing to switch off the monitor when an adult enters the room. These are signs of improper use of the internet by teenagers and if ignored may have long term psychological effects on the young developing minds of children. Parents should also watch out for cyber bullies and report such activities to law enforcement agencies. References Corby, B. (2005). Book Review: Protecting Children in Time: Child Abuse, Child Protection and the Consequences of Modernity, Child Sexual Abuse and the Internet: Tackling the New Frontier. Journal of Social Work, 5(2), 243-246. Fact Sheet 36: Securing Your Computer to Maintain Your Privacy. (n.d.). Securing Your Computer to Maintain Your Privacy. Retrieved April 13, 2014, from https://www.privacyrights.org/securing-your-computer-maintain-your-privacy How to Secure Your Home Network and Computer. (n.d.). YooSecurity Removal Guides How to Secure Your Home Network and Computer Comments. Retrieved April 13, 2014, from http://guides.yoosecurity.com/how-to-secure-your-home-network-and-computer/ Lenardon, J. (2006). Protect your child on the internet: a parents toolkit. Bellingham, Wash.: International Self-Counsel Press. Oswell, D. (1999). The Dark Side of Cyberspace: Internet Content Regulation and Child Protection. Convergence: The International Journal of Research into New Media Technologies, 5(4), 42-62. Smith, G. S. (2007). How to protect your children on the Internet: a roadmap for parents and teachers. Westport, Conn.: Praeger. Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Cybersecurity Best Practices Assignment Example | Topics and Well Written Essays - 2500 words”, n.d.)
Cybersecurity Best Practices Assignment Example | Topics and Well Written Essays - 2500 words. Retrieved from https://studentshare.org/information-technology/1639414-cybersecurity-best-practices
(Cybersecurity Best Practices Assignment Example | Topics and Well Written Essays - 2500 Words)
Cybersecurity Best Practices Assignment Example | Topics and Well Written Essays - 2500 Words. https://studentshare.org/information-technology/1639414-cybersecurity-best-practices.
“Cybersecurity Best Practices Assignment Example | Topics and Well Written Essays - 2500 Words”, n.d. https://studentshare.org/information-technology/1639414-cybersecurity-best-practices.
  • Cited: 0 times

CHECK THESE SAMPLES OF The Security of the Computer Network and Computer System

Developing Computer Networking

The message server provides a link to the relational database management system and other sources of data.... computer Security.... computer networking has been developed over the years and this has brought many advantages in the today's business society.... With computer networks, it is possible to share resources and information.... hellip; computer networking has been developed over the years and this has brought many advantages in the today's business society....
4 Pages (1000 words) Essay

The Concept of Connecting Computers to one Network

Name Institution Course Instruction 13th December 2013 Characteristics of your network topology Introduction Network topology is a systematic arrangement of different nodes of many computers in local area network and wide area network.... This is because if many computers are connected to one server to share single older then the system would be slowed down.... Another advantage is that if a single node fails to network, the entire system is not affected....
2 Pages (500 words) Essay

Computer Networks Issues

The whole network is protected with the firewalls so as to maintain the security and integrity of the system.... Specifically designed norms have be laid down in the form of layered architecture with the description of the devices used for connectivity at each and every layer in order for the system to work efficiently and without any difficulty. … Local area networks are very essential to let the work going for any kind of organization, then may it be a software development firm or a bank, or any other organization, which requires a large number of computers connected to each other for easy data transfer....
7 Pages (1750 words) Essay

AMPACK Computer Company Computer Platform Upgrade

Portability is more important than performance, because you need to move the computer routinely, choose a laptop.... A portable desktop computer platform is used on a typical office setup, which can be adopted in the company's system.... If you will be moving the system very frequently, consider a smaller-sized laptop.... Choosing the right Operating system for AMPACK office infrastructure is easily managed since there are current systems involved....
5 Pages (1250 words) Essay

Comparison of Operating Systems

Other programs in the computer are called application programs.... But Microsoft Windows, on the other hand, is not OPERATING SYSTEM An operating system is the program that is loaded into the computer by a boot program, manages all the other programs in a computer.... Other programs in the computer are called application programs.... A computer cannot work without an operating system.... computer cannot work without an operating system....
3 Pages (750 words) Essay

Computer Platforms: New Information and Communications Technology

The effect of the computer and information technology (ICT) in media industry is tremendously deep and influential (Laudon & Laudon, 1999).... This system contains the “Creative Sound… There is facility Intel 10/100 Ethernet plus v.... The development and accomplishment of computer and information technology has fundamentally transformed the working and performance of every field of life (Laudon & Laudon, 1999)....
11 Pages (2750 words) Essay

Security Features for Helping Secure a Computer Network

The process of developing such a network must therefore incorporate various security features that will help secure and maintain the integrity of both the data and the various… The essay below therefor investigates various security features that help secure a computer network.... Security is one of the most fundamental factors in the installation and maintenance of a computer network.... Security of a computer network requires the incorporation of various technologies as essay below elaborates....
5 Pages (1250 words) Research Paper

Basic Operating System Security for Spark Computer

This paper will try to expound and check into the various ways that can and times be used so in maintaining a secure system that maybe can vary from some strong passwords and some other kind of rules that will assist to enhance the security of the system.... Group policy objectives used in the computer industry has been used to help get some of the Windows users and clients to control the registries of the target objects, the security of the NTFS (New Technology File System), the security and the audit policy, installation of new software, scripts used for logon and also for logoff....
12 Pages (3000 words) Essay
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us