A Key Concept in Information Systems

2185 Words9 Pages
A Key Concept in Information Systems
Strayer University - CIS109

A Key Concept in Information Systems
In this paper we will provide an overview and history of computer and network security. We will identify one current use of computer and network security and provide an example of this concept in practical use. A discussion of attitudes towards computer and network security will be made and justifications towards the attitude. We will explain the fundamental strengths and weaknesses toward computer and network security and will provide expert views regarding computer and network security.
An overview of the origin and history of computer and network security.
Lately enthusiasm for security was energized by the wrongdoing submitted
…show more content…
All messages entering or leaving the intranet (i.e., the neighborhood system to which a computer is associated) must go through the firewall, which looks at every message and hinders those that don't meet the predetermined security criteria ("What is a firewall?" 2015).
Banks use firewalls to help secure online banking. First Security Bank a Division of Glacier Bank is one example. They have executed an arrangement of firewalls framing a boundary between the bank's inside frameworks and the Internet. All approaching client data and solicitations are steered to the firewall, which checks the source and destination of every bit of data. The firewall alters the data before conveying it to the bank's inner frameworks. All internal data is ensured, keeping the structure of the system secure. The bank has the capacity to screen all action inside Online Banking, including logins, logoffs and access infringement. The firewall takes into consideration speedy ID of any suspicious action ("online banking security," 2015).
Lately, government organizations have seen a developing level of refinement in the assaults imposed by their systems. Gatecrashers are misusing blind sides in a system's guard, slipping past existing location routines and boycotts. Assaults are utilizing the standards of stealth as opposed to power to pick up the passage. A few strategies trap good natured clients into opening
Get Access