preview

Computer Security Essay

Decent Essays

Information technology and computer networking play an important part of our everyday lives. We definitely depend on computers much more than we realize. Even for those of us who may not have a desk job, we use the computer at least a half a dozen times on our way to work. Our alarm, the coffee maker, our vehicle…almost every aspect of our life is influenced by computers.
Technical support is utilized more than it should be. Several issues that the ordinary, average user faces can easily be resolved through basic “home remedies” that technical savvy computer professionals use. Everyone can be a computer networking genius with some basic training.
There are several computer networking problems that the most basic user usually has on a …show more content…

Next, passwords and passcodes are the forefront of physical computer security. If someone is trying to hack into your network from the physical source, passwords are a great deterrent. Sadly, the average user does not think about password security as being important. “I am in home, who could break in?” “My workplace is a locked secure building, why do I need a password?” These kinds of questions lull computer users into a false sense of security. Try not to use dates of birth, your favorite number, color, pet, family, etc. These are all easy targets to the trained hacker.
Disconnection from the network is a frequent problem, and something every user should know how to fix. It can happen from common place problems such as a loose cord, a malfunctioning modem, or tampering of network properties. If any of these issues occur, they can be fixed at home without tech support. Always check your cord connectivity and the functionality of your modem/router etc. Reset the modem if necessary, and reboot your computer. Resetting and rebooting systems are the simplest ways to etch out computer glitches.
Networking properties can be accessed by going to the start menu and hitting the “Network Tab”. From that menu you can change networks by choosing more secure or less secure networks. You can see all of the available networks in the area, which ones are security encoded, which ones

Get Access