Securing the Computer Network Essay

2032 Words9 Pages
Whether a person is an occasional computer user, works in a major corporation, or within a government agency there is a dangerous risk out there. That risk is one that everyone must be concerned with, inadequate computer security. Computer security has become essential in today’s well connected digital world. Everyone wants to communicate with someone at sometime; and normally these communications need to be secure. Whether the information is traveling around the world or just across the room to another computer, this information is at risk. Safeguards must be implemented to the computers and networks that they use to protect them from viruses, intruders, and system failures. Additionally, according to Shelly, Cashman, and Vermaat in…show more content…
There are other programs known as Trojan horses, they are programs that hide within or look like a legitimate program (Shelly 559). They wait for certain conditions or actions to trigger them. A Trojan horse will not normally spread to other computers. In his article, “Privacy and Security: Remembrances of Things Pest”, Eugene H. Spafford stated, “Tens of thousands of new instances of viruses, worms and Trojan horses appear daily, although it is impossible to get a precise count because of their often-polymorphic nature: a “new” version is created each time a download occurs” (36). In addition, there is a more personal threat called a hacker. They are defined as someone one who accesses a computer or network illegally. While they often claim the intent of their security breach is to improve security by exposing weaknesses within the system (Shelly 556). Similarly, there is a slightly different type of individual that is referred to as a cracker. They break into computer systems like the hacker, but their intent is to destroy data, steal information or other malicious actions (Shelly 556). Consequently, these threats to computer security cannot be totally eliminated; but there are ways to greatly reduce the chances of a security compromise. First, never boot up a computer with removable media inserted or plugged into it. These are items such as cds, dvds, usb flash drives to name a few (Shelly 560). Even if the boot up is unsuccessful, a malicious
Get Access