University Networking Tutorials

754 Words3 Pages
University Networking Tutorials The first tutorial I chose was Computer Security by Rozeberger and Zeldich. The tutorial gave a basic overview of computer security, including viruses, worms, and Trojan horses. It discussed how to avoid attacks or at least to become aware of the potential of attacks. The tutorial also looked at how hackers work, to help explain how breaks are performed. I chose this tutorial because I believe that computer security is one of the most significant and serious issues for any emerging IT professional. It a network is not secure, it will become vulnerable to attack by hackers. Therefore, any other work that an IT professional does on a computer must be considered secondary to the safety of the network. The tutorial began with an extensive history of computer hacking. This history was fascinating. While I do not feel like it would contribute to my daily knowledge as an IT professional, in that I could not use that information to secure current networks, I felt as if it gave me significant background information. For example, I learned that early hackers seemed motivated by profit (they hacked into phone systems to make free calls), which differentiates them from many modern hackers who seek to create chaos rather than generate profit. The really useful part of the tutorial was the description of a basic computer attack. Hackers exploit vulnerability, so it is up to the computer professional to eliminate vulnerability wherever possible. The
Open Document