Why Security? 

Why Security?

Computer Security is required because most organizations can be damaged by hostile software or intruders. There may be several forms of damage which are obviously interrelated. These include:
??? Damage or destruction of computer systems.
??? Damage or destruction of internal data.
??? Loss of sensitive information to hostile parties.
??? Use of sensitive information to steal items of monitory value.
??? Use of sensitive information against the organization's customers which may result in legal action by customers against the organization and loss of customers.
??? Damage to the reputation of an organization.
??? Monitory damage due to loss of sensitive information, destruction of data, hostile use of sensitized data, or damage to the organization's reputation.
The methods used to accomplish these unscrupulous objectives are many and varied depending on the circumstances. This guide will help administrators understand some of these methods and explain some countermeasures
Security Issues
Computer security can be very complex and may be very confusing to many people. It can even be a controversial subject. Network administrators like to believe that their network is secure and those who break into networks may like to believe that they can break into any network. I believe that overconfidence plays an important role in allowing networks to be intruded upon. There are many fallacies that network administrators may fall victim to. These fallacies may allow administrators to wrongfully believe that their network is more secure than it really is.
Your organization should be aware how physically secure every aspect of its network is because if an intruder gets physical access, they can get your data. Be sure your organization properly secures locations and consider the following:
Servers - Contain your data and information about how to access that data.
Workstations - Man contain some sensitive data and can be used to attack other computers.
Routers, switches, bridges, hubs and any other network equipment may be used as an access point to your network.
Network wiring and media and where they pass through may be used to access your network or place a wireless access point to your network.
External media which may be used between organizational sites or to other sites the organization does business with.
Locations of staff that may have information that a hostile party can use.
Some employees may take data home or may take laptops home or use laptops on the internet from home then bring them to work. Any information on these laptops should be considered to be at risk and these laptops should be secure according to proper policy when connected externally on the network.

Return to Main Page


Add Comment

On This Site

  • About this site
  • Main Page
  • Most Recent Comments
  • Complete Article List
  • Sponsors

Search This Site

Syndicate this blog site

Powered by BlogEasy

Free Blog Hosting