Title: Internet Security
Author: Darnay, ECDI
Publisher: Encyclopedia of Small Business
URL: http://go.galegroup.com/ps/retrieve.do?sgHitCountType=None&sort=RELEVANCE&inPS=true&prodId=GVRL&userGroupName=phdiliman&tabID=T003&searchId=R1&resultListType=RESULT_LIST&contentSegment=&searchType=BasicSearchForm¤tPosition=1&contentSet=GALE|CX2687200321&&docId=GALE|CX2687200321&docType=GALE&role=
Abstract
Internet Security, as defined in this article, is a subset of actions aimed at securing information based on computers and in transit between them. As computers and other related technologies continue to evolve, computer systems and networks become more prone to various forms of attack. This article gives readers an idea of what makes a computer vulnerable. It traces computers' vulnerability even before the prevalence of the internet; and arrived at the different forms of attack a computer could encounter. These include viruses, worms, Trojan horses, logic bombs and sniffers, just to name a few.
The article also provided actions on how to counter, if not avoid, these attacks, and summarized them in 4 important statements: (1) disciplined use of computer systems including careful password and e-mail control, 2) installation and upgrading of firewalls between internal networks and the Internet, 3) alertness to news stories about new viruses and breaches and promptly carrying out public recommendations, and 4) prompt reporting of breaches to the authorities as soon as they are detected.
Three-Point Learning
1. The article was right about the fact that computers were already vulnerable and are subject to attacks even before the internet came into use, because of its nature.
2. Complete understanding and proper management of computer systems would lessen the vulnerabilities of computers and computer systems.
3. Caution, alertness, and discipline can prevent the worst of such problems.
Applications
As an individual and a person within an organization, I will see to it that I am guided by the actions as recommended in this article. Responsible usage of computer and other technologies alike is the key to avoid any forms of attack.
No comments:
Post a Comment