Computer Security Issues

The Free essays given on our site were donated by anonymous users and should not be viewed as samples of our custom writing service. You are welcome to use them to inspire yourself for writing your own term paper. If you need a custom term paper related to the subject of Internet or Computer Security Issues , you can hire a professional writer here in just a few clicks.
Computer Security Issues Facing Alsager Ltd. In upgrading the Alsager Ltd IT facilities, despite numerous advantages that the new systems brings one has to be made aware of the possible threats posing. Virus can effect the system. They are pieces of codes created by hacker to create a nuisances and to another extreme corrupt valuable data. Examples of these can be animated icons flying pass the computer screen and to another extreme can be programmes designed to delete the hard drive. The Computer Virus can be caught through a number of ways. The most highly publicised way, is through the Internet, other ways are through removable storage media, such as floppy disks and zip drives. They can also be caught through computer networks, where a third party from another machine in the network introduces the virus (accidental or otherwise) which then spread throughout the network. The most unlikely way of virus contaminating the system is through malicious employees creating them on the system but this will be discussed later on. There are a number of precautions that can be taken to help prevent this. By simply making employees not to use mobile storage media unless they know where it has been, making them aware that pirated media , shareware/freeware programmes may be potentially dangerous. A talk and leaflet distribution to employees could be useful. If the Alsager decides to connect to the Internet, this would be another potential source for virus and such like. A firewall could be placed on the system to help prevent infection. A more immediate way of preventing virus is to subscribe to a antivirus programmes, although this will not give you 100% percent protection it will help prevent the majority of known virus. An important note to this point, is the importance of getting regular virus updates from the software manufacturer . With the introduction of the IT facilities, the amount of room information takes up is drastically reduced from a whole filing cabinet to a small hard drive. Information can be easily copied and since the advent of the Internet, information does not even have to be on a psychical media to leave the building. This therefore makes it much more easier to copy and take out valuable information. All the companies details, there accounts and their customers account are prone to the risk. A single person can take out all the information on a zip disk or even a floppy disk depending on the size of the file. This poses the risk of company espionage and financial fraud, through the use of customers credit card details. There are a number of ways to help deal with this problem. The system should be a closed network. This means, that only people authorised to access the information may only do so through a user name and password. In this system there should be a heirachy of privileges, so only people who need to access the most sensitive information may do so. Also by having a login system, people using the system can be identified, helping solve and deter employee fraud. An important point to note is that the employee responsible for managing IT should be aware of sleeper programmes that may lye inside the system, and should be checked on a regular basis. Another step to take care of this problem, is to use encryption, when storing data and with today s encryption standards it would be near impossible to break the code. One must note that there would be little point in using this technique if the keys and passwords were not properly managed. Good quality encryption software is available. A very important security aspect, is in systems failure, data corruption and damage in general, such as fire damage. To lose data that is the back bone of the day to day running of the company could prove fatal. The only way to help properly deal with this issue is back up the data. Since the costs of storage media and taken a dramatic tumble in price, this would be a relatively inexpensive process, especially considering what it would save the company if the worst were top happen. There should be log copies made around about every 2 months or so , o

Our inspirational collection of essays and research papers is available for free to our registered users

Related Essays on Internet

Internet Hoaxes And Fraud

The Internet has many benifical uses that everyone can use to create an easier and more relaxed life. People can now work in there home over the computer, purchase goods and services and even...

Trash On The Internet

With the increase of on-line crimes and fraud, stricter laws must be placed on the sale of such problematic items as guns, prescription drugs, and human blood and organs over the Internet. Th...

On Line Schemes

On line Schemes Cyberspace was once a place inhabited largely by government agencies and academics linked together through a decentralized collection of computer networks that came to be known as t...

Computer Crime

Like a little white lie that is the of cause another little harmless fib, a harmless fib that becomes a fabricated story, and so on. The same domino effect can be found in the act of committing a c...

White Collar Crimes

"White collar" crime refers to that category of crime that tends to be committed by professionals. Securities Fraud, Insider Trading, Bank Fraud, Tax Fraud, and Money Laundering are all examp...

Internet Censorship 2

Internet Censorship The Internet is a wonderful place of entertainment and education, but like all places used by millions of people, it has some murky corners people would prefer children not to e...