Saturday, March 7, 2020

Vulnerable Computer Networks essays

Vulnerable Computer Networks essays As more and more people use Internet for pleasure, more and more criminals use it to break into remote computers to steal information, plant viruses, or simply change user names and passwords. In any case, many online computer networks are vulnerable to outside hacker attacks. This can target home computers, as well as corporate networks (Koerner 20). Most of the time intrusions occur because security is low and not well maintained due to incompetent security administrators (Koerner 54). PC security is never 100 percent effective (Dugdale 292). As the Internet gets faster and faster, network administrators want their networks to be as fast as possible so access to them is not sluggish. Actually, some security software can slow down a network as much as 20 percent (Koerner 20 Webs bad week). Administrators want the network or Internet site up as soon as possible. Koerner states that most of the time security is in the back of the administrators mind (20). You cant just buy a product and think you are magically secure, stated Bruce Schneier, founder and chief technology officer of Counterpane Internet Security (Koerner 20 Webs bad week). Author of Mastering Network Security, Chris Benton, says, Its easier for an administrator to throw software at the problem rather than take time to come up to speed (Koerner 54 cybervandals). It seems like most security administrators are unable to solve problems themselves. They resort to the software that others program to keep their systems up to date. In reality, it may be counter effective since administrators do not exactly know what holes that the software may have in them. Intrusion detection of hackers is one thing, but when attacks that cripple networks are coordinated to make it look like ordinary people are using a website legitimately are known as Denial of Service attacks, are another. A hacker can break into various low ...

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.