Welcome

Anti Essays offers essay examples to help students with their essay writing.

Sign Up

Pc Security Essay

Open Document

Below is an essay on "Pc Security" from Anti Essays, your source for research papers, essays, and term paper examples.

PC Security: Protecting Your Network
Towson University
AIT 614
April 17, 2015
Charles Pak

Introduction

Because of the proliferation of technology use, it has become necessary that the Security Administrator, along with Management, develop a Security Policy to help create a secure environment in which to conduct business.   This policy must be based on a system that is static enough to form a strong foundation to build security upon, but also flexible enough that it allows rapid growth and speedy response to keep pace with the new advances, problems, and issues that arise in the ever changing landscape of the IT field.
Understanding what the system is getting secured from is essential to the Security Administrator.   He must recognize the threats and which of the three main categories that the threats fit into.   Network attacks occur outside of the system and differ greatly from Intrusions, which are user controlled attacks that happen inside the system causing damage internally. Malicious Code, or Malware, are automated attacks that, once released, act independently.
There are many tools available to the Security Administrator to help in securing a work environment.   Purchasing hardware and software additions and upgrades can make all the difference in the level of security.   Antivirus software helps to protect the system against the na├»ve user who might jeopardize the system while software firewalls protect by controlling the data flow between computers before the user comes in contact with it.   A router serves as a hardware firewall controlling data between the computer connected to it and the Internet.   Having a reviewable security policy in place helps the Security Administrator when dealing with the user community on the system.   By putting a policy in place, this allows the SA to define the allocation of IT resources, by setting up rules which determine access levels.
Descriptive Summary
With the ever expanding use of technology in the workplace,...

Show More


Citations

MLA Citation

"Pc Security". Anti Essays. 17 Dec. 2018

<http://trenmayamx.com/free-essays/Pc-Security-729041.html>

APA Citation

Pc Security. Anti Essays. Retrieved December 17, 2018, from the World Wide Web: http://trenmayamx.com/free-essays/Pc-Security-729041.html