Studyspark Study Document

Computer Security by Rozeberger and Zeldich. The Essay

Pages:2 (713 words)

Sources:1

Subject:Technology

Topic:Computer Security

Document Type:Essay

Document:#246546


Computer Security by Rozeberger and Zeldich. The tutorial gave a basic overview of computer security, including viruses, worms, and Trojan horses. It discussed how to avoid attacks or at least to become aware of the potential of attacks. The tutorial also looked at how hackers work, to help explain how breaks are performed. I chose this tutorial because I believe that computer security is one of the most significant and serious issues for any emerging IT professional. It a network is not secure, it will become vulnerable to attack by hackers. Therefore, any other work that an IT professional does on a computer must be considered secondary to the safety of the network.

The tutorial began with an extensive history of computer hacking. This history was fascinating. While I do not feel like it would contribute to my daily knowledge as an IT professional, in that I could not use that information to secure current networks, I felt as if it gave me significant background information. For example, I learned that early hackers seemed motivated by profit (they hacked into phone systems to make free calls), which differentiates them from many modern hackers who seek to create chaos rather than generate profit.

The really useful part of the tutorial was the description of a basic computer attack. Hackers exploit vulnerability, so it is up to the computer professional to eliminate vulnerability wherever possible. The two most interesting components were password security and social engineering. While adequate software protection should be able to protect the network from worms, viruses, and Trojan horses, they are useless if users allow access to the network by unauthorized people. What this made me realize is that, as an IT professional, a significant part of my job will necessarily involve the education of and communication with network users, to help keep the network safe.

In Debby Koren's tutorial, Local Area Network Portal, one can learn about the different ways to connect networks. I selected this tutorial because I feel as if connectivity is the key to computer services. After all, a computer that stands alone and is not connected to…


Sample Source(s) Used

References

Koren, D. (2011). Local area network portal. Retrieved January 9, 2012 from Rad University

website: http://www2.rad.com/networks/infrastructure/lans/main.htm

Rozenberger, A. & Zeldich, O. (2005). Computer security. Retrieved January 8, 2012 from Rad University website: http://www2.rad.com/networks/2005/computersecurity/main.htm

Cite this Document

Join thousands of other students and

"spark your studies".