It Security
Computer security and Network Security is the means by which business and governments are protecting against computer intrusions and attack to prevent loss of data, information and provided services. Everything is now on computers, peoples whole lives are documented on computers. Big business and the government rely on technologies that use computers, whether it is used for storage, a medium between the customers and themselves or actual work. With all this information and data being stored, transferred and used it needs to be secured. A bank is open to the public; you would not have this bank unsecured would you? There would be security guards, cameras, and a vault. The same mentality to secure your data should be implied if you have a network that is connected to the Internet. You should have software, hardware, and/or personnel monitoring your networks operations and security. All computers and systems that connect to the internet or networks run off software of some type. People called hackers or crackers, manipulate programs, create worms, and viruses to make systems do thing there not supposed to, access places they aren’t allowed, and shutdown or hinder a system from working properly (Dasgupta). Then there are attacks, phishing attacks which come in the form of email that try to lead you to fraudulent sites, Denial-of-service attacks overload servers causing no one to get on or shuts them down. Then there are SQL injection attacks which are used in security vulnerable web apps, it’s a code that pulls information from the database and sends it back to the hacker, these are just a few of the many threats posed today by hackers ("Top Cyber Security Risks- Origin and Destination", 2009).
Cyber security threats are on the climb as cyber criminals persist to increase innovative ways to use breached computers for their own personal agenda. Establishments all have different types of information they need to protect, the government has information that
References: Abbate , J. (2000). Inventing the internet . Cambridge : MIT Press Retrieved from http://site.ebrary.com/lib/westerngovernors/docDetail.action?docID=10225299&p00=internet history
Dunn , M
Jameson , R. (2008, October 16). October is national cyber security month. Retrieved from http://www.bsa.org/country/News and Events/News Archives/en/2008/en-10162008-cyberchamp-DuBoseGood.aspx
Thomas , D
Travers, M., & Black & Veatch , (2008). Cyber security.Transmission& Distribution World, 60(11), 23-27. Retrieved from http://search.proquest.com/pqcentral/docview/211162108/fulltextPDF?source=fedsrch&accountid=42542
Dasgupta, P
Top Cyber Security Risks- Origin and Destination. (2009). Retrieved from http://www.sans.org/top-cyber-security-risks/origin.php
Lane, S
Baker, W., Tippett, P., & Goudie, M. (2010). 2010 Data Breach Investigation Report. Retrieved from http://www.verizonbusiness.com/resources/reports/rp_2010-data-breach-report_en_xg.pdf