Friday, August 23, 2019
Server Essay Example | Topics and Well Written Essays - 500 words
Server - Essay Example The computer network should also be secured from damages that may result from physical factors and dangers caused by computer virus. Thus, network security is extremely essential in any company; the chief information officer should be aware of how to ensure network security. There are several ways in which unauthorized users can gain access to the peer-to-peer networks in a company. First, they can access the peer networks by using any of the networked computers to type a unique username as well as password. This can be prevented by making sure that the networked computers cannot be accessed physically. To achieve this, the BIOS security should be enabled; this makes sure that the user sets an access name and password for the computers (Maiwald, 2003). Maiwald (2003) asserts that hackers and other unauthorized users can gain access to a companyââ¬â¢s sever-based network by using the name and password of another person. In such a case, passwords should be changed on a regular basis, and they should not also be written down. This way, it will be extremely difficult for unauthorized users to access the companyââ¬â¢s network. Data encryption can also be used to ensure that the network is secure and not accessible to unauthorized persons. Data should be encrypted before sending it onto the network. This way, the data will become unreadable even by a person who may attempt to tap the cable and read the data when it passes over the network. Upon arrival at the proper computer, the code designed to decipher encrypted data divides it into bits. The code then translates the bits into information that can be understood (Gollmann, 2011). According to Brown (2000), the network infrastructure of a company should also be protected from computer viruses which may infect the operating systems and files. Viruses can be transmitted through direct cable connection, floppy disks or CDs. Other means in which viruses can be transmitted include electronic ways such as through
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.