Computer Network Security Issues Computer Research Paper

Total Length: 1894 words ( 6 double-spaced pages)

Total Sources: 12

Page 1 of 6

In some instances, policies implemented mainly as cost-effective shortcuts to network system security have cost otherwise good employees their jobs for violations of excessively restrictive network use policies. In the realm of the home computer user, it is possible to buy many new redundant or unnecessary security programs and features. Generally, appropriate network security should not interfere noticeably with either personal home computer use or computer system use in the workplace (Larsen, 2007).

Conclusion

Computer systems and networks are potentially vulnerable to malicious intrusion attempts that can be extremely harmful to home computer users and damaging to professional organizations. The most common types of attempted system infiltrations are those that exploit long-known software vulnerabilities for which security fixes already existed long before those intrusions. It is possible to substantially mitigate the risks posed to computer and network systems by malicious entities trough simply implementing and adhering to basic system security precautions. In general, the sources of risks to network systems are largely a function of user and administrator error. By eliminating basic mistakes and error at all levels of system control and access, it is possible for both home computer users and business organizations to safeguard their computers and systems against the most likely threats against them.

References

Baker, W., Hylender, C.
, Valentine, J. (2008) Verizon Business Data Breach

Investigation Report. Retrieved February 22, 2011 from:

http://www.verizonbusiness.com/resources/security/databreachreport.pdf

Ballezza, R.A. "The Social Security Card Application Process: Identity and Credit Card

Fraud Issues." FBI Law Enforcement Bulletin, Vol. 75. No. 5; (2007): 25-32.

Boyce, J. (2002). Information Assurance: Managing Organizational it Risks. St. Louis,

MO: Elsevier.

Dam, K.W. And Lin, H.S. (1996). Cryptography's Role in Security in the Information

Age. Washington, DC: National Academy Press.

Dyer, C., McCoy, R., Rodriguez, J., Van Duyn, D. "Countering Violent Islamic

Extremism: A Community Responsibility." The FBI Law Enforcement Bulletin,

Vol. 76, No. 12; (2007): 3-9.

Evans, H. (2004). They Made America: From the Steam Engine to the Search Engine

Two Centuries of Innovators. New York: Little Brown & Co.

Kizza, J.M. (2005). Computer Network Security. New York: Springer.

Larsen, R. (2007). Our Own Worst Enemy: Asking the Right Questions About

Security to Protect You, Your Family, and America. New York: Grand Central

Publishing.

Personick, S.D. And Patterson, C.A. (2003). Critical Information Infrastructure

Protection and the Law: An Overview….....

Need Help Writing Your Essay?