Why Do We Need Computer Security
Computers are a part of or in millions of homes; they are an intricate part of just about every if not all successful businesses, the government, and the military. Computers have become common place in today's society and the lives of the people who live in it. The term computer security is used frequently, but the content of a computer is vulnerable to few risks unless the computer is connected to other computers on a network. As the use of computer networks, especially the Internet, has become pervasive, the concept of computer security has expanded to denote issues pertaining to the networked use of computers and their resources.
Computer and internet being pervasive today, security measurement must be heightened to the level where hackers and virus are playing. One way virus or worms can spread is through e-mail attachments. So: do not open attachments until you are absolutely sure what they are and who they are from. Many privileges in life, such as driving, drinking or owning a firearm, require responsibility. Using a computer and the Internet is no different. Speaking about virus, despite a survey founding that 99% large businesses use anti-virus software and almost 60% of firms update this protection software automatically to keep current with new threats, half of firms and 68% of large companies were caught out by viruses during 2003. Therefore, on top of installing anti-virus software, firms had to be sure that the systems were kept updated to block loopholes that worms exploit. (Potter, R. E., Rainer, R. K. Jr. & Turban E., 2003)
Back in the 1980s, the way to avoid computer viruses was to ask, "Whose floppy disk am I loading onto my computer?" Two decades later, we should be asking instead, "Who's desktop, laptop, or PDA is connecting to mine? Should I trust that individual to have installed proper patches and antivirus protection?" In most cases, the answer is no. The preventive measure is to scan a computer before connecting into a system.
A survey on information security came up to say that 79% of people unwittingly gave away information that could be used to steal their identity when questioned. Further study found that, on average, a person uses 20 online sites that require them to use password and therefore most of them use familiar names that be easily remembered such like pet's name, own name, etc. Between ignorance of the need to protect online identity and being fed up with the password system, people are compromising their security by laxing their guards against identity thieves.
Supercomputing giants such as university and research places has become routine target attack for hackers to exploit. Hacker uses the pinging application to trace reachable the IP's. If a Hacker finds a computer they can try a port scan to detect and attack services on that computer. Hackers also used the software's that are used to scan the people on the network so that they can theft the passwords. This is simply because of the openness that academic institutions provide and their huge bandwidth makes them more attractive than regular computer centers. A particular example was Purdue University System that was infiltrated recently; it has discovered that no damage is found but that encrypted password was exposed. It soon orders its students to immediately change their passwords. The need for increased security has also been enforced by law such as The 2002 Sarbanes-Oxley Act that holds executives liable for computer security by requiring them to pledge that companies' "internal control" are adequate, and auditors are starting to include cyber security in that category. (Fisch, E. A. Ph.D. & White, 2000)
Another type of threat comes from the exploit that is within the browser itself. Loopholes in browser could be a way for hacker to covertly obtain personal information about you through using a malicious website. To trust a website now businesses have to be absolutely certain and an instrumental tool is Verisign which is design to manage PKI (public key infrastructure.
Finally, the net itself is has yet to be scrutinized. Discovered vulnerability in TCP sends expert scrambling to formulate solutions on big routers produced by Sisco, etc. Another counter-attack measure is cyber war game to train computer scientist to be poised for a cyber war scenario. In summary, the internet is still at a very early stage of development and these points taken are where we can start to build the case for internet security.
More by this Author
Rise in Fuel costs This paper reviews how oil prices affect the macro-economy and assesses quantitatively the extent to which the economies of OECD and developing countries remain vulnerable to a sustained period of...
The Qing Dynasty, also known as the ‘Empire of the Great Qing’ or ‘Manchu Dynasty’ or ‘Great Qing’, was the last imperial dynasty of China. It ruled China from the period of 1644 to...
Despite McDonalds being a multinational food outlet, it is important to analyzed the outlet to evaluate its strengths, weaknesses, opportunities and threats and this can be done by conducting SWOT analysis