Monday, April 23, 2012

Chapter 6 Keeping Information Safe and Secure

Business relies more and more on technology today than ever before.  Whether it is the banking system or educational system, technology use for business will only increase in the future. The future technological advances also mean challenges exist on how to protect the assets of a company. The assets know as intellectual property.It is crucial for a company to protect the equipment  and data from threats. "Threats to network and Web site security can originate both internally from within the organization and externally from outsiders( Shelly,Napiers, Rivers 2021).

Internal threats can come from carelessness with security procedures or from former employees looking for a little payback. External threats come from others wishing to access the network by hacking or guess passwords form those who already have access.                        

Strong policies and procedures can help to keep networks secure.  Here is a list of 15 habits to keep a secure network.http://www.itworkers-alliance.org/15-habits-to-keep-a-secure-business-network-secure.html

Since I work for the federal government, I understand how networks must be protected. We must have photo ID just to have access to an area. I order to get that ID , security clearances are performed. Our ID cards are also our smart cards that are encrypted with certificates that also use bio-metrics and access code number in order to gain access to the government computer access. The government , like a business cannot afford to slow down or have the system crash all together. We are required to have annual training in order to make sure we stay compliant with security policies.

Computer viruses  form external threats can be reduced or eliminated by secures passwords, installing firewalls, and most of all having policies that employees follow and are enforced. Hackers are always looking for ways to gain access to networks such as through emails and internet sites. Software must be kept up to date because hackers  are continuously looking to find a way in.

Simply put, network security is the responsibility of everyone!!!

                                                                                   
Works Cited
"15 Habits to Keep a Secure Business Network Secure." Technology Network. Web. 23 Apr. 2012. <http://www.itworkers-alliance.org/15-habits-to-keep-a-secure-business-network-secure.html>.


Shelly, Gary B., H. Albert Napier, and Ollie N. Rivers. Discovering the Internet:Complete Concepts and Techniques. Boston, Mass: Course Technology/Cengage Learning, 2010. Print.


Images Cited
http://wirelesstradein.org/tag/wireless-network-security

No comments:

Post a Comment