Computer Network Security
Computer networks are an integral part of any organization these days, as they facilitate the free flow of data and services to the authorized users. However, such networks also pose a security threat in case the data is classified and confidential, thus making network security a vital necessity. As the data is available only for authorized users, it is possible for hackers to pretend to be one, by providing the correct user name and password. Computer network security can be disrupted or encroached in the following ways:
- Denial of Service: Denial-of-service is meant to disable a computer or a network and can be executed with limited resources. It is one of the most common forms of attacks by hackers and can effectively disable the whole network of an organization. Denial of service attack makes a computer resource unavailable to its intended user. To carry out this kind of attack, hackers generally flood a network or the access routers with bogus traffic. They also make attempts to disrupt connections between two machines and prevent individuals from accessing a service.
- Trojan Horse: Trojan horse is common and one of the most potential threats to computer security. They are malicious and security-breaking programs, disguised as something which is considered as non-malicious by the security softwares. They are a useful tool for hackers who try to break into private networks. Hackers generally attach Trojan horse to a file, which triggers a virus or remotely controlled software, giving the hacker complete control over the computer.
- Viruses and Worms: Viruses and worms are well known for their destructive nature and the property of replicating themselves. They are basically pieces of computer program codes which are written by hackers and other computer geniuses.
- Sniffing: Sniffing is the act of intercepting TCP/IP packets while they are getting transferred on a network. The interception generally takes place through simple eavesdropping done by a hacker.
The security of computer hardware and its components is also necessary for the overall protection of data. Even if the computer is not plugged into a network, a person can open its cabinet and gain access to the hard disk, which can later be used on some other computer for data theft. If a standalone system contains some important or classified information, it should be kept under constant surveillance. It is also necessary to remember that in case one dissembles his computer hardware, the risk of losing coverage of warranty becomes very high.
Computer Information and Data Security
It is important to avoid data and information loss in case of hard disk crashes. The only solution is to regularly keep backups of all the data on other media such as magnetic tapes, CD-ROM, etc. It is a good practice to store the media off-site and in case of a disk crash, restore the information from the backup media onto the new disk. In case a backup media is not affordable, one should try and store the files on at least two different media devices. These media devices should be systematically kept at a place which is safe and secured, as the information contained may be confidential. People usually backup database files, spreadsheet files and large documents. As the technical constraints are always there, it is better to take regular backups, in order to avoid any loss of information.
It is important to keep a record of technical support consultants and software documentations, like, manuals and guides to make them accessible to the staff members of the company.