Sunday, August 11, 2019
IT infrastructure security Term Paper Example | Topics and Well Written Essays - 2000 words
IT infrastructure security - Term Paper Example The workstation is a desktop PC and is at the study den in the home. It is predominantly used for sending and receiving e-mail, writing and printing papers, surfing the internet, making computer drawings or art, create and publish Website pages, creating graphs charts for coursework and gaming. In terms of the processing power, it has a dual-core processor, 3 GB of R.A.M, Windows XP operating system and hard drive storage of 160 GB. The home computer might be a popular target for intruders who are curious to find out what you have stored in the workstation. They look for bank account information, credit card numbers and anything confidential and worth some amount they can find. For a home computer, the intruders are not just interested in the money-related information; they also want the workstations resources. This refers to the fast processor, hard disk space, and the internet connection. They can then use these resources to attack other computers on the internet. As a matter of fa ct, the more computers a hacker compromises, the harder it is for the authorities to trace the origin of the attack. Following this, if intruders cannot be traced, they cannot be stopped and they cannot be prosecuted.Intruders pay attention to home computers for some obvious reasons. First, the home computers are basically easy to break into and are not secure. When combined high-bandwidth connections are turned on, hackers can quickly find and exploit the security vulnerabilities of the home computers.... In terms of the processing power, it has a dual core processor, 3 GB of R.A.M, windows Xp operating system and hard drive storage of 160 GB. The home computer might be a popular target for intruders who are curious to find out what you have stored in the workstation. They look for bank account information, credit card numbers and anything confidential and worth some amount they can find. After stealing your information, the intruders can use the money to buy goods and services. For a home computer, the intruders are not just interested in the money-related information; they also want the workstations resources. This refers to the fast processor, hard disk space and the internet connection. They can then use these resources to attack other computers on the internet. As a matter of fact, the more computers a hacker compromises, the harder it is for the authorities to trace the origin of the attack. Following this, if intruders cannot be traced, they cannot be stopped and they cannot be prosecuted. Intruders pay attention to home computers for some obvious reasons. First, the home computers are basically easy to break into and are not secure. When combined high-bandwidth connections are turned on, hackers can quickly find and exploit the security vulnerabilities of the home computers. In the attack, intruders will prefer workstations attached to high-speed connections, DSL modems and cable modems to dial-in connections. Regardless of the home computerââ¬â¢s internet connection, the intrudersââ¬â¢ attempts are often successful. A lot of home PC owners do not know that they need to consider their home computers security. Network security perspective In the past security threats came
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.