Tuesday, May 7, 2019
IT infrastructure security Term Paper Example | Topics and Well Written Essays - 2000 words
IT infrastructure bail - Term root word ExampleThe workstation is a desktop PC and is at the study den in the berth. It is predominantly employ for sending and receiving e-mail, writing and printing papers, surfing the internet, making data processor drawings or art, create and publish Website pages, creating graphs charts for coursework and gaming. In terms of the processing power, it has a dual-core processor, 3 GB of R.A.M, Windows XP operating brass and hard drive terminal of 160 GB. The kin computer might be a common target for intruders who ar special(a) to find out what you have stored in the workstation. They look for bank greenback information, credit card be and anything confidential and worth some amount they washstand find. For a home computer, the intruders are not skillful fire in the money-related information they also want the workstations resources. This refers to the fast processor, hard disk space, and the internet connection. They deal then use t hese resources to attack other computers on the internet. As a matter of fact, the more computers a hacker compromises, the harder it is for the authorities to trace the origin of the attack. Following this, if intruders cannot be traced, they cannot be stopped and they cannot be prosecuted.Intruders profit attention to home computers for some obvious reasons. First, the home computers are basically easy to break into and are not secure. When combined high-bandwidth connections are turned on, hackers can quickly find and exploit the security vulnerabilities of the home computers.... In terms of the processing power, it has a dual core processor, 3 GB of R.A.M, windows Xp operating system and hard drive storage of 160 GB. The home computer might be a popular target for intruders who are curious to find out what you have stored in the workstation. They look for bank account information, credit card numbers and anything confidential and worth some amount they can find. After stealing your information, the intruders can use the money to buy goods and services. For a home computer, the intruders are not just interested in the money-related information they also want the workstations resources. This refers to the fast processor, hard disk space and the internet connection. They can then use these resources to attack other computers on the internet. As a matter of fact, the more computers a hacker compromises, the harder it is for the authorities to trace the origin of the attack. Following this, if intruders cannot be traced, they cannot be stopped and they cannot be prosecuted. Intruders make attention to home computers for some obvious reasons. First, the home computers are basically easy to break into and are not secure. When combined high-bandwidth connections are turned on, hackers can quickly find and exploit the security vulnerabilities of the home computers. In the attack, intruders will prefer workstations attached to high-speed connections, DSL modems an d cable modems to dial-in connections. Regardless of the home computers internet connection, the intruders attempts are often successful. A lot of home PC owners do not know that they need to consider their home computers security. Network security perspective In the past security threats came
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.