ABSTRACT
The world is surging towards a digital revolution where computer networks mediate every aspect of modern life. Not many years ago, most computers were carefully guarded mainframes, held tightly in the hands of skilled professionals. The systems and their guardians combined to provide ironclad protection of the organization’s all important data. .Today the threat to the information on the network has grown to the greatest extent. Information is the most vital aspect of every organization. Access to the internet can open the world to communicating with customers and vendors, and is an immense source of information. But the same opportunities can open your Local Area Network to possible attacks by thieves and vandals. These attackers and hackers try to harm a system and disrupt information exploiting vulnerabilities by using various techniques, methods, and tools.
It is important to identify those areas, which are causing insecurity to the computer, and which are the likely sources of the threat .These days everybody is more security conscious as they browse and conduct business on the Internet. As with any type of security, be it personnel or domestic, the likelihood of an internet security breach depends on one’s degree of preparedness and use of proper prevention tools.
The report provides certain practices that can be implemented by any organization, if it wants to protects the confidentially, availability and integrity of its system data when it contracts with outside parties to install, configure, manage or update any of its Information technology.Overall the report focuses on creating an effective “internet security policy” and also highlights some current issues as such as Network security and cryptography.
No comments:
Post a Comment