No Marshmallows, Just Term Papers
A breach in a business could expectantly become disastrous. “Computer crimes” have affects on a business in different ways (2011, Laudon et., al). Most of the crimes done over computers are too contravene others private information, give a virus that can cause harm to the computer, fraud, and others.
Confidential company information is desired by many hackers. Possible social security numbers, credit card numbers, address and other employee and customer information can be sold or distributed. Proper set up of security and adequate maintenance of security is one way to safeguard your firm from hackers.
Internal threats involving a computer and employee access to private data and abusing the privilege has been known to happen. “Studies have found that user lack of knowledge is the single greatest cause of network security breaches” (2011). Employees have given out their personal passwords or confidential information, “which compromises the system” (2011).
Hackers continue to find ways of breaching private data. Some measurements can be taken to greatly reduce the risk of a breach. Protection of a company’s private data consists of firewalls, Intrusion Detection Systems and Antivirus software. Firewalls deny access to “unauthorized users accessing private networks”(2011). Intrusion Detection systems are in place to monitor ‘hot spots’ of a business. Where hackers would most likely to attack is the main focus of this system. It is a tool used to “protect against suspicious network traffic and attempts to access files and databases” (2011). Antivirus software detects viruses that may have slipped through the cracks.
Laudon, J. P., & Laudon, K. C. (2011). Essentials of management information systems (9th ed.). Upper Saddle River, NJ: Prentice Hall.
Wiki is a collaborative site that can be viewed and edited by anyone. Wiki is full of information that is used often. It is a quick resource to use to grab a definition or the year a president was...