Summary of Li’s “Study on Security and Prevention Strategies of Computer Network”

To: Prof. Ellis

From: Mateo Avila

Date: 3/3/2021

Subject: 500-Word summary of “Study on Security and Prevention Strategies of Computer Network”

Computer network is expanding in every aspect of people’s lives; therefore, vulnerabilities and privacy are the main concerns. In order to tackle these problems, more research in specific areas is being conducted. Areas such as network management, firewall, encryption, etc. Computer network security refers to the controls on how to protect privacy, integrity, and availability. There are two types of securities which are physical and logical security. Depending upon the individual and organizations, the privacy and data can mean different things. Some just want pure security privacy, others protection. To make plans against different threats/disasters in order to continue with the network communication. Additionally, network security consists of hardware and software that protects data and addresses technical and management issues. Threats include inside people, which are internal threats, employees who leak information intentionally or unintentionally, reconfigure the network, alter or steal data, and more examples of inside threats and destruction. There is also unauthorized user with unauthorized access, such as hackers and/or users navigating unauthorized ways of getting resources. Attacks on integrity which includes manipulating data, denying access to basic operations to users and providing wrong information to end users. Attackers find ways to intercept data such as frequency, length, parameters in order to obtain valuable information which is hard to detect. Attackers can also pretend to be network control, leaders, and other entities so they can access data, use unlimited resources, denial of actual users and obtain and modify key information, passwords, etc. Attackers destroy access to user such as not letting them use daily resources nor operations. Attackers can also repeat itself meaning obtain information and sent it as many times as they want whenever they want. Other kinds of threats are computer virus, network errors, disaster, etc. There are technical protections such as firewalls, constant virus analysis, monitoring, scanning, etc. Technical level includes department of network administrators, technicians and trained users in order to maintain a system of security. In which there will be detecting virus and backing up data on time. There is network access control which is especially important because it ensures for granting access to authorized users. Backup data and recovery is important due to how administrators obtain data after an accident by using different strategies. There is application code technology which is one of the main components of information security. It provides integrity with passwords, encryptions, signatures, and different types of keys. Use antivirus programs and do not download unknown content. Research up to date and better high security operating system in order a safer environment and high performance and do not give a virus any chance. Computer network depends on network protections, security technology, implementations, measurements, laws, and regulation in order to obtain an effective security. To prevent/resists computer’s users from virus, crimes, and hackers. “Users need to be educated and be aware of safety and management institution with continues improvement on technology and laws. According to the author “Never-ending education to users and staff such as code, computer safety principles and to obey rules and regulations to maintain a safe and reliable working environment” (Lin, 2012). Finally, there should be different types of rooms dedicated to different aspects of computer security countermeasures.

Reference

Li, F. (2012). Study on Security and Prevention Strategies of Computer Network. International Conference on Computer Science and Information Processing (CSIP), 645-647. https://ieeexplore-ieee-org.citytech.ezproxy.cuny.edu/document/6308936

Leave a Reply