Computer Concepts in Action

Unit 6: Databases

Network Security

Introduction:
Computer networks are constantly under attack from hackers, crashes, viruses and other threats. Learn more about how computer networks are protected.

Directions:
Read the information below and apply what you learn to answer the questions. Check your work carefully, and click Submit.

Issues
The same things that make a network so beneficial – connected resources, efficient workflow, and centralized information – also present a number of security risks that standalone computer systems do not have to face.

Risks
Working on a network means that one problem can affect all users:

  • Hardware failure, corrupted software, viruses, and WORMS can cause individual users to lose access to network resources such as drives and modems.

  • Hackers can use a single person's computer to gain illegal access to a computer network. Once in, the hacker can steal and corrupt information or release a virus.

  • Keeping personal data on a network also increases the risk that your personal data could be stolen by other users, corrupted by hackers, or destroyed due to a network or hard-drive crash.

  • Autonomy means the ability to work alone, or the ability to have complete control over something. Working on a network often means the loss of autonomy because damage to the network can shut down your computer, or if an administrator needs to make repairs, they may need to disrupt access to your data.

  • Privacy is an important network issue. Administrators, security personnel, or other employees will likely have access to your files, resulting in a loss of privacy.

Security
There are many ways to combat security risks on a network. A network administrator or security technician has many tools to make a network safer.

  • New users are screened and approved for access to a network.

  • Login names and passwords are checked against a list of known users, so only proper login procedures can access the network.

  • Passwords change frequently.

  • Automatic backup systems save work. Sometimes the data is backed up in multiple locations.

  • Specialized hardware and software allow network administrators and security personnel to monitor activity on a network.
  • A firewall is a type of security system that protects a network from intruders, especially from over the Internet. Firewalls can be hardware devices, software, or a combination of the two.
  • Encryption software encodes e-mails and electronic communications to make it difficult to read by unauthorized users.

Individual Responsibility
It is not just the responsibility of the network administrator to keep the network safe. Network users such as student or employees can do a lot to enhance overall network security.

  • Save your work frequently.

  • Keep your password secret.

  • Be careful about what you download from the Internet.

  • Be careful about opening e-mail attachments.


1
What are three ways network administrators can keep a network safe?
2
What is one way a user loses autonomy when working on a network?
3
What is a hacker?
4
What are two ways a network user can individually enhance network security?
Glencoe Online Learning CenterComputer Education HomeProduct InfoSite MapContact Us

The McGraw-Hill CompaniesGlencoe