Verified Document

Computer Security By Rozeberger And Zeldich. The Essay

¶ … Computer Security by Rozeberger and Zeldich. The tutorial gave a basic overview of computer security, including viruses, worms, and Trojan horses. It discussed how to avoid attacks or at least to become aware of the potential of attacks. The tutorial also looked at how hackers work, to help explain how breaks are performed. I chose this tutorial because I believe that computer security is one of the most significant and serious issues for any emerging IT professional. It a network is not secure, it will become vulnerable to attack by hackers. Therefore, any other work that an IT professional does on a computer must be considered secondary to the safety of the network. The tutorial began with an extensive history of computer hacking. This history was fascinating. While I do not feel like it would contribute to my daily knowledge as an IT professional, in that I could not use that information to secure current networks, I felt as if it gave me significant background information. For example, I learned that early hackers seemed motivated by profit (they hacked into phone systems to...

Parts of this document are hidden

View Full Document
svg-one

Hackers exploit vulnerability, so it is up to the computer professional to eliminate vulnerability wherever possible. The two most interesting components were password security and social engineering. While adequate software protection should be able to protect the network from worms, viruses, and Trojan horses, they are useless if users allow access to the network by unauthorized people. What this made me realize is that, as an IT professional, a significant part of my job will necessarily involve the education of and communication with network users, to help keep the network safe.
In Debby Koren's tutorial, Local Area Network Portal, one can learn about the different ways to connect networks. I selected this tutorial because I feel as if connectivity is the key to computer services. After all, a computer that stands alone and is not connected to any other devices…

Sources used in this document:
References

Koren, D. (2011). Local area network portal. Retrieved January 9, 2012 from Rad University

website: http://www2.rad.com/networks/infrastructure/lans/main.htm

Rozenberger, A. & Zeldich, O. (2005). Computer security. Retrieved January 8, 2012 from Rad University website: http://www2.rad.com/networks/2005/computersecurity/main.htm
Cite this Document:
Copy Bibliography Citation

Sign Up for Unlimited Study Help

Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.

Get Started Now