¶ … Computer Security by Rozeberger and Zeldich. The tutorial gave a basic overview of computer security, including viruses, worms, and Trojan horses. It discussed how to avoid attacks or at least to become aware of the potential of attacks. The tutorial also looked at how hackers work, to help explain how breaks are performed. I chose this tutorial because I believe that computer security is one of the most significant and serious issues for any emerging IT professional. It a network is not secure, it will become vulnerable to attack by hackers. Therefore, any other work that an IT professional does on a computer must be considered secondary to the safety of the network. The tutorial began with an extensive history of computer hacking. This history was fascinating. While I do not feel like it would contribute to my daily knowledge as an IT professional, in that I could not use that information to secure current networks, I felt as if it gave me significant background information. For example, I learned that early hackers seemed motivated by profit (they hacked into phone systems to...
Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.
Get Started Now