Sunday, January 23, 2011

Computer Security: Protecting Your Data

Computer Security: Protecting Your Data

Author: Dennis Thomsen

Computer Security has become increasingly important as more and more companies rely on software to run their business. This article will provide you information about computer security and how you can use it to protect your data. Whether you’re a business owner, an executive, or an IT manager, the following information will be beneficial to you.

A “safe� computer is still a target. As new weaknesses and new systems of attack are discovered, just about anyone can most likely launch an overwhelming attack against an unprotected network. Computer security is a requirement.

Network attacks are developing in their class and in their abilities to dodge detection. Also, attacks are becoming more centered and have bigger money implications for their victims.

Connecting a computer to an external network (for instance, the Net) introduces the chance that outside assailants will exploit the network, maybe by taking network information or by impacting the network's performance (for instance, by introducing viruses). However, even if a network were disconnected from any external network, security threats (in reality, the majority of the likely security threats) would still exist.

In particular, according to the Computer Security Institute (CSI) in San Francisco, California, roughly 60 to 80 percent of network misuse situations spring from the interior network. Thus, although network isolation is never possible in today's e-business environment, even physical isolation from other networks doesn't guarantee computer security.

Primarily based on these contributors, network directors must consider both external and internal threats. Computer security threats originating within a network are far more serious than external threats. Here are some reasons for the seriousness of internal threats:
- Internal users already have understanding of the network and its available resources.
- Inside users generally have some level of access granted to them due to the nature of their job.
- Standard computer security mechanisms like Intrusion Prevention Systems (IPS) and firewalls are ineffectual against a lot of the network misuse originating internally.

On the other hand, external assailants potentially don't have intimate understanding of a network, and because they don't already possess access credentials, their attacks have a tendency to be more technical in nature. For instance, an assailant could perform a ping sweep on a network to spot IP addresses that reply to the series of pings. Then, those IP addresses may be the subject of a port scan, in which open services on those hosts are discovered. The assailant could then attempt to exploit a known weakness to compromise one of the discovered services on a host. If the attacker gains control of the host, he could use that as a jumping-off point to attack other systems in the network.

Based on these factors, network administrators must consider both internal and external threats. By monitoring computer security, you can significantly reduce operating expenses and improve overall company productivity.

Computer security solutions can help you protect you data by detecting and eliminating computer security vulnerabilities, including the following areas:

Unapproved Software: Ensures that all software applications installed on your network computers are approved by your company's security policy.

Suspicious Traffic: Detects abnormal traffic on your network that could indicate an attempt to access or manipulate your computers.

Intrusion Vulnerability: Identifies open ports or other undesired access points that could put your computers at risk of intrusion.

Malware Protection: Protects your network with antivirus and other computer security software; ensures installation, updates and proper function on all computers.

Updates & Patches: Assures all critical security updates and patches are installed, with Microsoft's minimum protection.

Security Practices: Ensures all your computers are configured and used in accordance with best practices for IT security.

Clear Blue Agents: Monitors your computer security status and lets you know how to solve any problems it detects.

Virtual Security Assistant: Provides 24/7 security for your entire network at a fraction of the cost of human domain experts.

Article Source: http://www.articlealley.com/article_889650_11.html

About the Author:

http://ClearBlueSecurity.com

No comments:

Post a Comment