Wait a second!
More handpicked essays just for you.
More handpicked essays just for you.
The role of computer networks
Important of computer networking
Don’t take our word for it - see why 10 million students trust us with their essay needs.
Recommended: The role of computer networks
Acceptable Use Policy (AUP) and Security Audit
In the computing world, the Acceptable Use Policy (AUP) refers to the set of rules that are applied by the manager of a particular computer network or website that helps to restrict the ways in which the website or network can be used (Ciampa, 2012). The AUP documents are normally written for the service providers in order to help reduce any potential legal action taken by a user subscribing to such services. Sanctions are usually imposed on a service user who ends up breaking the AUP rules. However, regular security audits need to be done on the websites as well as the networks involved in order to ensure that every user complies with the rules.
Part 1: Computer systems, network and data Acceptable Use Policy (AUP)
A computer system comprises of one or several computers of which all of them are associated with the common software or rather one storage space. This system could have other computer peripherals connected to them. All of these computers can operate independently as well as the ability of communicating with each other.
On the other hand, a computer network is a telecommunication network of computers that enables the networked computers to exchange data between each other. However, the Acceptable Use Policy of the computer systems and network still apply here. All the computer users are assigned a specific user ID as well as a specific password that enables them to access only the information that is allowed within their authority.
Furthermore, the scope to who the AUP policies apply to includes the large corporations company, schools, universities, internet service providers, individuals, government agencies as well as some business organizations. Moreover, the person w...
... middle of paper ...
...n password
Is the security level listed by the network administrator acceptable with you? Yes/ No If yes, then you are assured of your own computer safety from hacking
If no, then disconnect yourself from the computer network
Is the computer Firewall enabled? Yes/ No If yes, then you are secured from hacking
If no, then enable the computer Firewall
Is the screen saver configured? Yes/ No If yes, then the computer will help to save on the unnecessary power bills
If no, then the computer user needs to configure his own screen saver
Does the screen saver require a password to clear it? Yes/ No If yes, then you are secured with your screen saver
If no, then configure your screen saver password
Are all of the computer passwords secured? Yes/ No If yes, then your computer is safe to be used within the computer network
If no, then secure all of your computer passwords
This document will outline the policies and practices to be used and implemented in compliance with DoD specifications and standards for the contract of services to be provided to them. This report will consist of creating security controls based on auditing frameworks within the seven domains. Also to develop information assurance (IA) plan, a list of the requirements for each of the seven domains.
1. A device is a computer if it has an input device, central processing unit (CPU), internal memory, storage, and an output device.
Network Security is the protection of the computer’s network though out the entire infrastructure. It can protect very important information and computer files to help prevent theft, spyware, malware, viruses, and more. Depending on if you have a public or private network, can determine what type of security settings you need for your network. All people are different on what they want to have secured or not, but most people do not know how to prevent people or things from getting in their network. “You must have a general understanding of security terminology and specifications as it relates to configuring hardware and software systems.”(Roberts, Richard M. 599). That quote states that by knowing and understanding security terms and specifics, you can
Not long ago computers were non-existent in many homes. When computers were first introduced to the world, they were for the sole purpose of performing business functions. The only people who owned computers were large organizations. Eventually, computers were introduced into the homes of those who could afford to buy them. Today, just about everyone owns some form of system that they use daily to help manage their day-to-day operations. What many once survived without now seems impossible to do without. As technology continues to grow, it has a greater effect on families and the education system. Some companies such as Microsoft and Apple made it possible to reinvent a new form of technology that would change the world. Each company had some form of struggle and overtime had to keep up with the changes of time and the way people communicated. From the first day of its invention, organizations have had to steadily implement new operating systems to keep up with the demands of the people while staying afloat with competitors. The ways of life for many have changed as well as the way people communicate. It is evident that the history and uses of computers have changed the world but these computers could not perform without the operating systems. Various operating systems will be discussed, how they began and how they each changed since they were first introduced. Although, they all had a purpose each varied in how they performed and changed the lives of many and will continue in the near future.
Siau, K., Nah, F., & Teng, L. (2002). ACCEPTABLE INTERNET USE POLICY. Communications Of The ACM, 45(1), 75-79.
This paper describes the basic threats to the network security and the basic issues of interest for designing a secure network. it describes the important aspects of network security. A secure network is one which is free of unauthorized entries and hackers
As the internet is becoming faster and faster, an operating system (OS) is needed to manage the data in computers. An Operating system can be considered to be a set of programed codes that are created to control hardware such as computers. In 1985 Windows was established as an operating system and a year earlier Mac OS was established, and they have dominated the market of the computer programs since that time. Although, many companies have provided other operating systems, most users still prefer Mac as the most secured system and windows as it provides more multiple functions. This essay will demonstrate the differences between windows
The files of a teacher or student are only accessible by the respective individual, thus limiting the risk of one unlawfully retrieving such documents. The school network system provides teachers with choices as to where to save files. For example, staff have access to the S:drive, T:drive and their P:drive. All drives are protected by password, therefore adhering to privacy regulations. However, passwords need to be changed more regularly so as to ensure the security of the network.
Recognizing the increasing use of computers by federal agencies, and the vulnerability of computer-stored information including personal information being used with unauthorized access, the Computer Security Act was enacted in 1987. Seeing to the immediate issue prior to the sensitive security, The Act provided for improving the security and privacy of information in federal computer systems”. Several agencies were held responsible for many overlapping computer security which inspire a legislative response through The Act (It Law). It was an immediate concern to decide how best to control information in computerized or networked form, and whether further response should be necessary.
Siau, K., Nah, F., & Teng, L. (2002). ACCEPTABLE INTERNET USE POLICY. Communications Of The ACM, 45(1), 75-79.
A network can be based on either a peer-to-peer level or server-based, also referred to as domain-based. To distinguish the difference, a peer-to-peer network, also known as a workgroup, is a network in which a group of computers are connected together to share resources, such as files, applications, or peripherals. The computers in a peer-to-peer network are peers to one another, meaning no single computer has control over one another. There is also no central location for users to access resources, which means that each individual computer must share their files in order for other computers to have access (Muller, 2003, p.411). “In a peer-to-peer environment, access rights are governed by setting sharing permissions on individual machines.” (Cope, 2002) On the other hand, in a domain-based network, the computers connected together are either servers or clients. All of the other computers connected to the network are called client computers. The server is a dedicated machine that acts as a central location for users to share and access resources. The server controls the level of authority each user has to the shared resources. When logging on to the network, users on client machines are authenticated by the server, based on a user name and password (Lowe, 2004, p.13).
The internet has been one of the most influential technological advancements of the twenty-first century. It is in millions of homes, schools, and workplaces. The internet offers not only a way of communicating with people around the world, but also a link to information, shopping, chatting, searching, and maps. This freedom to be anyone and to "go" anywhere right from the comfort of home has become a cherished item. However, there is always a down side to every up. Because of the freedom to post anything and access anything on the internet, the issue of regulation has arisen; for example, what should and should not be allowed on the internet? Who has the right to regulate this space that we cherish for its freedom?
...s, which keep track of the users’ digital footprints and activities. Physical surveillance, in the form of trawling the Internet and hacking computers is technically feasible but fiscally unfeasible. Such measure also compromise privacy and democracy. Conversely, employing legislation to regulate and/or control the Internet has a number of advantages in terms of the ease of execution, the feasibility, and the transparency of the judicial processes (Johal, 2004: 4). However, legislature is purposely vague and the language ambiguous, allowing for flexibility of interpretation in the event of new developments (Endeshaw, 1996: 210). For example, the Internet Code of Practice that states that '(p)rohibited material is material that is objectionable on the grounds of public interest, public morality, public order, public security, national harmony' (in Johal, 2004: 5).
Computers; they are a part of or in millions of homes; they are an intricate part of just about every if not all successful businesses, the government, and the military. Computers have become common place in today’s society and the lives of the people who live in it. They have crossed every national, racial, cultural, educational, and financial barrier, which consequently ushered in the information age. A computer is a programmable electronic device that can store, retrieve and process data, and they come in all shapes, and sizes. They can be used for and in just about anything. As stated before, they are used in just about every aspect of modern society. They are so fundamental to modern society that it would be disastrous to society without them. As stated before, there are many areas in modern society that are run by computers. They play an intricate part of millions of homes in the world. Office workers in business, government and the military may use them to write letters, keep rosters, create budgets, find information, manage projects, communicate with workers, and so on. They are used in education, medicine, music, law enforcement, and unfortunately crime. Because computers have become such a part of the world and how it operates, there is a tremendous responsibility for those who are in control of these computers and the vital information that they carry, to manage and protect them properly. This is management and protection is vital because any loss or damage could be disastrous for the affected entity. For example, a mistake or intentional alteration of a personal credit file could affect ones ability to buy a car or home, or can lead to legal actions against the affected person until the mistake or intentional alteration has been corrected. Therefore, with the advent of computers in the information age, and all of the intentional and unintentional violations against them, comes the need to safeguard them and the information they carry with strong systems and policies of computer security.
computer architecture Computer architecture covers the design of system software, such as the operating system (the program that controls the computer), as well as referring to the combination of hardware and basic software that links the machines on a computer network. Computer architecture refers to an entire structure and to the details needed to make it functional. Thus, computer architecture covers computer systems, microprocessors, circuits, and system programs. Typically the term does not refer to application programs, such as spreadsheets or word processing, which are required to perform a task but not to make the system run.