Business

Business

  • Submitted By: tjkucera
  • Date Submitted: 07/11/2015 1:58 AM
  • Category: Business
  • Words: 2665
  • Page: 11








































Since the beginning of computers linked together through various networks, compromises to its security has existed and relentlessly taught. In the 80s and early 90s networks were not as widespread and utilized as they are today nor where the speeds of Internet connection to the average user. Since those times, networks over various computers, tablets and even smartphones now exist. WiFi and connectivity is at an all time high with the average user having multiple devices to go on the internet, download and upload various content which has open the floodgates for security concerns. Network security is now at an all time high because of viruses, adware and people that try to manipulate and steal personal information and breach individual or companies privacy stored within their own network. Software such as anti virus and anti spyware help prevent and remove attacks while other security safeguards such as firewalls, passwords and encryption aim to direct traffic in and out of a network to prevent attacks from breaching a network. Attacks are becoming more sophisticated and more frequent as networking continues to grow which leads us to wonder if the software and hardware we utilize able to keep pace with the ever growing threats to our personal and business networks.
To combat the various forms of attack on network security government agencies developed a Computer Emergency Response Team (CERT) purely for network security, which was the first of its kind. This team which established in 1988 tried to emphasize the importance or security and bring about awareness as the craze for the Internet slowly began to gain steam (adkja;lfjdld). The official release of the Internet to the general public spelled the end to specialized response teams as security measures such as firewalls and anti virus has become the only was to keep up with the exponentially growing security risk that has...

Similar Essays