Computers
Essay Preview: Computers
Report this essay
Introduction
Networks, computers, along with a variety of complex IT devices and systems, are essential components of routine activities in many organizations, all providing powerful tools that contribute towards meeting a main IT goal: that of facilitating an efficient re-defining or re-thinking of core business processes. The technical and other staff involved in maintaining system operation depend on their network to be continually available to allow normal user-access in order to obtain and exchange data that is essential to the success of managing organizational business processes. The consistent functional availability of a network structure is one of the primary responsibilities involved in quality management of this complex digital inter-connected system.
The extent of rapid network expansion and utilization throughout industry all at an accelerating rate has caused increased network vulnerability and insecurity. This is mainly from a rising number of system attacks, violations, and many other serious compromises, it also stems from inadequate internal protection mechanisms. The increased reliance from organizations upon the application of data-processing tools, and the growing use of communications facilities that incorporate multi-device systems, has resulted in more urgent requirements for establishing a quality, effective, network system security structure. With the dependence on a network structure as the centralized system responsible for the operation of business logistics, there is a growing demand for protection against increasing threats that seek to exploit vulnerabilities within its architecture and components that can cause significant if not total destruction.
The struggle to solve these problems is escalating, becoming more expensive, and has potentially serious consequences if a business is on the losing
side even to a minimal degree. There is no comparison as far as the incurred cost between a business and its adversary, it is cheap and relatively simple to mount what ends up being a serious threat to a network system environment. The monetary gain that may exist varies for those who create such costly damage, and it is normally carried out all in an anonymous manner, often from a great distance. But in contrast, a business yields no positive gains and usually pays a high price from an infiltration into its very core information base as a result of illegally accessed data. Organizations must invest significant resources to protect themselves against both internal and external threats that at the same time require very little resources to inflict damage. In essence when considering a motive for such potential destruction, there is little monetary or other gain realized by an attack even if it is successful.
The threat to network security is fast becoming more apparent as data compromises grow in numbers, while the