Thursday, August 15, 2013

COMPUTER AND INTERNET SECURITY








Title of the Article: Awareness and challenges of internet security
Author: Hawkins, Steve ; Yen, David C. and Chou, David C.
Publisher: Emerald Group Publishing Limited
Document URL : http://search.proquest.com/docview/212305494?accountid=141440

Abstract:


     This article presents an in-depth discussion of the awareness and challenges of internet security in both government and private sectors. It begins with an overview of internet security and the technologies used in protecting the data on a computer system. Some of the popular methods are : firewalls, user authentication, data encryption, key management, digital certificates, intrusion detection systems (IDS), virus detection, virtual private network (VPN) and extranets. Organizations in both the government and private sectors are aware of internet security and both sectors take action to protect their internet data and corporate systems. Also, both of them have their own strengths and weaknesses on internet security but they are both prepared to take challenges to develop a better internet security system.

Three Things I learned from my Reading Assignment:

      There are a variety of methods to protect data from intrusion. Current developments in technology provide a number of ways to secure data transmission and storage. Some of the methods are firewalls, user authentication, data encryption, virus detection, and VPN (Virtual Private Network) among others.
      Both government and private sectors are fully aware of securing  their data from intrusion. Depending on the nature of their work and their particular needs, both are taking actions to safeguard their valuable data from damage. They can choose from a variety of methods to protect their data from intrusion
       No matter how protective both government and private sectors are with regard to safeguarding their most valuable data, still there are hackers out there who are always ready to do everything just to intrude in any library's  computer system. Challenges for the government sector include: hiring IT professionals from the private sector, developing virtual private networks and providing training for IT staff. 

Implications:

       Building a secured library network is indeed a very huge and challenging task. Careful thought, adequate planning and the confident perspectives and strong recommendations of a group of IT people or staff will spell the success of a secured information system and network in the library. This group of IT experts has an important task of configuring the network properly so that it is scalable and flexible to handle additional hardware and software as the network grows. If any element in the network system is misconfigured, a hacker could gain entry and intrude into the library information system and network. The above-mentioned methods of securing the network can be utilized.
      It is not enough that there are methods providing assurance of protection. On the part of the members of the library staff , there should be awareness training and education. Carelessness on their part will affect the library network's security. The best that they can do is to constantly keep watching and be on guard for possible intrusions so that they can bring them immediately to the attention of IT experts. Faculty members as well as government officials should also be aware of the threats in internet security.
      The passage of Republic Act 10175 also known as "Cybercrime Prevention Act of 2012" and the "Data Privacy Act" proves that the Philippine government is not only aware but is really vent on curbing illegal access to computer networks by making punishable under the law all forms of misuse, abuse and illegal access. The government recognizes the need to protect and safeguard the integrity of computer and communications systems, networks and databases by facilitating the detection, investigation and prosecution of offenses. With theses legislations by congress, hackers will somehow think twice before starting to execute their dark plans of making intrusions or illegal access to computers which may greatly affect library services.
      
       

No comments:

Post a Comment