Cmgt 440 - Hacking Attacks and Prevention
Essay by people • January 16, 2012 • Term Paper • 609 Words (3 Pages) • 1,667 Views
Hacking Attacks and Prevention
Troy Good
CMGT/440
1/09/2010
Introduction: The article on prevention of hacking attacks comprehensively describes
the various methodologies that can be pursued to minimize the risk of security attacks on
the IT infrastructure, network and systems of an organization. It describes the various
threats faced by organizations and the remedies for those threats.
Evaluation: The article provides a comprehensive overview of the various types of
threats encountered by IT staff in an organization and covers the major security practices
that the organizations should pursue to mitigate risks arising due to such threats. The
article starts with the most basic strategy to minimize security attacks, ie, hardening the
systems. In layman terms, the article points that configuration of the operating system
and software is the first basic task in terms of ensuring the security of the organization's
IT infrastructure. Although the article does not specifically point on the installation of
latest and most applicable security software and hardware, it does point out to this fact at
the end of the article where it speaks about purchase and deployment of products as per
needs of the organization. The second recommendation in the article discusses about the
importance of keeping the security software updated with patches and upgrades to protect
against all kinds of new threats and risks that arise on a daily basis. As we know that new
viruses and threats almost occur on a daily basis and make the systems vulnerable to such
threats, it is necessary that security software and tools should be upgraded on a regular
basis to ensure that the systems and protected against all kinds of threats.
The third point mentioned in the article points to the importance of firewall as a tool to
protect against unauthorized access or intrusions by access. The article describes that
such firewall can be both software and hardware/appliance and may not be too costly to
purchase. The article goes further
...
...