OtherPapers.com - Other Term Papers and Free Essays
Search

Cmgt 440 - Hacking Attacks and Prevention

Essay by   •  January 16, 2012  •  Term Paper  •  609 Words (3 Pages)  •  1,651 Views

Essay Preview: Cmgt 440 - Hacking Attacks and Prevention

Report this essay
Page 1 of 3

Hacking Attacks and Prevention

Troy Good

CMGT/440

1/09/2010

Introduction: 

The article on prevention of hacking attacks comprehensively describes

the various methodologies that can be pursued to minimize the risk of security attacks on

the IT infrastructure, network and systems of an organization. It describes the various

threats faced by organizations and the remedies for those threats. 




Evaluation: 
The article provides a comprehensive overview of the various types of

threats encountered by IT staff in an organization and covers the major security practices

that the organizations should pursue to mitigate risks arising due to such threats. 

The

article starts with the most basic strategy to minimize security attacks, ie, hardening the

systems. In layman terms, the article points that configuration of the operating system

and software is the first basic task in terms of ensuring the security of the organization's

IT infrastructure. Although the article does not specifically point on the installation of

latest and most applicable security software and hardware, it does point out to this fact at

the end of the article where it speaks about purchase and deployment of products as per

needs of the organization. 

The second recommendation in the article discusses about the

importance of keeping the security software updated with patches and upgrades to protect

against all kinds of new threats and risks that arise on a daily basis. As we know that new

viruses and threats almost occur on a daily basis and make the systems vulnerable to such

threats, it is necessary that security software and tools should be upgraded on a regular

basis to ensure that the systems and protected against all kinds of threats. 



The third point mentioned in the article points to the importance of firewall as a tool to

protect against unauthorized access or intrusions by access. The article describes that

such firewall can be both software and hardware/appliance and may not be too costly to

purchase. 

The article goes further

...

...

Download as:   txt (4.1 Kb)   pdf (150.6 Kb)   docx (10.7 Kb)  
Continue for 2 more pages »
Only available on OtherPapers.com