Assessment of Internet Agent Security on Data Networks

Loading...
Thumbnail Image
Date
2010-06
Journal Title
Journal ISSN
Volume Title
Publisher
Kampala International University, bachelor's degree of computer science
Abstract
The whole project deals with Network disruptions, unauthorized users, software failures, hardware failures, natural disasters, employee errors and terrorist attacks can prevent information systems from running properly or running at all. Computer systems play such a critical role in business, government, and daily life that firms need to make security and control a top priority. When a computer connects to a network and begins communicating with other computers, it is essentially taking a risk. Internet security involves the protection of a compute?s internet account and files from intrusion of an unknown user. Basic security measures involve protection by well selected passwords, change of file permissions and backup of computerts data. It also presents any thing that deal with the Internet Security of the Internet and all things that may help the Internet to work very well without any problem and this can be referred to as risk in Information technology and its mitigations. The references were collected from Internet, books, publication, and magazines. The researcher collected data from two sources included the primary and secondary sources. Primary sources were included in the questionnaires that were designed to collect data from respondents. This data was used to draw conclusion about the problem under study. Secondary source included the text books, journals, research reports, internet, news papers and other publication from which data was obtained. In most organizations, the network itself continually be expanded and updated, its components changed, and its software applications replaced or updated with newer versions. In addition, personnel changes will occur and security policies are likely to change over time. These changes mean that new risks surface and risks previously mitigated have again become a concern. Thus, the risk management process is ongoing and evolving.
Description
A Dissertation Submitted To The School Of Computer Studies In Partial Fulfillment Of The Requirements For The Award Of The Degree Of Bachelor Of Computer Science Of Kampala International University
Keywords
Assessment of Internet Agent Security, Data Networks
Citation