Assessment of Internet Agent Security on Data Networks
Loading...
Files
Date
2010-06
Authors
Journal Title
Journal ISSN
Volume Title
Publisher
Kampala International University, bachelor's degree of computer science
Abstract
The whole project deals with Network disruptions, unauthorized users, software failures,
hardware failures, natural disasters, employee errors and terrorist attacks can prevent information
systems from running properly or running at all. Computer systems play such a critical role in
business, government, and daily life that firms need to make security and control a top priority.
When a computer connects to a network and begins communicating with other computers, it is
essentially taking a risk. Internet security involves the protection of a compute?s internet account
and files from intrusion of an unknown user. Basic security measures involve protection by well
selected passwords, change of file permissions and backup of computerts data.
It also presents any thing that deal with the Internet Security of the Internet and all things that
may help the Internet to work very well without any problem and this can be referred to as risk in
Information technology and its mitigations. The references were collected from Internet, books,
publication, and magazines.
The researcher collected data from two sources included the primary and secondary sources.
Primary sources were included in the questionnaires that were designed to collect data from
respondents. This data was used to draw conclusion about the problem under study. Secondary
source included the text books, journals, research reports, internet, news papers and other
publication from which data was obtained.
In most organizations, the network itself continually be expanded and updated, its components
changed, and its software applications replaced or updated with newer versions. In addition,
personnel changes will occur and security policies are likely to change over time. These changes
mean that new risks surface and risks previously mitigated have again become a concern. Thus,
the risk management process is ongoing and evolving.
Description
A Dissertation Submitted To The School Of Computer Studies In Partial Fulfillment Of The Requirements For The Award Of The Degree Of Bachelor Of Computer Science Of Kampala International University
Keywords
Assessment of Internet Agent Security, Data Networks