Managing security on a network computer.1. managing security on a network.At present, an Internet network to grow quickly, almost every organization needs to. Their network connection to the Internet to take advantage of the biggest information source. This nalok the Internet compared with two sword sharp The benefits obtained from the Internet, it might be too much to the imagination, but the penalties are a lot as well. One reason was because of the information and the tools used for drilling system that can search and download from the Internet easily and these programs or tools, easy-to-use. Although people do not have much computer knowledge can use attack tools. These networks are not difficult, so the younger students or Department that has the system administrator du page need to risk analysis, design and installation of security systems, security surveillance system, as well as maintaining security in the network to be used effectively at all times.One of the problems about the trial to the standard levels of certification. A stable secure computing as it is a lack of understanding about the subject network. When the computer is connected to the network, new problems arise, and old problems had occurred. From another way For example, the computer communication over a LAN from the WAN, which has very high bandwidth, and may be hundreds of machines connected to the same media. Encoded using a single encryption may not work. Radiation from copper wire used to communicate it is very high because the wires are distributed across the room or across the building.2. the process of securing data.2.1 risk management (Risk Management ICT)Risk refers to the potential threats or opportunities as possible with your organization's network even when the enterprise security policy or not, according to the organization that is not a security policy network, and will have the opportunity to receive a. Higher risk organizations have a policy so as to reduce or mitigate the. Risk of enterprise's network system has a process called risk management occurs. The risk management process is a process step 2 release for use of the risk management is.1. search and risk assessment (Risk Identification & Assessment) 2. control risks (Risk Control) in General, risk management is the process of assessing risks to the system. Information network of the Organization, and determine whether those risks are controlled or mitigated, however.
การแปล กรุณารอสักครู่..
