AllFreePapers.com - All Free Papers and Essays for All Students
Search

Information Security Article

Autor:   •  February 18, 2013  •  Essay  •  445 Words (2 Pages)  •  1,804 Views

Page 1 of 2

Information System security is a topic often at the forefront of every System Administrator’s mind. Whether it be ways to mitigate risk, perform analysis, or simply employ better computing practices. However, it is always necessary to stay current on information pertaining to growing trends rather than rely solely on software applications to do the update work and antivirus and other security software applications to identify any threats. In recent years, the occurrence of what is known as Distributed Denial of Service (DDoS) attacks are prevailing despite advances in security implementation strategies. The purpose of this paper in relation to DDoS attacks is to evaluate the current information provided to educate those who may be unaware of this growing trend and attest to its quality.

Mohan’s (2013) article regarding DDoS attacks discusses not only what a DDoS attack is, but how many organizations fail to prepare for it. In some cases, these organizations are not aware of what a DDoS attack really is nor are they aware of its potential. In addition, the author emphasizes that individuals have a responsibility to work diligently to protect their own personal information stored on their devices. For example, Mohan explains that “If you are a user, it’s critical to bear in mind that any and all devices connected to the Internet have the potential to be used as part of a worldwide network of zombie computers (devices that are taken over without the owner’s knowledge) (para. 12). In relation to this particular threat, I was completely unaware that it even existed prior to beginning my Information Technology (IT) education program. As a computer user and IT student, I am astounded of the many methods hackers can employ to exploit an Information System.

What was particularly informative about Mohan’s (2013) article is that he emphasizes that any computer connected to the Internet is at risk, regardless of whether it’s a personal system or

...

Download as:   txt (2.7 Kb)   pdf (57 Kb)   docx (10.7 Kb)  
Continue for 1 more page »