IT Protection Measures
Objective 14-5 Describe the ways in which businesses protect themselves from the threats and risks information technology poses.
Security measures against intrusion and viruses are a constant challenge. Most systems guard against unauthorized access by requiring users to provide confidential login credentials such as user IDs and passwords. Other measures include firewalls, special software, and encryption.
Preventing Unauthorized Access: Firewalls
Firewalls are security systems with special software and/or hardware devices designed to keep computers safe from hackers. A firewall is located where two networks—for example, the Internet and a company’s internal network, or intranet—interface. It contains two components ...
Get Business Essentials, 12/e now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.