Network Security 1
Network Security 1
Network Security 1
Introduction to Network Security
most probably the users will not use it again and might transfer to a more
secured bank company where mobile banking is more reliable.
3. To keep your job
As a network administrator, it is your job to protect the organizations
information. It is so important to have and implement a very secured network
to avoid intruders damaging or having an unauthorized access from your
network. Your main job is to keep the security of the company’s computer
and network system, failure to do so might result for termination.
Network Security 3
Introduction to Network Security
1. Hardware
The term hardware denotes to machinery. It includes all the
components of a tangible parts of a system unit including CPU and its
equipment or computer peripherals such as input and output devices, storage
devices and communications devices. Input devices is a piece of computer
hardware equipment used to provide data and can be a signal controller to an
information processing system like mouse, keyboard, scanners, microphone,
controllers and cameras. While output devices such as monitor, projector,
printer and speaker are computer hardware that sends data from a computer
to another device or user which converts information into human-readable
form.
Network Security 5
Introduction to Network Security
2. Software
Software is a set of instructions or data that program used to operate
computer and execute specific task which falls into two types; the system and
application software.
a. System software are the programs that are dedicated to manage
the computer itself such as the OS or operating system, file
management utilities and disk operating system or DOS. The
operating system plays an important role in this type of software
since it is the once managing the computer hardware resources in
addition to applications and data. Without this system, software
installed in our computer will not work.
b. Application Software App for short and it is often called
productivity programs or end-user programs. It allows user to
complete their tasks such as creating documents, sending emails,
browsing the internet, graphics designing or even play games.
3. Networks
Network means two or more computer interconnected to each other
that share its resources. Network plays a vital role in information system since
it is the one who allows organizations to link computer and its users. Hubs,
router, ethernet cables, repeater or even cellphones are examples of network
or what we sometimes called telecommunication.
4. Database
Database play a very crucial in maintaining or collecting information.
Database is an organize collection of facts and information which is very
important in an organization. In old times, we organize information with the
use of filling cabinets which becomes more difficult to manage when the
information that an organization becomes bigger and bigger where they need
to have a warehouse to store all the physical information that they need to
keep. But with the help of the technology such as SQL, MySQL and other
software use to store information, organizations way of keeping and storing
information will be lot easier and these data are always available for someone
who have an access to it.
5. People
Every information system needs to have someone to use it for it to be
useful. People are often the most over-looked component of an information
system. Users are essential for the operation of all information systems and
these people resources include end users and Information system specialist.
• End users and sometimes called users or clients. These are the
individuals who are using the information system or the information it
produces.
• Information (IS) Specialists are the people who develop, operate and
maintain the information system. They may be a system analyst,
Network Security 7
Introduction to Network Security
Network Security 9
Introduction to Network Security