Unauthorized Access to Computer Systems: Problem and Solutions
Verified
Added on 2023/06/04
|4
|832
|68
AI Summary
This article discusses the problem of unauthorized access to computer systems due to various types of users who need different levels of access. It also suggests countermeasures such as passwords, firewalls, and network control to prevent it.
Contribute Materials
Your contribution can guide someone’s learning journey. Share your
documents today.
Sears PROBLEM SOLUTION
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
The Problem of Unauthorized Access to Computer Systems The problem of Access to Computer Systems has been an issue due to the unauthorized users who need to have access to the computers. It has become even more challenging due to various types of users who need different levels of access. For example, contactors, business partners, the outsiders who don’t work in the business boundaries and the internal users. The business resources have got various classification levels i.e. internal use only, or the resource is private or even it is confidential. This requires that the diversity identity, data should be stored in different types, for example business credentials, business contact information, related work data and even the passwords, (Bell & LaPadula, 2013).Unauthorized access to computer systems is also challenged by the fact that the corporate environment is continually changing which affects the business needs, employee roles and workings, and their resource access needs. Ways of Unauthorized Access Tailgating Tailgating occurs when any person follows an authorized user through the door. This brings the whole building to risk because the user will have hold the door for an authorized user which out of order. This can be minimized by training all authorized users on the need of security. Alarms can be used to detect unauthorized users.. Door Keys Keys poses a big problem because they are very hard to track when they get lost or forgotten and if any person tends to enter the room. At this time there is a lot of danger and the only way to prevent the unauthorized access is to ensure security of the room is to use re-core locks which tends to be very expensive, (Forman & Zahorjan, 2014).
This problem can be solved by the following counter measures: Passwords Passwords are mainly used methods of authentication which require a special attention when it comes to password selection. Password selection should at least follow the following: Password should be not less than six characters in length. They should not use words or names that are commonly expected formats like the departments names. They should not be reflecting to the owners of the accounts like the initials or names of the heads of departments. They should require a mixture of characters so that the upper and lower cases are both used. Installing Firewalls Firewalls ARE dedicated system that disjoins two networks. The business should consider this setup as mandatory on its network both the internal and the external, with them users on the internal network are protected, (Subashini, & Kavitha, 2011). Maintaining Network Control Computers are regularly part of an arrangement of frameworks called network. A network enables associated frameworks to transfer data and access information and different assets that are accessible from frameworks associated with the system. Systems administration has made a great and advanced method for registering. In any case, organizing has additionally risked computer security. For example, inside a system of a computer, singular frameworks are available to permit sharing of data. Additionally, on the grounds that numerous individuals approach the system, there is more possibility for permitting undesirable access, particularly through client error for instance, through a poor utilization of passwords, (Gordon, Loeb, Lucyshyn & Richardson, R. 2010).
The problem of unauthorized computer access won't be settled in medium-term. It will require investment, similarly as it set aside time for computer frameworks to develop from centralized computers to conveyed systems. In any case, meta-indexes and norms propose that there is an approach to position get to control where it has a place - a necessary piece of a foundation now isan appropriated framework that is all around accessible to the application level. References Bell, D. E., & LaPadula, L. J. (2013).Secure computer systems: Mathematical foundations(No. MTR-2547-VOL-1). MITRE CORP BEDFORD MA. Forman, G. H., & Zahorjan, J. (2014). The challenges of mobile computing.Computer,27(4), 38-47. Gordon, L. A., Loeb, M. P., Lucyshyn, W., & Richardson, R. (2010). 2005 CSI/FBI computer crime and security survey.Computer Security Journal,21(3), 1. Subashini, S., & Kavitha, V. (2011). A survey on security issues in service delivery models of cloud computing.Journal of network and computer applications,34(1), 1-11.