Protection of a computer and a network
While there are many methods in protecting a computer and a network, the method of invading is also various.It is means also with sufficient also using a password correctly to protect a system.Furthermore, only with a password, the man that it cannot finish protecting from a cracker or an improper use person has a private network, and if a firewall is used well, he can do a guard. However, if a setup of a firewall is made tight, it will think that it is hard to use itself, and it will be easy to be invaded if a setup is weakened.
Access restrictions are prepared in the computer to which the Internet is connected, or the data on a network, it was sufficient to them, and protection has started to them.It is going to use the command with which some reasons are in this, for example, a beginner does not get used, and there is a possibility of destroying to not knowing. Access is controlled also by goods on-line service, and a tax is imposed on a customer with it. Access of an employee or a student is limited to others also in the company or the school from the relation of the cost on the basis of license conditions or the used number of users. Furthermore, it is necessary to protect a computer from those who are going to break information intentionally or are going to steal.
The network currently aimed at in various places. A network completely safe of it is a private network. The private network is carrying out the self-conclusion and has not turned into a part of public network. It does not connect with the computer or the Internet which are outside.