CD-ROM
The network security lifecycle implementation (CD + Cetak)
This final report based on the internet users growing fast every year.Nowdays people who implementThe Computer Network technologyin their daily life are growing starts from The Entrepreneur, Organizations, Offices, Educations, and Military Defenses until the personal users. They are called as “The Internet Superhighway” along the user of Information technologies growing fast.There are some crimes growing fast along the internet users grow up too. This thing must be minimized by implementing the network security lifecycle.The network security lifecycle is not a product, but it is a chain security process or method to minimize a cybercrime that threaten the internet users in a world-wide. The cybercrime caused by human neglect and many other possibilities that happen. The network security lifecycle contains identification, assessment, protection, and the last is monitoring thatruled by a standard and policy. Toprotectthe computer, at least we have to use three apps, namely antivirus, antispyware kits, and active the firewall. To keep it secret, the writer suggests to be carefully when using computer network technology because there are a lot of people who expert in computer network technology and they had an indication to threaten us
Tidak tersedia versi lain