Explain the importance of computer security and the steps that a law firm may take to protect the information contained in a computer network
What will be an ideal response?
With a single computer, the security issues are related to installing corrupted software or accessing something from the Internet that has a virus. By contrast, on a network, every computer work station represents a possible source of security issues and if a single station introduces a virus, the entire network will be impacted. One solution is to limit access, such as the ability to make changes to the operating system, add or delete software, and retrieve files. Network security protocols limit access to the file server and peripherals, such as printers or other work stations. Network rights and privileges determine who on the network may access the information and who has authority to access the server, the data stored on the server, and the flow of information. A network administrator is the person with the highest level of access to, or authority over, the network. Passwords can be used to grant access to files and computers. Firewalls are programs designed to limit access to computer or a computer network but may also prevent working at an off-site location. Antivirus Software scans the computer to identify the presence of viruses, and in some better programs, eliminates the virus. Despite the existence of antivirus software, viruses do get through, and there are certain precautions that should be followed: (1) do not open files or attachments from unknown email senders; (2) scan every disk with antivirus software before using it; (3) downloaded files should be scanned, and; (4) be sure antivirus software is continually updated. Finally, data should be backed up by creating a copy of data as a precaution against the loss or damage of the original data. It is a good policy to back up on a daily basis and store the backup media off-site.
You might also like to view...
Which of the following can qualify as theft by shoplifting?
a. Hiding merchandise on the suspect’s person b. Altering the price tag on goods c. Removing an item from store premises d. All of the above
An easement that is created where one parcel of realty is land locked or has no access to a public roadway:
A. Conservation easement B. Easement by necessity C. Easement by agreement D. Easement by prescription
Discovery is?
A. ?scientific evidence. B. ?the part of the lawsuit where Perry Mason appears. C. ?the part of a lawsuit where the parties obtain information from each other. D. ?a rule of evidence. E. ?the part of a lawsuit where the parties obtain information from each other, and a rule of evidence.
Bonnie and John were unable to have children of their own because Bonnie did not produce eggs. They decided to enter a surrogacy agreement with Amy and a child was born using John's sperm and Amy's egg. After the child was born, Amy decided she wanted to keep the baby. If the court resolving the surrogacy dispute holds that the woman who provides the egg should be regarded as the child's legal
mother, it is using a(n) A) genetic standard. B) gestational standard. C) intentional standard. D) special respect standard.