answersLogoWhite

0


Best Answer

3 assests of computer system

-hardware

-software

-printer

User Avatar

Wiki User

11y ago
This answer is:
User Avatar

Add your answer:

Earn +20 pts
Q: What are the assets of a computer system what are the possible categories of attack on the security of a computer system or network?
Write your answer...
Submit
Still have questions?
magnify glass
imp
Continue Learning about Computer Science

What are the Limitations of computer network?

Limitations of Computer NetworksFollowing are some of the major limitations of computer networks.Security Issues: One of the major drawbacks of computer networks is the security issues involved. If a computer is a standalone, physical access becomes necessary for any kind of data theft. However, if a computer is on a network, a computer hacker can get unauthorized access by using different tools. In case of big organizations, various network security software are used to prevent the theft of any confidential and classified data.Rapid Spread of Computer Viruses: If any computer system in a network gets affected by computer virus, there is a possible threat of other systems getting affected too. Viruses get spread on a network easily because of the interconnectivity of workstations. Such spread can be dangerous if the computers have important database which can get corrupted by the virus.Expensive Set Up: The initial set up cost of a computer network can be high depending on the number of computers to be connected. Costly devices like routers, switches, hubs, etc., can add up to the bills of a person trying to install a computer network. He will also have to buy NICs (Network Interface Cards) for each of the workstations, in case they are not inbuilt.Dependency on the Main File Server: In case the main File Server of a computer network breaks down, the system becomes useless. In case of big networks, the File Server should be a powerful computer, which often makes it expensive.


What does NAC stand for in networking?

The acronym NAC in the field of networking stands for Network Access Control. Network access control is used for security in computer systems such as antivirus software.


I believe that it is possible to connect a computer straight to the network cable which usually connects to the modem I have seen adapters that have a jack for this but I cannot find one online?

Yes, it is possible to connect a computer straight to a network cable which usually connects the modem. Look for the cable at Ebay.


When was the company Computer Network Solutions founded?

Computer Network Solutions was founded in 1997. The company provides site maintenance and user support to its customers for computer security issues.


What should be in a good computer network tutorial?

The components and guidelines in making a good computer network tutorial are the definitions of computer network tutorial, the basics of computer network tutorial and the other guidelines and specifics of computer network tutorials.

Related questions

What is the job of a network security consultant?

A network security consultant's job is to analyze the possible security risks displayed by the hiring company's computer network. They report on risks discovered, advise as to the severity of these risks, and determine an appropriate plan of action to minimize or eliminate threats to a network's smooth and safe operation.


Objective of security analysis?

The objective of a security analysis is to ensure your computer network is as secure as possible. A security analysis will help you find weaknesses in your system in order to develop your security protocols.


How can I find out my computer's security network info?

To find out specific information about your computers network security you can contact your network admin


How often do you run computer network security?

If a computer system is operating then it should be utilizing network security. So the answer would be all the time.


What is an example of computer network security?

i dono


How many categories do computer networks fall into?

2 , local area network and wide area network. -RDS


What has the author Gerald D Cole written?

Gerald D. Cole has written: 'Design alternatives for computer network security' -- subject(s): Computer networks, Computer security, Security measures 'Implementing OSI networks' -- subject(s): Computer network architectures, Computer network protocols, Computer networks 'Computer networking for systems programmers' -- subject(s): Computer networks, Systems programming (Computer science)


Which AF system security instruction contains security requirements for the web server?

Network & Computer security


How does one do network security?

Network security can be done in a variety of manners. In general, the methods to perform network security involve constantly updating hardware and software to combat potential computer threats.


Which are the project topics for 3rd year diploma in computer engineering?

computer network security


Will including a router improve computer security?

A router can improve network security if it includes the use of NAT (network address translation) and/or a firewall.


Can you crash a computer or network with a mac computer?

It may be possible, but NOT advisable