Skip to main content

Home/ ITGS Security/ Security Notes
ranahijazi

Security Notes - 0 views

#notes#security

started by ranahijazi on 16 May 14
  • ranahijazi
     
    1.2 Security

    Security refers to the protection of hardware, software, machines and networks from unauthorized access. Security measures include restricted access to machines and networks for certain employees or to prevent access by hackers. The degree of security of information systems largely determines society's confidence in the information contained in the systems.

    Read through chapter 10 (p. 358). Answer these questions:

    Define:

    Viruses: Virus software is a piece of code usually hidden in the operating system of a computer or in an application program. When someone opens a program that contain the virus, the virus copies itself and infect the program or all the computer. This happens so fast that usually no one realizes to get a virus.
    Worms: Worms use computer hosts to reproduce themselves. They are complete programs that are able to travel over computer networks to search a computer to infect and in which they reproduce themselves. Worms keep reproducing until the computer freezes from lack of free memory or disk space.
    Trojan Horses: Trojan horses are programs that do useful tasks, but they can also make destructive actions. They are able to delete files, modify data, pass secret data to unauthorized users and other type of damage.
    Spyware: Spyware is a technology that collects information from computer users without their approval. Then, the information are send to an outside user via the Internet.
    Malware: Malware are programs designed to destroy or disrupt operations. They're able to access system resources and other abusive behavior.


    How do the following tools work and how do they help with computer security?

    Password and Access Privileges: Password is the most common tool to limited access to PCs. Who types the right password can access to the computer and who doesn't know the password cannot access. However its utility depends on you because you' re going to choose the password. Some websites do not let you to choose real word or name as a password, like: "Marco", "Windows", "money"... or easy number like "12345". So mix letters (capitalized and not), numbers and symbols are better, like: "461220PoK*_*"
    Firewalls: Firewalls are used to keep internal networks secure while enabling communication with the rest of the Internet. Without Firewalls a home computer with an always-on DSL or cable modem connection can be easy prey for Internet snoopers.
    Cryptography: Cryptography is a method to hide information. When a user encrypts a message by applying a secret numerical code (encryption key) the message can be send or stored as an indecipherable garble of characters.


    What are steps you can take to prevent your own computer being hacked?

    First of all, I need a secure password, so my computer should have less chances to being hacked. Then, I can use a firewall to keep my network and computer secure while I surf to the Internet. Also an anti - virus can be helpful to detect and destroy viruses.

    Do you think that total computer security is possible? Why or why not?

    No, all the computers have at least one weak point. Hackers always find a way to break the security if they want. Hackers already invaded important organizations, like NASA, Microsoft and Sony. Especially for Sony, they break the security system very easily and then the servers were down for one month.

To Top

Start a New Topic » « Back to the ITGS Security group