Skip to main content

Home/ ITGS Security/ Contents contributed and discussions participated by ranahijazi

Contents contributed and discussions participated by ranahijazi

ranahijazi

Article 4: Web Cameras - 0 views

  •  
    Question: What other applications could home security be used for? Home security can be used to surveil your own family. For example, if I have to go out to work, I can install some cameras in my house to check that the children are ok and that nothing is wrong. In case of fire, the cameras can send the e-mail to me and then I call the firemen. There are other dangerous that can be detected by home security, like explosions, black outs, and environmental problems.
ranahijazi

Article 3: Facebook Flaw - 0 views

  •  
    Question: Facebook and other social media sites have had security flaws in the past. They have subsequently been displayed as 'villain's by the mass media. Is this a fair accusation? Why or why not? No, because the fault is of the hackers in the first place. Then, all the security systems can be vulnerable; even if a security system is very strong, hackers are always able to find a weak point. But this not justify Facebook entirely because, like many people said, it has a low quality of protection and these problems were defined "embarrassing security flaw". At least Facebook has immediately solved the problems, instead of Sony that took one month and it still have some difficulties.
ranahijazi

Article 2: Hack Attacks - 0 views

  •  
    Question: It is evident that car control system can be hacked and controlled. As such, do you think such systems are safe? Why or why not? No, because these systems are too easy to hack. Experts said that is not a problem to hack everything in a car, so engine, breaks, heating and cooling, instruments panel, radio and locks are all vulnerable.
ranahijazi

Article 1: Sony - 0 views

  •  
    Question: Is there anyway that Sony could have foreseen this breech of security and thus prevented it? An hacker attack to Sony was predicted from many people. Some experts informed Sony about the low quality of protection and that the hackers were able to break all Sony activities (like play station network and Qriocity). Also Firewall was missing. It was possible to avoid that disaster. Sony should use the similar kind of protection as Microsoft. All Sony servers were offline for one month (the hack attack happened in 20th April 2011), but now it's everything online expect for Asia, where the government wants to test the new security systems of Sony. The new security systems of Sony are still quiet easy to break, for example yesterday (May 23rd) some crackers stole data and codes of the users of Play station Network.
ranahijazi

Security Notes - 0 views

#notes#security
started by ranahijazi on 16 May 14 no follow-up yet
  • ranahijazi
     
    1.2 Security

    Security refers to the protection of hardware, software, machines and networks from unauthorized access. Security measures include restricted access to machines and networks for certain employees or to prevent access by hackers. The degree of security of information systems largely determines society's confidence in the information contained in the systems.

    Read through chapter 10 (p. 358). Answer these questions:

    Define:

    Viruses: Virus software is a piece of code usually hidden in the operating system of a computer or in an application program. When someone opens a program that contain the virus, the virus copies itself and infect the program or all the computer. This happens so fast that usually no one realizes to get a virus.
    Worms: Worms use computer hosts to reproduce themselves. They are complete programs that are able to travel over computer networks to search a computer to infect and in which they reproduce themselves. Worms keep reproducing until the computer freezes from lack of free memory or disk space.
    Trojan Horses: Trojan horses are programs that do useful tasks, but they can also make destructive actions. They are able to delete files, modify data, pass secret data to unauthorized users and other type of damage.
    Spyware: Spyware is a technology that collects information from computer users without their approval. Then, the information are send to an outside user via the Internet.
    Malware: Malware are programs designed to destroy or disrupt operations. They're able to access system resources and other abusive behavior.


    How do the following tools work and how do they help with computer security?

    Password and Access Privileges: Password is the most common tool to limited access to PCs. Who types the right password can access to the computer and who doesn't know the password cannot access. However its utility depends on you because you' re going to choose the password. Some websites do not let you to choose real word or name as a password, like: "Marco", "Windows", "money"... or easy number like "12345". So mix letters (capitalized and not), numbers and symbols are better, like: "461220PoK*_*"
    Firewalls: Firewalls are used to keep internal networks secure while enabling communication with the rest of the Internet. Without Firewalls a home computer with an always-on DSL or cable modem connection can be easy prey for Internet snoopers.
    Cryptography: Cryptography is a method to hide information. When a user encrypts a message by applying a secret numerical code (encryption key) the message can be send or stored as an indecipherable garble of characters.


    What are steps you can take to prevent your own computer being hacked?

    First of all, I need a secure password, so my computer should have less chances to being hacked. Then, I can use a firewall to keep my network and computer secure while I surf to the Internet. Also an anti - virus can be helpful to detect and destroy viruses.

    Do you think that total computer security is possible? Why or why not?

    No, all the computers have at least one weak point. Hackers always find a way to break the security if they want. Hackers already invaded important organizations, like NASA, Microsoft and Sony. Especially for Sony, they break the security system very easily and then the servers were down for one month.
ranahijazi

What do I need to know about Security? - 0 views

#security#subtopics
started by ranahijazi on 16 May 14 no follow-up yet
  • ranahijazi
     
    Security advice and information
    Authentication (passwords and biometrics)
    Social engineering
    Hacking
    Phishing
    Spam
    Cyber-warfare and cyber-terrorism
    Malicious software
    Encryption
    Wireless security
    Physical security
ranahijazi

Social and Ethical Issues in Security - 0 views

#social#ethical#issues
started by ranahijazi on 16 May 14 no follow-up yet
  • ranahijazi
     
    From the ITGS Guide:
    Security refers to the protection of hardware, software, machines and networks from unauthorized access, alteration or destruction. Security measures include restricted access to machines and networks and encryptions of information. The degree of security of information systems determines society's confidence in the information contained in the systems.

    Security Issues
    Computer security is concerned with taking care of hardware, software and data. Data is only as secure as the system that it is held on and data security is concerned with keeping the data safe from the various hazards that could destroy it. There are a number of ways that system administrators can protect data.

    Physical Security:
    Protection from theft, fire, flood, dust and extremes of temperature. Important computers are placed in secure rooms, sometimes with devices such as biometric scanners, to limit physical access.
    Password Security: Access to a computer or a network of computers requires a password to be present, usually with a username specific to the person attempting to gain access to the network. Levels of access can be attached to the username allowing a junior member of staff to be restricted to a lower level of data than senior management through the principles of "groups".

    Software security:
    Viruses are numerous and often contaminate and destroy software and files. Anti-virus software can be used to scan a computer's memory and files downloaded from the Internet.
    Encryption - a "key" is used to encode the data in such a way that the data cannot be viewed again without the key.
    Backing up data: This means taking a copy of the data and keeping it in a different location in a secure place.

    In the end though, no computer system is totally foolproof and breaches do happen. This is usually due to the carelessness of users or the system administrator but can sometimes be caused by the use of utilities by hackers to exploit vulnerabilities or to crack passwords.
ranahijazi

Security Terms and Quiz - 0 views

  •  
    This website provides you with the essential Security terms and allows you to take a quiz, giving you feedback on your progress. If you have any questions regarding the terms, feel free to comment!
1 - 8 of 8
Showing 20 items per page