Skip to main content

Home/ ITGS Security/ Contents contributed and discussions participated by ranahijazi

Contents contributed and discussions participated by ranahijazi

ranahijazi

Security Notes - 0 views

#notes#security
started by ranahijazi on 16 May 14 no follow-up yet
  • ranahijazi
     
    1.2 Security

    Security refers to the protection of hardware, software, machines and networks from unauthorized access. Security measures include restricted access to machines and networks for certain employees or to prevent access by hackers. The degree of security of information systems largely determines society's confidence in the information contained in the systems.

    Read through chapter 10 (p. 358). Answer these questions:

    Define:

    Viruses: Virus software is a piece of code usually hidden in the operating system of a computer or in an application program. When someone opens a program that contain the virus, the virus copies itself and infect the program or all the computer. This happens so fast that usually no one realizes to get a virus.
    Worms: Worms use computer hosts to reproduce themselves. They are complete programs that are able to travel over computer networks to search a computer to infect and in which they reproduce themselves. Worms keep reproducing until the computer freezes from lack of free memory or disk space.
    Trojan Horses: Trojan horses are programs that do useful tasks, but they can also make destructive actions. They are able to delete files, modify data, pass secret data to unauthorized users and other type of damage.
    Spyware: Spyware is a technology that collects information from computer users without their approval. Then, the information are send to an outside user via the Internet.
    Malware: Malware are programs designed to destroy or disrupt operations. They're able to access system resources and other abusive behavior.


    How do the following tools work and how do they help with computer security?

    Password and Access Privileges: Password is the most common tool to limited access to PCs. Who types the right password can access to the computer and who doesn't know the password cannot access. However its utility depends on you because you' re going to choose the password. Some websites do not let you to choose real word or name as a password, like: "Marco", "Windows", "money"... or easy number like "12345". So mix letters (capitalized and not), numbers and symbols are better, like: "461220PoK*_*"
    Firewalls: Firewalls are used to keep internal networks secure while enabling communication with the rest of the Internet. Without Firewalls a home computer with an always-on DSL or cable modem connection can be easy prey for Internet snoopers.
    Cryptography: Cryptography is a method to hide information. When a user encrypts a message by applying a secret numerical code (encryption key) the message can be send or stored as an indecipherable garble of characters.


    What are steps you can take to prevent your own computer being hacked?

    First of all, I need a secure password, so my computer should have less chances to being hacked. Then, I can use a firewall to keep my network and computer secure while I surf to the Internet. Also an anti - virus can be helpful to detect and destroy viruses.

    Do you think that total computer security is possible? Why or why not?

    No, all the computers have at least one weak point. Hackers always find a way to break the security if they want. Hackers already invaded important organizations, like NASA, Microsoft and Sony. Especially for Sony, they break the security system very easily and then the servers were down for one month.
ranahijazi

What do I need to know about Security? - 0 views

#security#subtopics
started by ranahijazi on 16 May 14 no follow-up yet
  • ranahijazi
     
    Security advice and information
    Authentication (passwords and biometrics)
    Social engineering
    Hacking
    Phishing
    Spam
    Cyber-warfare and cyber-terrorism
    Malicious software
    Encryption
    Wireless security
    Physical security
ranahijazi

Social and Ethical Issues in Security - 0 views

#social#ethical#issues
started by ranahijazi on 16 May 14 no follow-up yet
  • ranahijazi
     
    From the ITGS Guide:
    Security refers to the protection of hardware, software, machines and networks from unauthorized access, alteration or destruction. Security measures include restricted access to machines and networks and encryptions of information. The degree of security of information systems determines society's confidence in the information contained in the systems.

    Security Issues
    Computer security is concerned with taking care of hardware, software and data. Data is only as secure as the system that it is held on and data security is concerned with keeping the data safe from the various hazards that could destroy it. There are a number of ways that system administrators can protect data.

    Physical Security:
    Protection from theft, fire, flood, dust and extremes of temperature. Important computers are placed in secure rooms, sometimes with devices such as biometric scanners, to limit physical access.
    Password Security: Access to a computer or a network of computers requires a password to be present, usually with a username specific to the person attempting to gain access to the network. Levels of access can be attached to the username allowing a junior member of staff to be restricted to a lower level of data than senior management through the principles of "groups".

    Software security:
    Viruses are numerous and often contaminate and destroy software and files. Anti-virus software can be used to scan a computer's memory and files downloaded from the Internet.
    Encryption - a "key" is used to encode the data in such a way that the data cannot be viewed again without the key.
    Backing up data: This means taking a copy of the data and keeping it in a different location in a secure place.

    In the end though, no computer system is totally foolproof and breaches do happen. This is usually due to the carelessness of users or the system administrator but can sometimes be caused by the use of utilities by hackers to exploit vulnerabilities or to crack passwords.
1 - 3 of 3
Showing 20 items per page