G O D L I K E ! (don pipo†²)







"DOTA is the best medicine for all 4th year Computer Science Student"

Friday, September 17, 2010

CASE # 7

Computer Network Security


1. Computer System Security


The security of computer hardware and its components is also necessary for the overall protection of data. Even if the computer is not plugged into a network, a person can open its cabinet and gain access to the hard disk, which can later be used on some other computer for data theft. If a standalone system contains some important or classified information, it should be kept under constant surveillance. It is also necessary to remember that in case one dissembles his computer hardware, the risk of losing coverage of warranty becomes very high.

2. Computer Information and Data Security

It is important to avoid data and information loss in case of hard disk crashes. The only solution is to regularly keep backups of all the data on other media such as magnetic tapes, CD-ROM, etc. It is a good practice to store the media off-site and in case of a disk crash, restore the information from the backup media onto the new disk. In case a backup media is not affordable, one should try and store the files on at least two different media devices. These media devices should be systematically kept at a place which is safe and secured, as the information contained may be confidential. People usually backup database files, spreadsheet files and large documents. As the technical constraints are always there, it is better to take regular backups, in order to avoid any loss of information.

3. Phishing


Technology came with a flip side and left us trapped in the fraudulent 'phishing' net. Usually carried via SMS or e-mail, phishing technique obtains user names and passwords of bank accounts for siphoning money. Take tips to avoid such phishing activity, we sure don't want you land up in a 'catch'-22 situation.

4. Internet Crime

You go to your bank's website, put in the password for Internet banking and to your horror you realize that someone has hacked your account. Congratulations, you have become a victim of what is technically called as Internet crime. Check out what all is included under the umbrella term Internet Crimes by reading on.

5. Network Backup and Continuity Planning

Technologies can help your agency ensure the safety and integrity of your data, network, and business operations through detailed critical mission analysis and assisting you in planning for disasters such as terrorist events, hazmat incidents, weather emergencies, and other contingencies that arise that can disrupt your operations.

6.Web Based Notification and Messaging

Technologies can provide your agency with secure, remote hosted, web based messaging solutions allowing you to communicate critical messages to all or groups of your key personnel from any Internet connected PC.

7. Improper password use

Passwords are the simplest form of security. By leaving passwords blank or simple (i.e., password or admin), unauthorized users are practically invited to view sensitive data. Passwords are more secure when they contain both letters and numbers in a combination of upper-case and lower-case characters, and they should be changed periodically.

8. Plug and surf

Unfortunately, computers are not designed to be connected to the Internet straight out of the box. Before a phone line, Ethernet cable, or wireless card is anywhere near a new computer, install a line of defensive software. Ideally, this should include virus protection, multiple spyware scanners, and a program that runs in the background to prevent malicious software from ever being installed.

9. Ignoring security patches

Security holes may exist in your operating system. No software is perfect. Once an imperfection or hole is found, it's usually exploited within a very short period of time. Therefore, it is imperative to install security patches as soon as possible.

10.Scan TCP/UDP services

Turn off or remove unnecessary services. Unneeded services can be the entry point attackers use to gain control of your system.

=>For me this ten security are the were can we implement during the security of our computers and the data that we have in our computers.




No comments:

Post a Comment