- A computer security risk is any event or action that could cause a loss of or damage to computer hardware, software, data, information, or processing capability.
- A cybercrime is an online or Internet-based illegal act
- Hackers
- Crackers
- Script Kiddies
- Corporate Spies
- Unethical Employees
- Cyberextortionists
- Cyberterrorists
Internet and Network Attacks
- Information transmitted over networks has a higher degree of security risk than information kept on an organization's premises.
- An online security service is a Web site that evaluates your computer to check for Internet and e-mail vulnerabilities.
- Computer Virus - Affects a computer negatively by altering the way the computer works.
- Worm - Copies itself repeatedly, using up resources and possibly shutting down the computer or network.
- Trojan Horse - A malicious program that hides within or looks like a legitimate program.
- Rootkit - Program that hides in a computer and allows someone from a remote location to take full control.
- An infected computer has one or more of the following symptoms :
- Operating system runs much slower than usual
- Available memory is less than expected
- Files become corrupted
- Screen displays unusual message or image
- Music or unusual sound plays randomly
- Existing programs and files disappear
- Programs or files do not work properly
- Unknown programs or files mysteriously appear
- System properties change
- Operating system does not start up
- Operating system shuts down unexpectedly
- Users can take several precautions to protect their home and work computers and mobile devices from these malicious infections.
- A botnet is a group of compromised computers connected to a network - A compromised computer is known as a zombie.
- A denial of service attack (DoS attack) disrupts computer access to Internet services - Distributed DoS (DDoS)
- Spoofing is a technique intruders use to make their network or Internet transmission appear legitimate.
- A firewall is hardware and/or software that protects a network's resources from intrusion.
- Intrusion detection software
- Analyzes all network traffic
- Assesses system vulnerabilities
- Identifies any unauthorized intrusions
- Notifies network administrators of suspicious behavior patterns or system breaches
- Honeypot
- Vulnerable computer that is set up to entice an intruder to break into it.
Unauthorized Access and Use
- Unauthorized access is the use of a computer or network without permission.
- Unauthorized use is the use of a computer of its data for unapproved or possibly illegal activities.
- Organizations take several measures to help prevent unauthorized access and use
- Acceptable use policy
- Disable file and printer sharing
- Firewalls
- Intrusion detection software
- Access controls define who can access a computer, when they can access it, and what actions they can take
- Two-phase processes called identification and authentication
- User name
- Password
- Passphrase
- CAPTCHA
- A possessed object is any item that you must carry to gain access to a computer or computer facility - Often are used in combination with a personal identification number (PIN)
- A biometric device authenticates a person's identity by translating a personal characteristics into a digital code that is compared with a digital code in a computer.
- Digital forensics is the discovery, collection, and analysis of evidence found on computers and networks.
- Many areas use digital forensics
- Law enforcement
- Criminal prosecutors
- Military intelligence
- Insurance agencies
- Information security departments
Hardware Theft and Vandalism
- Hardware theft is the act of stealing computer equipment.
- Hardware vandalism is the act of defacing or destroying computer equipment.
- To help reduce the of chances of theft, companies and schools use a variety of security measures.
- Physical access controls
- Alarm systems
- Cables to lock equipment
- Real time location system
- Passwords, possessed objects, and biometrics
Software Theft
- Software theft occurs when someone :
- Steals software media
- Intentionally erases programs
- Illegally copies a program
- Illegally registers and/or activates a program
- A single-user license agreement typically contains the following conditions :
Permitted to :
- Install the software on one computer
- Make one copy of the software
- Remove the software from your computer before giving it away or selling it
Not permitted to :
- Install the software on a network
- Gibe copies to friends or colleagues while continuing to use the software
- Export the software
- Rent or lease the software
- Copying, loaning, borrowing, renting, or distributing software can be a violation of copyright law.
- Some software requires product activation to function fully.
- Information theft occurs when someone steals personal or confidential information.
- Encryption is a process of converting readable data into unreadable characters to prevent unauthorized access.
- A digital signatures is an encrypted code that a person, Web site, or organization attaches to an electronic message to verify the identity of the sender - Often used to ensure that an impostor is not participating in an Internet transaction.
- Web browsers and Web sites use encryption techniques.
- Popular security techniques include :
- Digital Certificates
- Transport Layer Security (TLS)
- Secure HTTP
- VPN
System Failure
- A system failure is the prolonged malfunction of a computer.
- A variety of factors can lead to system failure, including :
- Aging hardware
- Natural disasters
- Electrical power problems (Noise, undervoltages, and overvoltages)
- Errors in computer programs
- Two ways to protect from system failures caused by electrical power variations include surge protectors and uninterruptable power supplies (UPS)
Backing Up - The Ultimate Safeguard
- A backup is a duplicate of a file, program, or disk that can be used if the original is lost, damaged, or destroyed.
- Offsite backups are stores in a location separate from the computer site.
- Two categories of backups :
- Full backup
- Selective backup
- Three-generation backup policy
Wireless Security
- Wireless access poses additional security risks - About 80 percent of wireless networks have no security protection.
- War driving allows individuals to detect wireless networks while driving a vehicle through the area.
- In additional to using firewalls, some safeguards improve security of wireless networks :
- A wireless access point should not broadcast an SSID
- Change the default SSID
- Configure a WAP so that only certain devices can access it
- Use WPA or WPA2 security standards
Ethics and Society
- Computer ethics are the moral guidelines that govern the use of computers and information systems.
- Information accuracy is a concern - Not all information on the Web is correct.
- Intellectual property rights are the rights to which creators are entitled for their work. - A copyright protects any tangible form of expression.
- An IT code of conduct is a written guideline that helps determine whether a specific computer action is ethical or unethical.
- Green computing involves reducing the electricity and environmental waste while using a computer.
- Information privacy refers to the right of individuals and companies to deny restrict the collection and use of information about them.
- Huge databases store data online.
- It is important to safeguard your information.
- When you fill out a form, the merchant that receives the form usually enters it into a database.
- Many companies today allow people to specify whether they want their personal information distributed.
- A cookie is a small text file that a Web server stores on your computer.
- Web sites use cookies for a variety of reasons :
- Allow for personalization
- Store users' passwords
- Assist with online shopping
- Track how often users visit a site
- Target advertisement
- Spam is an unsolicited e-mail message or newsgroup posting.
- W-mail filtering block e-mail messages from designated sources.
- Anti-spam programs attempt to remove spam before it reaches your inbox.
- Phishing is a scam in which a perpetrator sends an official looking e-mail message that attempts to obtain your personal and financial information.
- Pharming is a scam where a perpetrator attempts to obtain your personal financial information via spoofing.
- Social engineering is defined as gaining unauthorized access or obtaining confidential information by taking advantage of trust and naivety.
- Employee monitoring involves the use of computers to observe, record, and review an employee's use of a computer.
- Content filtering is the process or restricts access to specified Web sites.
No comments:
Post a Comment