http://www.rw-designer.com/cursor-download.php?id=101791

Sunday 25 March 2018

COMPUTER SECURITY MEASURE

4.2  Computer Security

    4.2.2 Security Measures



What is Security Measures?


  • A security measures is the protections that can reduce the risk of a problem occurring due to the computer security risk.
Measures Against Internet & Network Attacks

  1. Human Aspect : Awareness
Do not insert infected storage media to a computer.
Never open an e-mail attachment unless you are expecting the attachment and it is from a trusted source.
Update the antivirus software on a regular basics and configure it to examine all e-mail attachments for viruses.

     2. Firewall
A firewall is a hardware and/or software that protects a network’s resources from intrusion by users on another network such as the Internet.

Hardware firewall such as router has a built in firewall to stop intrusions before they attempt to affect your computer maliciously.

Software firewall is a utility program that detects and protects computer and its data from unauthorized intrusions.


    3. Intrusion: Detection  Software

Large organization may use intrusion detection software to identify possible security breaches.

Intrusion detection software automatically analyzes all network traffic, assesses system vulnerabilities, identifies any unauthorized intrusions, and notifies network administrators of suspicious network administrators of suspicious behavior patterns or system breaches. 



   4. Antivirus Program

An antivirus program protects a computer against viruses by identifying and removing any computer viruses found in memory, on storage media, or on incoming files.








  5. Spyware Remover
Programs that detects and deletes spyware and other similar programs on a user’s computer






Unauthorized access & use can be protected with:

Human Aspect : Awareness
Firewall
Intrusion: Detection  Software
Verifying & Authenticating Users

Measures
Human Awareness:
*Acceptable Use Policy (AUP)
*Disable file and printer sharing on the Internet

Firewall
*Hardware Firewall
* Software Firewall

Intrusion Detection Software
* To identify possible security breaches

Verifying & Authenticating Users
*User names & passwords
*Possessed objects
*Biometric Devices



Hardware theft and vandalism can be protected with:

Human Aspect : Awareness
Real Time Location System (RTLS)
Video Surveillance

Measures
Human Awareness:
*Doors and windows locked
*Cable locks
*Install alarm system

Real Time Location System (RTLS)
*RFID tags

Video Surveillance


Measures Against Software Theft
Software theft can be protected with:

Human Aspect : Awareness
Data Back-up
Copyright
Software Antipiracy Tools

Measures

Human Awareness:
*Keep software media in a secure location

Data Back-Up: 
*Copy data to another storage medium
Copyright

Antipiracy Tools:
*License Agreement
*Product Key


Measures Against Information Theft
Information theft can be protected with:

Human Aspect : Awareness
Encryption
Verifying & Authenticating Users

Measures
Human Awareness:
*Do not response to spoofed e-mail.
*Prevent identity theft

Encryption
*Encoding data & information to an unreadable form

Verifying & Authenticating Users
*User name & passwords
*Possessed objects
*Biometric Devices


Measures Against System Failure
System failure can be protected with:

A Surge Protector
Data Back-up
An Uninterruptible Power Supply (UPS)


Measures
Surge Protector
*To protect against electrical power variations

Data back-up
*Copy data to another storage medium

Uninterruptible Power Supply (UPS)
*To provide power during a temporary or permanent loss of power











COMPUTER SECURITY RISK


WHAT IS COMPUTER SECURITY RISK?
A computer security risk is any action that could cause a loss of or damage to computer hardware, software, data, information, or processing capability.

















MALWARE/ MALICIOUS CODE

Information transmitted over networks has a higher degree of security risk than information kept on an organization’s premises
Internet and network attacks that are exposed to security include :
     (a) Malware / Malicious Code
     
Malware is malicious software, which are programs that act without a user’s knowledge and deliberately /purposely  alter the computer’s operations.
Types of Malware :
*Computer viruses
*Worms
*Trojan Horses

Symptoms of Malware / Malicious Code
  • Operating system runs much slower than usual
  • Available memory is less than expected
  • Files become corrupted
  • Screen displays unusual message or image
  • Music or unusual sound plays randomly
  • Existing programs and files disappear
  • Programs or files do not work properly
  • Unknown programs or files mysteriously appear
  • System properties change
  • Operating system does not start up
  • Operating system shuts down unexpectedly
Types of Malware : 
Computer Viruses


A potentially damaging program that affects, or infects a computer or mobile device negatively by altering the way the computer or device works without the user's knowledge or permission.

Once the virus infects the computer, it can spread throughout and may damage files and system software, including the operating system.



Types of Malware : 
Worms

A program that copies itself repeatedly, for example in memory, using up resources and possibly shutting down the computer, device or network.









Types of Malware : 
Trojan Horses

A program that hides within or looks like a legitimate program.  Unlike a virus or worm, a trojan horse does not replicate itself to other computers or device.

It usually appears to be a game or utility program.

Cannot replicate themselves; must be downloaded and installed.



2. Unauthorized Access and Use 



Unauthorized Access is the use of a computer,  network, 
without permission. 

Unauthorized Use is the use of a computer,  
or its data for unapproved or possibly illegal activities.

Examples of Unauthorized Access 

  • A company’s clerk is using her employer’s personal computer without the employer’s knowledge.

  • An employee from the sales department has tried to gain access to the computer network system using the system administrator password.
Examples of Unauthorized Use
  • An employee using an organization's computer to send a personal e-mail messages.
  • An employee using the organization’s word processing software to complete herson’s science project.
  • Someone gaining access on a bank computer and performing an unauthorized transfer.


Hardware Theft and Vandalism

Hardware theft is the act of stealing computer equipment.

Hardware vandalism is the act of defacing or destroying computer equipment

Examples of  Hardware Theft


Hardware theft occurs when hardware is stolen from an individual or from a business, school, or other organization.









Examples of  Hardware Vandalism

Hardware vandalism occurs when an individual breaks into a business or school  computer lab and aimlessly smashing the computers.







4. Software Theft

Software theft occurs when someone:
(i)  Steals software media
(ii) Intentionally erases
     programs
(iii) Illegally copies a program
(iv) Illegally registers and/or activates a program



5. Information Theft
Information theft occurs when someone steals personal or confidential information.
Obtaining enough information about an individual to perform fraudulent financial transaction is often related to identity theft.

Identity theft is using someone else’s identity:
    (a) to purchase goods or services
    (b) to obtain new credit cards or bank loans
    (c) illegally pretend to be as that individual

Techniques  of Information Theft

  1. Phishing is the use of spoofed e-mail messages to gain credit card numbers and other personal data to be used for fraudulent purposes
  1. Pharming is use of spoofed domain names to obtain personal information to be used in fraudulent activities.


6. System Failure

System Failure is the prolonged malfunction of a computer system.

System Failure can cause loss of hardware, software, data, or information


System Failure - Causes
  • Aging Hardware 
  • Natural Disaster (fires, floods, hurricanes
  • Electrical Power Variation (Noise, Under voltage, Over voltage)
  • Errors in Computer Programs
























COMPUTER ETHICS AND SECURITY

COMPUTER ETHICS AND SECURITY


NETIQUETTE

What is netiquette? 

  • Netiquette is the code of acceptable behaviours that users should follow while on the Internet 
 Rules Of Netiquette  of all aspects of the Internet Services

  •  The World Wide Web
  • E- mail
  • Instant Messaging
  •  Chat Rooms
  • Newsgroup and message boards
  • Social Media
  • FTP 
If you want to know more about netiquette rules, click here


Area Of Computer Ethics
 Computer Ethics
  • Computer Ethics are the moral quidelines that oversee the use of computers and information system.

Information accuracy 
  • Information Accuracy is a measure of the reliability of information held within an IT system
→ Do not assume the information on the web is correct, should evaluate the value of webpages before relying on its content.

→ Some individuals and organization raise question about the ethics of using computer to alter output, primarily graphic photo as a retouched photo.

Green computing 

Involves reducing electricity and environmental while using computers.
                                                   

Codes Of Conduct
is a written guideline that helps determine whether a specific computer action is ethical or unethical.








Intellectual property (IP)
refers to unique and original works such as logos, brands, ideas, inventions, art, writing, process, company and product name


 Types of Intellectual property and its functions

Types of Intellectual Property (IP)                           Importance of  each IP


Trademark                                    To protect image, logo from being used by any other business entity.


Patent                                     To protect product ideas, manufacturing process          
                                          improvements and  technological developments 
from being used by other 
business entity.

Copyright                                       To protect any material form of expression (written words, music, dance, art) from being used by others.



INFORMATION PRIVACY


Information Privacy refers to the right of individuals and companies to deny or restrict the collection and use of information about them.


















OPEN THIS LINK TO OPEN NOTES OF SECURITY RISK !












COMPUTER SECURITY MEASURE

4.2  Computer Security     4.2.2 Security Measures What is Security Measures? A security measures is the protections that can ...