Computer Security
Computer Security
-Data, software and hardware have to be protected from various hazard or dangers
-These hazards can be natural or manmade
- Computer security is concerned with taking care of hardware, software and data
Physical safeguards
i. Keep a note of all computer serial numbers, this can help identify stolen
equipment
ii. Use locks on doors and burglar bars on windows
iii. Use alarm systems
iv. Have few entrances to buildings
v. Use security badges
vi. All staff should be made aware of security and encouraged to question suspicious
behavior
vii. Keep backup copies and store them away from the computer
Software safeguards
Using antivirus
They prevent computer viruses from entering the computer system
Viruses damage computer files or copy and steal information from the computer
Firewall
This is software or hardware or combination of both that filters the information coming
through the internet connection into the computer or network. Firewalls prevent unauthorised
users from gaining access. Some firewalls bock cookies, pop ups and spam (junk mail)
Data encryption
Is used so that if data is accessed by unauthorised persons it cannot be understood. Encrypted
data is scrambled during storage and transmission so that it cannot be understood by someone
without the encryption key to unscramble it.
Access permissions
Allow access to data but only to the minimum number of people who need it. Others are
blocked from accessing the data.
4 Virus
-A computer virus is a program that disrupts the functioning of the computer
-Mischievous programs the purpose of which is to disrupt the sensible use of computers
- a program designed to enter your computer and temper with your files without
your knowledge
➢ Use of infected floppy diskettes on uninfected computers. Floppy disks or other media
that users can exchange.
✓ Downloading unknown files, when your computer is connected to the Internet.
✓ Opening an E-mail attachment. Email attachments.
-a hacker is an unauthorised user of a computer system who has broken into the computer
system.
This might be done by discovering a valid username and its associated password or by
bypassing them.
-hacking is an illegal activity
Computers can be protected from hackers by:
-Data encryption/Decryption
-Use of passwords
Summary
Data integrity
–This is the process of making sure that data entered into the computer is correct
- This is done through verification and validation checks
Computer crime/fraud
- These are criminal actions accomplished through the use of computer systems e.g improper
transfer of funds from one account to another
Pharming
Pharming is a scam in which malicious code is installed on a computer hard disk or a server.
This code has the ability to misdirect users to fraudulent websites, usually without their
knowledge or consent.
Whereas phishing requires an email to be sent out to every person who has been targeted,
pharming does not require emails to be sent out to everybody and can therefore target a much
larger group of people much more easily. Also, no conscious action needs to necessarily be
made by the user (such as opening an email), which means the user will probably have no
idea at all that have been targeted. Basically,
pharming works like this:
A hacker/pharmer will first infect the user’s computer with a virus, either by sending an email
or by installing software on their computer when they first visit their website. It could also be
installed as part of something the user chooses to install from a website (so the user doesn’t
necessarily have to open an email to become infected). Once infected, the virus would send
the user to a fake website that
looks almost identical to the one they really wanted to visit. Consequently, personal
information from the user’s computer can picked up by the pharmer/hacker.
Certain anti-spyware, anti-virus software or anti-pharming software can be used
to identify this code and correct the corruption.
Spam
Spam is electronic junk mail and is a type of advertising from a company sent out to a target
mailing list. It is usually harmless but it can clog up the networks, slowing them down, or fill
up a user’s mail box. It is therefore more of a nuisance than a security risk. Many ISPs are
good at filtering out spam. In fact, some are so efficient that it is often necessary to put
legitimate email addresses into a contacts list/address book to ensure that wanted emails are
not filtered out by mistake.
Spyware
Spyware is software that gathers user information through their network connections without
them being aware that this is happening. Once spyware is installed, it monitors all key presses
and transmits the information back to the person who sent out the spyware. This software also
has the ability to install other spyware software, read cookies and even change the default
home page or web browser. Anti-spyware
can be used to search out this software and correct the corruption.