Computer Security

advertisement
COMPUTER SECURITY AND DATA PRIVACY
COMPUTER CRIME AND ABUSE
Computer crime is committing of illegal acts through use of a computer or against a
computer. Computers have given new opportunities to commit crimes and are the targets
of crimes
THREATS TO DATA STORED ON COMPUTER

Natural disaster – fire, flood, earthquake or faulty equipment leading to loss of data

Theft of data – unauthorised persons who break into your computer system and steal
ideas or other sensitive information about your business

Hackers – persons that attack your computer system simply because they can. They
may have some malicious intent or just the thrill of breaking into the system

‘Spyware’ – rogue websites that gather information about you when you surf the web
and pry into your computer system remotely trying to do damage. Track your
activities and may place advertisements etc that pop up on your computer. Can also
put programs on your computer that can damage it

Computer viruses – over 100 new viruses are released on the computer world each
week. The internet allows viruses to travel around networks very quickly and do a
lot of damage
The Internet has made PC security a much bigger problem.
Security measures need to be put in place to keep both your hardware and software safe
HARDWARE SECURITY
Concerned with the physical hardware. This is the easiest to secure as PC’s can be
anchored to desks, rooms locked and surveillance systems put in place
Physical access to computer systems can be limited to certain persons
Reasonable safeguards need to be put in place against fire and other preventable disasters
Surge protectors should be used in case of electrical storms etc to prevent hardware
damage
SOFTWARE SECURITY
It is much more difficult to secure data and software in today’s distributed, networked
environment.
Page -1-
Computer Security and Privacy
STEPS TO PROTECT DATA AND SOFTWARE
Backup Procedures
Use frequent backup procedures and keep backed up files in a safe place (often in a
different building). Regular backup means that it will not take long to update files again
from the latest backup. Often the documents to update the files are still available so the
system can be recovered quickly
Data Encryption
You can make your data unreadable to anybody except other trusted individuals.
Encryption lets you scramble messages and only the person with the proper ‘key’ can
unscramble them. This is particularly relevant to data that is transmitted over a network
Email and other messages on the internet can be encrypted using Public Key Encryption
which is a well recognised system of encrypting messages. The system is called Public Key
Infrastructure (PKI)
PKI uses software where each user has a ‘private’ key and a ‘public’ key. [These are codes
used to encrypt and decrypt messages]
The sender of a message encrypts the message with the recipients ‘public’ key and the
recipient decrypts it with his/her ‘private’ key. The parties to the communication can use
the email software of choice but each must use the same encryption software
Use of passwords
A common method of preventing unauthorised access to data and files is through
passwords. Passwords should not be easy to break. The problem is that people tend to use
words such as children’s or pet’s names
Passwords should be changed frequently
Passwords should not be written down
Passwords should be kept secret
Digital signatures and certificates
Used to ensure the ‘identity’ of sender and/or recipient. Public key technology can
guarantee that the sender of a message is who they say they are. A digital signature a
registered ‘identity’ like a passport and identifies the sender/recipient of a message
Protect against Viruses
Viruses are pest programs written to show off, to get revenge, to sabotage, for reasons of
intellectual curiosity or because of a desire for notoriety
Page -2-
Computer Security and Privacy
A worm is a computer program that transfers itself from computer to computer over a
network.
A virus is a set of illicit instructions that gets passed to other programs or documents that
it comes in contact with. It can change or delete files or produce strange screen effects
Viruses can be passed on by disks, over a network or through email attachments but cannot
be spread by just reading an email or data file. Viruses are usually executable files (.exe
files)
The best way to secure your data against this type of attack is to use a reputable anti-virus
software package and keep it up-to-date. Never open an email attachment if you do not
know the sender
Personal Data Security
When you visit a web site it often leaves behind information on your hard disk in
anticipation or your next visit. These files are called ‘cookies’ and are often harmless.
Some sites will not respond well with cookies switched off (an option you can set in your
web browser software) so disabling them may not be possible. You can delete cookies
from your hard disk, provided you know where they are stored. You can also invest in
software to ‘manage’ your cookies
When you visit a website you leave a trail in the Internet History folder and the Temporary
Internet folder that tells what sites you have visited
The best way to secure your privacy is not to fill in online forms, fill out surveys, give your
email address or credit card information on the internet, unless you are sure of who you
are giving it to
Spam is the name given to unsolicited (junk) email messages. Filter software can be used
to stop them before they reach your mailbox
Page -3-
Computer Security and Privacy
Download