THE GIVEAWAY BLOG!! Forum
Would you like to react to this message? Create an account in a few clicks or log in to continue.
Log in

I forgot my password

Search
 
 

Display results as :
 


Rechercher Advanced Search

Poll
Keywords

Latest topics
» How Can I Convert EML to PST Outlook Format
Why Do We Need Computer Security EmptySat Mar 02, 2019 5:50 pm by toddgross0007

» EML to PST
Why Do We Need Computer Security EmptySat Mar 02, 2019 5:49 pm by toddgross0007

» Restore IncrediMail Email
Why Do We Need Computer Security EmptyThu Feb 28, 2019 5:36 pm by toddgross0007

» How to Recover IncrediMail Folders That Disappeared
Why Do We Need Computer Security EmptyThu Feb 28, 2019 5:34 pm by toddgross0007

» EDB to PST Converter software
Why Do We Need Computer Security EmptyTue Feb 28, 2017 6:39 pm by toddgross0007

» Convert OST to PST utility
Why Do We Need Computer Security EmptyTue Feb 28, 2017 6:29 pm by toddgross0007

» MBOX to PST Converter
Why Do We Need Computer Security EmptyWed Jan 25, 2017 3:11 pm by emersonhurst

» SQL Database Recovery
Why Do We Need Computer Security EmptyWed Jan 25, 2017 3:09 pm by emersonhurst

»  MBOX to PST Convert software
Why Do We Need Computer Security EmptyFri Jan 06, 2017 3:48 pm by geetjit13


Why Do We Need Computer Security

Go down

Why Do We Need Computer Security Empty Why Do We Need Computer Security

Post  THE GIVEAWAY BLOG!! Thu Aug 02, 2012 1:06 pm


Computers are a part of or in millions of homes; they are an intricate part of just about every if not all successful businesses, the government, and the military. Computers have become common place in today's society and the lives of the people who live in it. The term computer security is used frequently, but the content of a computer is vulnerable to few risks unless the computer is connected to other computers on a network. As the use of computer networks, especially the Internet, has become pervasive, the concept of computer security has expanded to denote issues pertaining to the networked use of computers and their resources.

Computer Security:

Computer and internet being pervasive today, security measurement must be heightened to the level where hackers and virus are playing. One way virus or worms can spread is through e-mail attachments. So: do not open attachments until you are absolutely sure what they are and who they are from. Many privileges in life, such as driving, drinking or owning a firearm, require responsibility. Using a computer and the Internet is no different. Speaking about virus, despite a survey founding that 99% large businesses use anti-virus software and almost 60% of firms update this protection software automatically to keep current with new threats, half of firms and 68% of large companies were caught out by viruses during 2003. Therefore, on top of installing anti-virus software, firms had to be sure that the systems were kept updated to block loopholes that worms exploit. (Potter, R. E., Rainer, R. K. Jr. & Turban E., 2003)

Back in the 1980s, the way to avoid computer viruses was to ask, "Whose floppy disk am I loading onto my computer?" Two decades later, we should be asking instead, "Who's desktop, laptop, or PDA is connecting to mine? Should I trust that individual to have installed proper patches and antivirus protection?" In most cases, the answer is no. The preventive measure is to scan a computer before connecting into a system.

A survey on information security came up to say that 79% of people unwittingly gave away information that could be used to steal their identity when questioned. Further study found that, on average, a person uses 20 online sites that require them to use password and therefore most of them use familiar names that be easily remembered such like pet's name, own name, etc. Between ignorance of the need to protect online identity and being fed up with the password system, people are compromising their security by laxing their guards against identity thiefs.

Supercomputing giants such as university and research places has become routine target attack for hackers to exploit. Hacker uses the pinging application to trace reachable the IP's. If a Hacker finds a computer they can try a port scan to detect and attack services on that computer. Hackers also used the software's that are used to scan the people on the network so that they can theft the passwords. This is simply because of the openness that academic institutions provide and their huge bandwidth makes them more attractive than regular computer centers. A particular example was Purdue University System that was infiltrated recently; it has discovered that no damage is found but that encrypted password was exposed. It soon orders its students to immediately change their passwords. The need for increased security has also been enforced by law such as The 2002 Sarbanes-Oxley Act that holds executives liable for computer security by requiring them to pledge that companies' "internal control" are adequate, and auditors are starting to include cyber security in that category. (Fisch, E. A. Ph.D. & White, 2000)

Another type of threat comes from the exploit that is within the browser itself. Loopholes in browser could be a way for hacker to covertly obtain personal information about you through using a malicious website. To trust a website now businesses have to be absolutely certain and an instrumental tool is Verisign which is design to manage PKI (public key infrastructure.

Finally, the net itself is has yet to be scrutinized. Discovered vulnerability in TCP sends expert scrambling to formulate solutions on big routers produced by Sisco, etc. Another counter-attack measure is cyber war game to train computer scientist to be poised for a cyber war scenario. In summary, the internet is still at a very early stage of development and these points taken are where we can start to build the case for internet security.[Only admins are allowed to see this image]
THE GIVEAWAY BLOG!!
THE GIVEAWAY BLOG!!
Admin

Posts : 161
Join date : 2012-06-11
Age : 35
Location : Malaysia

http://thousandgiveaway.blogspot.com

Back to top Go down

Back to top

- Similar topics

 
Permissions in this forum:
You cannot reply to topics in this forum