Thursday, June 2, 2011

Computer Security

BACKUP
Storing backup copies of software and data and having backup computer and communication capabilities are important basic safeguards because the data can then be restored if it was altered or destroyed by a computer crime or accident. Computer data should be backed up frequently and should be stored nearby in secure locations in case of damage at the primary site. Transporting sensitive data to storage locations should also be done securely.
ENCRYPTION
Another technique to protect confidential information is encryption. Computer users can scramble information to prevent unauthorized users from accessing it. Authorized users can unscramble the information when needed by using a secret code called a key. Without the key the scrambled information would be impossible or very difficult to unscramble. A more complex form of encryption uses two keys, called the public key and the private key, and a system of double encryption. Each participant possesses a secret, private key and a public key that is known to potential recipients. Both keys are used to encrypt, and matching keys are used to decrypt the message. However, the advantage over the single-key method lies with the private keys, which are never shared and so cannot be intercepted. The public key verifies that the sender is the one who transmitted it. The keys are modified periodically, further hampering unauthorized unscrambling and making the encrypted information more difficult to decipher.
APPROVED USERS
Another technique to help prevent abuse and misuse of computer data is to limit the use of computers and data files to approved persons. Security software can verify the identity of computer users and limit their privileges to use, view, and alter files. The software also securely records their actions to establish accountability. Military organizations give access rights to classified, confidential, secret, or top-secret information according to the corresponding security clearance level of the user. Other types of organizations also classify information and specify different degrees of protection.
FIREWALLS
Computers connected to communication networks, such as the Internet, are particularly vulnerable to electronic attack because so many people have access to them. These computers can be protected by using firewall computers or software placed between the networked computers and the network. The firewall examines, filters, and reports on all information passing through the network to ensure its appropriateness. These functions help prevent saturation of input capabilities that otherwise might deny usage to legitimate users, and they ensure that information received from an outside source is expected and does not contain computer viruses.
Security software called intrusion detection systems may be used in computers to detect unusual and suspicious activity and, in some cases, stop a variety of harmful actions by authorized or unauthorized persons. Abuse and misuse of sensitive system and application programs and data such as password, inventory, financial, engineering, and personnel files can be detected by these systems.
APPLICATION SAFEGUARDS
The most serious threats to the integrity and authenticity of computer information come from those who have been entrusted with usage privileges and yet commit computer fraud. For example, authorized persons may secretly transfer money in financial networks, alter credit histories, sabotage information, or commit bill payment or payroll fraud. Modifying, removing, or misrepresenting existing data threatens the integrity and authenticity of computer information. For example, omitting sections of a bad credit history so that only the good credit history remains violates the integrity of the document. Entering false data to complete a fraudulent transfer or withdrawal of money violates the authenticity of banking information. These crimes can be prevented by using a variety of techniques. One such technique is checksumming. Checksumming sums the numerically coded word contents of a file before and after it is used. If the sums are different, then the file has been altered. Other techniques include authenticating the sources of messages, confirming transactions with those who initiate them, segregating and limiting job assignments to make it necessary for more than one person to be involved in committing a crime, and limiting the amount of money that can be transferred through a computer.
DISASTER RECOVERY PLANS
Organizations and businesses that rely on computers need to institute disaster recovery plans that are periodically tested and upgraded. This is because computers and storage components such as diskettes or hard disks are easy to damage. A computer’s memory can be erased or flooding, fire, or other forms of destruction can damage the computer’s hardware. Computers, computer data, and components should be installed in safe and locked facilities.

No comments:

Post a Comment

Labels

A VIRUS ATTACKS (1) acting (1) Actor (1) Advantages of computer games and popular computer games (1) Advertising (1) aerobic exercise (1) African elephant (1) AIDS (1) Air Force (1) Albert Einstein (3) Alligators and Crocodiles (1) Ankara • cat • Persian cat • turkey • Turkish Angora • United States (1) aquarium (1) architecture (2) Art director (1) Asia (1) Asian elephant (1) AT THE ART MUSEUM (1) backpack (1) Bacteria (1) balance beam (1) ballet (1) Bangladesh (1) BEFORE MODERN MEDICAL CARE (1) Bhutan (1) big bang (1) big bang theory (1) biography (1) biographyofcharlichaplin (1) Blackbeard (1) bruce lee (1) camping (1) Camps (1) canada (1) canadian universities (1) Carbohydrate (1) Charlie Chaplin (1) Chocolate (1) CHOOSING A PET (1) Circus (1) climate change (1) cocoa bean (1) Cocoa butter (1) coin (1) COLD-BLOODED AND WARM-BLOODED ANIMALS (1) Comic strip comics Pulitzer prize (1) computersecurity (1) Consolidate School Loans (1) copywriting (1) Creative director (1) Culinary Schools (1) Dance (2) dead (1) dead sea (1) Death (1) Defense Attorney (1) dinosaurs (1) DNA (1) Donate your car (1) dui attorney (1) earth (2) eclipse (1) Edwin Hubble (1) Elephant (1) encryption (1) Endangered Species (1) Endangered Species Act (1) England (1) everythingaboutelephant (1) FIGHTING A VIRUS (1) fish (1) Fraction (mathematics) (1) Frank Gehry (1) FrankLloydWright (1) freshwater (1) functionofadvertising (1) functionofcompany (1) general relativity (1) General Theory of Relativity (1) Genes and Heredity (1) georgia car accident lawyers (1) Global warming (1) Gravitation (2) Great Dictator (1) greenhouse gas (1) Gregor Mendel (1) grief (1) growingofinternet (1) Gymnastics (1) health care (1) home owner loan (1) HOW ANIMALS BREATHE (1) HOW DO VIRUSES SPREAD? (1) how we act (1) howtogetinternet (1) HTML (1) HUNTING AND EATING (1) IBM (1) ice cream (1) importance (1) India (2) industrial revolution (1) insurance (1) Internet (1) internet service provider (1) internetweb (1) Invasion of the Body Snatchers Jules Verne Science Fiction (1) Jackie Chan (1) Jujutsu (1) kindsofmoney (1) life (1) lifeofcharliechaplin (1) List of UFO sightings (1) lunar eclipse (1) Maldives (1) Marcel Duchamp (1) Markup language (1) Martial Arts (1) McGill University (1) Medicine (1) Mental Health stress (1) Microorganism (1) microscopic (1) microscopiclife (1) Middle East (1) money (1) moneyofeverycountry (1) Moon (2) Moscow State Circus (1) Muscle (1) nepal (1) NEW IDEAS ABOUT ART (1) Nutrition (1) Olympic Games (1) Ornithischia (1) painting (1) Pakistan (1) Personal computer game (1) pet (1) PETS NEED LOVE AND CARE (1) philip astley (1) physical exercise (1) Physics (1) pioneerlife.pioneer (1) piracy (1) pirate of (1) Pirates (1) pirates bay (1) PLANT EATERS AND MEAT EATERS (1) PRACTICAL PETS (1) Precious metal (1) PREVENTING INFECTION (1) prime number (1) PROBLEMS WITH PETS (1) Project Blue Book (1) Public-key cryptography (1) Quick Facts (1) Raid Data Recovery (1) Ralph Lauren (1) reasons (1) relativity (1) Robin Hood (1) Rocky Mountain (1) science (2) Sculpture (1) sea (1) Sherwood Forest (1) Simon Fraser University (1) skin (1) Soft serve (1) solar eclipse (1) Sound Blaster (1) species (1) Sri Lanka (1) Srilanka (1) Standard Generalized Markup Language (1) strength training (1) Stress (Psychology) (1) sun (1) THE MOST POPULAR PETS (1) The past and future of GLOBAL WARMIng (1) Theatre (1) theory (1) thoeryofeverything (1) Tyrannosaurus (1) UFO (1) Unidentified flying object Read more: http://socyberty.com/paranormal/unidentified-flying-object (1) Uniform Resource Locator (1) united states (1) university (1) university in canada (1) University of British Columbia (1) USING VIRUSES (1) vertebrate (1) virus (1) Vitamin (1) web (1) WHAT ARE FINGERNAILS MADE OF? (1) WHAT CAUSES PIMPLES? (1) WHAT DO DOCTORS DO? (1) WHAT DO MEDICAL (1) WHAT GIVES SKIN (1) what is art? (1) WHAT KINDS OF ANIMALS ARE THERE? (1) whatisaquarium (1) whatisdance (1) whatisinternet (1) whatismoney (1) whatissciencefiction (1) WHERE ALLIGATORS LIVE (1) WHERE CROCODILES LIVE (1) whoinventmoney (1) WHY DO WE DANCE? (1) WHY DO WE MAKE ART? (1) WHY DO YOU FEEL SICK? (1) World Wide Web (1) Zoology (1)