Hackers, Crackers, Script Kiddies, Corporate Spies, Unethical Employees, Cyberextortionists, Cyberterrorists.
The I love you Virus in Action
Internet & Network Attacks
Information transmitted over networks has a higher degree of security risk than information kept on an organization's premises.
An online security service is a Web site that evaluates your compuer to check for Internet and e-mail vulnerabilities.
Popular Online Security Services include; Audit My PC, McAfee FreeScan, Symantec Security Check, Trend Micro House Call, Panda Freescan, Bitdefender.
Internet and Network attacks can come in the form of Computer Viruses, Worms, Trojans and Rootkits.
An infected computer has one or more of the following symptoms: Operating system runs slower than usual, files become corrupt, screen displays an unusual message, system properties change.
Tips for preventing Viruses:
- Install a personal firewall program.
- Never open an e-mail attachment unless you are expecting it and it is from a trusted source.
- Install a antivirus program on all of your computers. Update the software and the virus signature files regularly.
- Stay informed about new virus alerts and virus hoaxes.
- Be Proactive about stopping security responses - Threatlists up to date ones to protect against.
- Analyzes all network traffic
- Assesses system vulnerabilities
- Identifies any unauthorized intrusions
- Notifies network administrators of suspicious behavior patterns or system breaches
- Vulnerable computer that is set up to entice an intruder to break into it
Did you Know?
Unauthorised Access and Use
Organizations take several measures to prevent unauthorized access and use such as; acceptable use policy, disable file and printer sharing, firewalls and intrusion detection software.
Digital forensics is the discovery, collection, and analysis of evidence found on computers and networks. Many areas use digital forensics for; Law enforcement, Criminal prosecuters, military intelligence.
Hardware Theft and Vandalism
Hardware theft is the act of stealing computer equipment. Hardware vandilism is the act of defacing or destroying computer equipment.
Software Theft
Software theft occurs when someone steals software, intentionally erases programs, illegally copying or registers and or activates a program obtained illegally.
Organizations take several measures to prevent unauthorized access and use such as; acceptable use policy, disable file and printer sharing, firewalls and intrusion detection software.
Digital forensics is the discovery, collection, and analysis of evidence found on computers and networks. Many areas use digital forensics for; Law enforcement, Criminal prosecuters, military intelligence.
Hardware Theft and Vandalism
Hardware theft is the act of stealing computer equipment. Hardware vandilism is the act of defacing or destroying computer equipment.
Software Theft
Software theft occurs when someone steals software, intentionally erases programs, illegally copying or registers and or activates a program obtained illegally.
System Failure
A system failure is the prolonged malfunction of a computer. A variety of factors can lead to a system failure, including: aging hardware, natural disasters, electrical power problems, noise, undervoltages, overvoltages and errors in computer programs.
Backing Up - The Ultimate Safeguard
A backup is a duplicate of a file, program, or disk that can be used if the original is lost, damaged, or destroyed. To back up a file means to make a copy of it.
Offsite backups are stored in a location separate from the computer site.
For backing up their are two categories of backups such as full backups and selective backups. Three-Generation backup policy. The three levels is where three backups are kept - Grandparent, Parent, Child.
No comments:
Post a Comment