Security
Threats
- Computer crimes, including viruses.
- Electronic break-ins.
- Natural and other hazards.
Security Measures
- Encryption
- Restricting Access
- Anticipating Disasters
- Backing-up data.
Computer Criminals
- A computer crime is an illegal action in which the
perpetrator uses special knowledge of computer technology.
- There are four typed of computer criminals:
- Employees - can steal equipment,
software, electronic funds, proprietary information, computer time.
- Outside users - suppliers or
clients may have access to company's computer system.
- Hackers and Crackers
- hackers gain unauthorized access to a computer system for fun,
crackers do it for malicious purposes. May steal technical
information or introduce a destructive computer program into the system
(virus).
- Organized crime - keep track of
stolen goods or illegal debts. Counterfeiters and forgers can
produce sophisticated-looking documents such as checks and driver's
licenses.
Form of Threats
- Damage
- Disgruntled employees sometimes attempt to destroy
computers, programs, or files with various types of software programs
- Hackers and crackers create and distribute malicious
programs known as viruses.
- Viruses are programs that migrate through network
networks and operating systems.
- Viruses attach themselves to different programs
and databases.
- There are four basic types of viruses:
- Boot sector
- File
- Trojan horse
- Macro
- Creating and knowingly spreading a virus is a
crime and is punishable under the Computer Amendments Act of 1994.
- A variant on the virus is the Worm.
- Program fills a computer system with
self-replicating information, clogging the system so its operations
are slowed or stopped.
- The most infamous worm is known as the Internet
Worm.
- In 1988, the Internet Worm traveled across North
America, stopping thousands of computers.
- Viruses and worms find their way into computers
through copied floppy disks or programs downloaded from the Internet.
- "Disk-killer" viruses can destroy all
information on a computer system.
- Users can protect their computer with a detection
program called a virus checker which will alert them when certain
kinds of viruses enter the system.
- Dr. Solomon's Anti-Virus
- McAfee VirusScan
- Norton AntiVirus
- Computer Theft - Can be in the form of
- Hardware - equipment
- Software
- Unauthorized copying of software programs for
personal gain (software piracy)
- Borrowing software from a friend.
- Manipulation
- Unauthorized entry into a computer network is against
the law.
- The Computer Fraud and Abuse Act of 1986 makes it a
crime for unauthorized persons to view, copy, or damage data when using
a computer across state lines.
- It also prohibits unauthorized use of any
government computer or computer used by any federally insured
financial institution.
- Offenders can be sentenced up to 20 years in
prison and fined up to $100,000.
- Using a computer to sell fraudulent products is also
illegal.
- Hazards
- Natural hazards - Fires, floods, wind,
hurricanes, tornados, and earthquakes.
- Civil strife and terrorism - Acts of
sabotage can be threats to computer security.
- Technological failures - Lightning storms
or other electrical disturbance may affect the power supply to the
computer system and cause a voltage surge or spike.
- This excess of electricity may destroy chips or
other electronic components of a computer.
- One way to guard against this mishap would be to
purchase a surge protector.
- Hard disk failures, also known as a disk crash.
- Human errors - Human errors during
data-entry or programming, is a major concern in maintaining data
integrity or computer security.
Measures of Protection
- Security is concerned with protecting information,
hardware, and software from unauthorized use as well
as from damage, intrusion, sabotage, and natural disasters.
- Some principal measure to protect computers are:
- Encrypting messages
- There is the possibility of unauthorized access
when information is sent over a network.
- Encrypting is the process of coding a message.
- Businesses have been encrypting messages for
years.
- Federal agencies want a standard encryption
procedure to monitor criminal communications.
- Government is encouraging
businesses to use a special encryption hardware called Clipper chip.
- A widely used personal encryption program is Pretty
Good Privacy (PGP)
- Restricting access
- Computer systems must be protected from access by
unauthorized persons.
- Physically checking identification badges or
assigning passwords are ways of restriction.
- Some computers use dial-back after a user
keys in the password.
- Special hardware and software called firewalls can
be used to control access to internal computer networks.
- Anticipating disasters
- Companies need to secure against disasters.
- Physical security - protecting
hardware from human and natural disasters.
- Data security - protecting
software and data from unauthorized tampering.
- A disaster recovery plan should be in place to
describe ways to continue operating if a disaster occurs.
Special emergency facilities should be set up.
- Hot sites - fully equipped
centers
- Cold sites - empty shells in which
hardware must be installed
- Backing up data
- A company's data may be irreplaceable.
- The safest procedure for protecting data is to
make frequent backups and store them in remote locations.
Security for microcomputers
- Avoid extreme conditions
- Don't expose computer to direct sun, rain from an open
window, extreme temperatures, cigarette smoke, and spilled drinks or
food.
- Clean your equipment regularly.
- Use surge protector to protect against voltage surges.
- Guard the computer
- Put a cable lock on the computer
- Etch an identification number into the equipment
- Guard the programs and data
- Store disks properly, preferably in a licked
container.
- Make backup copies of all important files and
programs.
- Store copies of files in a different location from the
computer site.
< Previous Page
Next Page >