Selasa, 6 Mac 2018

Types of Computer Security Risk and Security Measure

Types of Computer Security Risk 



Definition of computer security risk:

  • Any event or action that could cause a loss of or damage to computer hardware, software, data, information or processing capability.
  • Other intruders indicate some evidence of their presence either by leaving a message or by deliberately altering or damaging data.
  • Any illegal act involving a computer generally is referred to as a computer crime.
  • Cyber crime refers to online or Internet-based illegal acts.
  • Software used by cyber criminals sometimes is called crime ware.


Perpetrators of cyber crime and other intrusions fall into seven basic categories:

  • Hacker, refers to someone who accesses a computer or network illegally. Some hackers claim the intent of their security breaches is to improve security.
  • Cracker also is someone who accesses a computer or network illegally but has the intent of. destroying data, stealing information, or other malicious action
  • Script kiddie has the same intent as a cracker but does not have the technical skills and knowledge. Often use prewritten hacking and cracking programs to break into computers.
  • Corporate spies have excellent computer and networking skills. 
            -  hired to break into a specific computer and steal its proprietary data  and information.
            -  to help identify security risks in their own organization.
  • Unethical employees may break into their employers’ computers for a variety of reasons:
           -want to exploit a security weakness,
           -seek financial gains from selling confidential information
           -disgruntled employees may want revenge.
  • Cyber extortionist is someone who uses e-mail as a medium for extortion. 
           -They will send an organization a threatening e-mail message indicating they will expose   confidential information if they are not paid a sum of money.
  • Cyber terrorist is someone who uses the Internet or network to destroy or damage computers for political reasons. They might targets:
          - the nation’s air traffic control system,
          - electricity-generating companies,
          - a telecommunications infrastructure.




Type of Computer Security Risk

  1. Malicious Code
  2. Unauthorized Access & Use
  3. Hardware Theft
  4. Software Theft
  5. Information Theft
  6. System Failure     

1. Malicious Code


Malicious code is code causing damage to a computer or system. It is code not easily or solely controlled through the use of anti-virus tools.

Malicious code can either activate itself or be like a virus requiring user to perform an action, such as clicking on something or opening an email attachment.

Computer Virus

Definition : A computer virus is a potentially damaging computer program that affects or infects, a computer negatively by altering the way the computer works without the user’s knowledge or permission.

  • A computer virus attaches itself to a program or file enabling it to spread from one computer to another, leaving infections as it travels. It may damage files and system software, including the operating system.
  • Almost all viruses are attached to an executable file.
  • The virus may exist on your computer but it actually cannot infect your computer unless you run or open the malicious program.
  • A computer virus by sharing infecting files or sending emails with viruses as attachments in the email.
  • Even such a simple virus is dangerous because it will quickly use all available memory and bring the system to a halt.
  • Examples: Melissa, Tequila, Cascade, Invader  
Worm

  • Definition : A worm is a program that copies itself repeatedly.
  • For example in memory or on a network, using up resources and possibly shutting down the computer or network.
  • Worms spread from computer to computer, but unlike a virus, it has the capability to travel without any human action.
  • A worm takes advantage of file or information transport features on your system, which is what allows it to travel unaided.
  • The biggest danger with a worm is its capability to replicate itself on your system.
  • It will causing Web servers, network servers and individual computers to stop responding.
  • Examples: Jerusalem, Sobig,  Nimda, Morris Worm





Trojan Horse

  • A program that hides within or looks like a legitimate program. It does not replicate itself to other computers.
  • At first glance will appear to be useful software but will actually do damage once installed or run on your computer.
  • It can change your desktop, adding silly active desktop icons or they can cause serious damage by deleting files and destroying information on your system.
  • Examples: Netbus, Back Orifice, Subseven, Beast 


2. Unauthorized Access & Use

  • To help prevent unauthorized access and use, they should have a written acceptable use policy (AUP) that outlines the computer activities for which the computer and network may and may not be used.
  • An access control is a security measure that defines who can access a computer, when they can access it, and what actions they can take while accessing the computer.
  • Many systems implement access controls using a two-phase process called identification and authentication.
  • Identification verifies that an individual is a valid user.
  • Authentication verifies that the individual is the person he or she claims to be.
  • Three methods of identification and authentication include user names and passwords, possessed objects, and bio metric devices.
  • A user name or user ID (identification), is a unique combination of characters, such as letters of the alphabet or numbers, that identifies one specific user. 
  • A password is a private combination of characters associated with the user name that allows access to certain computer resources.

3. Hardware Theft

  • Hardware theft is the act of stealing computer equipment.
  • Hardware vandalism is the act of defacing or destroying computer equipment.
  • Companies, schools, and other organizations that house many computers, however, are at risk of hardware theft.
  • Safeguards against Hardware Theft and Vandalism:

            -  physical access controls, such as locked doors and windows
            -  install alarm systems in their buildings
            -  physical security devices such as cables that lock the equipment to a desk.




4. Software Theft
  • Software theft occurs when someone: 
          -   Steals software media
          -  Intentionally erases programs
          -   Illegally copies a program
          -  Illegally registers and/or activates a program.

  • Steals software media involves a perpetrator physically stealing the media that contain the software or the hardware that contains the media.
  • Intentionally erases programs can occur when a programmer is terminated from, or stops working for a company. 
  • Although the programs are company property, some dishonest programmers intentionally remove or disable the  programs they have written from company computers.

  • Illegally copies a program occurs when software is stolen from software manufacturers. 


  • This type of theft, called piracy, is by far the most common form of software theft. 


  • Illegally registers and/or activates a program involves users illegally obtaining registration numbers and/or activation codes. 


  • A program called a keygen, short for key generator, creates software registration numbers and sometimes activation codes. 


  • Some individuals create and post keygens so that users can install software without legally purchasing it.

5. Information Theft


  • Information theft occurs when someone steals personal or confidential information.
  • If stolen, the loss of information can cause as much damage as (if not more than) hardware or software theft.
  • An unethical company executive may steal or buy stolen information to learn about a competitor.
  • A corrupt individual may steal credit card numbers to make fraudulent purchases.
  • Safeguards against Information Theft
  1. Protecting information on computers located on an organization’s premises.
  2. To protect information on the internet and networks, organizations and individuals use a variety of encryption techniques.
  3. Encryption is a process of converting readable data into unreadable characters to prevent unauthorized access.

6. System Failure     

  • A system failure is the prolonged malfunction of a computer
  • Can cause loss of hardware, software, data, or information.
  • These include aging hardware; natural disasters such as fires, floods, or hurricanes; random events such as electrical power  problems; and even errors in computer programs.
  • Electrical power variations can cause loss of data and loss of equipment. 
  • If the computer equipment is networked, a single power disturbance can damage multiple systems. 
  • Electrical disturbances include noise (any unwanted signal), under voltages (electrical supply drops), and over voltages (incoming electrical power increases).
  • Safeguards against System failure:
  1. To protect against electrical power variations, use a surge protector. 
  2. A surge protector, also called a surge suppressor, uses special electrical components to smooth out minor noise, provide a stable current flow, and keep an over voltage from reaching the computer and other electronic equipment.




Security Measures

  1. Physical access control
  2. Human aspects: awareness
  3. Data Backup
  4. Cryptography
  5. Anti-virus
  6. Anti-Spyware
  7. Firewall

1. Physical access control

  • Lock your laptop whether you're at home, in a dorm, in an office, or sitting in a coffee shop, use a security device, such as a laptop security cable.
  • Lock doors and windows, usually adequate to protect the equipment.
  • Put the access code at the door to enter the computer room or your office.
  • Put the CCTV (closed-circuit television) in your office or computer room.
  • Make a policies who can access the computer room or your data center.

2. Human Aspects: awareness


          Phishing Emails
q  Never respond to requests for personal information via email. Businesses will never ask for personal information in an email.
q  Do not enter personal information in a pop-up screen.

          Dispose of Information Properly
q  Destroy/shred hard copy confidential documents that contain personal information such as social security numbers, credit card numbers, bank account numbers, health records.
q  Ensure you are using the right tools when destroying and disposing of personal information or media storage from your computer and mobile devices

          Protect data on mobile devices
q  Choose a strong password. A good password should always include upper and lowercase letters, numbers, and at least one special character. Never use the same password for multiple devices or accounts.
q  Store your portable devices securely. When not in use, store devices out of sight and when possible in a locked drawer or cabinet.

       Expose employees or staff to computer security.

       Make a routine check to update from new virus, worm or other malicious threat.


3. Data Backup

Definition

  • A data backup is the result of copying or archiving files and folders for the purpose of being able to restore them in case of data loss.
  • Data loss can be caused by many things ranging from computer viruses to hardware failures to file corruption to fire, flood, or theft (etc). If you are responsible for business data, a loss may involve critical financial, customer, and company data. If the data is on a personal computer, you could lose financial data and other key files, pictures, music, etc that would be hard to replace.

Benefit 

  • In the case of system failure, you can restore the files by copying the backed up files to their original location.

Importance

  • prevent against data lost

4. Cryptography

Definition

  • Technology of encoding information so it can only be read by authorized individuals.
  • To read the data, you must decry pt it into readable form. The unencrypted data is called plain text. The encrypted data is called cipher text. To encrypt, plain text converted into cipher text using an encryption key.

Importance

  • The process of proving one's identity.
  • Ensuring that no one can read the message except the intended receiver.
  • Assuring the receiver that the received message has not been altered in anyway from the original.
  • A mechanism to prove that the sender really sent this message


5. Anti-virus

Antivirus software is a type of utility used for scanning and removing viruses from your computer. While many types of antivirus (or "anti-virus") programs exist, their primary purpose is to protect computers from viruses and remove any viruses that are found.

Most antivirus programs include both automatic and manual scanning capabilities. The automatic scan may check files that are downloaded from the Internet, discs that are inserted into the computer, and files that are created by software installers. The automatic scan may also scan the entire hard drive on a regular basis. The manual scan option allows you to scan individual files or your entire system whenever you feel it is necessary.


Importance

  • Scan specific files or directories for any malware or known malicious patterns
  • Allow you to schedule scans to automatically run for you
  • Allow you to initiate a scan of a specific file or of your computer, or of a CD or flash drive at any time.
  • Remove any malicious code detected –sometimes you will be notified of an infection and asked if you want to clean the file, other programs will automatically do this behind the scenes.


6. Anti-Spyware


Anti-spyware is a type of software that is designed to detect and remove unwanted spyware programs. Spyware is a type of malware that is installed on a computer without the user's knowledge in order to collect information about them. This can pose a security risk to the user, but more frequently spyware degrades system performance by taking up processing power, installing additional software, or redirecting users' browser activity.

Importance

  • It  can monitors user activity on the Internet and transmits that information in the background to someone else.
  • Spyware can also gather information about email addresses and even passwords and credit card numbers.
  • Anti-spyware is a type of software that is designed to detect and remove unwanted spyware programs.
  • Anti-spyware software can be used to find and remove spyware that has already been installed on the user's computer.
  • Examples :

                     Spyware Blaster
                     Spy Sweeper


7. Firewall

  • A firewall is a system designed to prevent unauthorized access to or from a private network.
  • A firewall can be implement either through hardware or software form, or a combination of both.
  • Firewalls prevent unauthorized Internet users from accessing private networks connected to the Internet, especially intranets.
  • All messages entering or leaving the intranet (i.e., the local network to which you are connected) must pass through the firewall, which examines each message and blocks those that do not meet the specified rules/security criteria.
  • Rules will decide who can connect to the internet, what kind of connections can be made, which or what kind of files can be transmitted in out.


h




Isnin, 5 Mac 2018

Web Browser, Web address, Web page navigation, Web searching


Web Browser

A Web browser, or browser, is application software that allows users to access and view Web pages.





  • The purpose of a web browser is to bring information resources to the user.

  • With an Internet connection established, you start a Web browser. 
  • The browser retrieves and displays a starting Web page.
  • Web pages provide links to other related Web pages
  • Surfing the Web
  • Downloading is the process of receiving information from a server on the internet
  • Uploading process of transferring documents, graphics and other objects from a computer to a server on the Internet
  • Some Web pages are designed specifically for micro browsers (mobile devices)


Web Address


A Web page has a unique address called a URL (Uniform Resource Locator) or Web address

A Web browser retrieves a Web page using its web address.

If you know the Web address of a Web page, you can type it in the Address bar at the top of the browser window.

Web address consists of :
  • Protocol 
  • Domain name 
  • Path 
  • Web page name
The last component of web address not only webpage name, it can be file name.

Examples:
http://www.bankislam.biz/promote/index.htm
http://www.bankislam.biz/promote/image1.jpg

Examples:
http://www.kmph.matrik.edu.my/fizik/index.html

http://                                     : protocol

www.kmph.matrik.edu.my/      : domain name

fizik/    : path

index.html                                : web page name


Transfer Protocol

http://

  • Hypertext Transfer Protocol
  • A set of rules that defines how pages transfer on the Internet

https://

  • Hypertext Transfer Protocol Secure
  • A protocol to provide an encrypted communication and secure identification of a network web server
  • Often used for payment transactions on www.

ftp://

  • File Transfer Protocol
  • The File Transfer Protocol (FTP) is a standard network protocol used to transfer computer files from one host to another host over a TCP-based network, such as the Internet. 

Web Page Navigation

Surfing the web

  • The activity of using links to explore the web

A link 

  • Can be text or an image.

Text links

  • May be underlined and/or displayed in a color different from other text on the page
  • The color of the link will change once the link has been visited.







Tab Browsing

  • Most current web browsers support tabbed browsing
  • Tabbed browsing allows you to open and view multiple Web pages in a single Web browser windows



Web Searching


A primary reason that people use the Web is to search for specific information, including text, pictures, music and video.

The first step in successful searching is to identify the main idea or concept in the topic about which you are seeking information

Two types of search tools:

Search Engine (keyword search)

  • Finds information related to a specific topic
  • Helpful in locating information for which you do not know an exact Web address or are not seeking a particular Web site. 
  • A search engine is helpful in locating items such as:
  • A program that searches documents for specified keywords and returns a list of the documents where the keywords were found.
  • Requires the users to enter a word or phrase, called search text or search query.
  • Each word of the search text is known as keyword.
  • Result of the search is called hits.
  • Result  from the search engine can be in the form of:
-   web pages
-  articles
-  Images
-   Audio
-  Video and etc.


Subject Directory (directory search)

  • Classifies Web Pages in an organized set of categories
  • Subject directory – classifies Web pages in an organized set of categories such as sport or shopping and related subcategories. 
  • Examples of search tools:
1. Alta Vista,
2. Yahoo!,
3. Google,
 4. Excite

  • A subject directory provides categorized lists of links arranged by subject 
  • When click on the category link, the subject directory displays a list of subcategory links
  •  The disadvantage – users have difficulty deciding which categories to choose as the menus of links presented













Ahad, 4 Mac 2018

Rules of Netiquette and Areas of Computer Ethics

Rules of Netiquette

Netiquette is etiquette on the Internet. Since the Internet changes rapidly, its netiquette does too, but it's still usually based on the Golden Rule. The need for a sense of netiquette arises mostly when sending or distributing e-mail, posting on Usenet groups, or chatting. To some extent, the practice of netiquette depends on understanding how e-mail, the Usenet, chatting, or other aspects of the Internet actually work or are practiced. So a little preliminary observation can help. Poor netiquette because you're new is one thing, but such practices as spam and flaming are another matter.


  • Identify yourself:
    • Begin messages with a salutation and end them with your name.
    • Use a signature (a footer with your identifying information) at the end of a message

  • Include a subject line.
  •  Give a descriptive phrase in the subject line of the message header that tells the topic of the message (not just "Hi, there!").

  • Avoid sarcasm.
  •  People who don't know you may misinterpret its meaning.

  • Respect others' privacy. 
  • Do not quote or forward personal email without the original author's permission.

  • Acknowledge and return messages promptly.

  • Copy with caution.
  •  Don't copy everyone you know on each message.

  • No spam (a.k.a. junk mail). 
  • Don't contribute to worthless information on the Internet by sending or responding to mass postings of chain letters, rumors, etc.

  • Be concise. 
  • Keep messages concise—about one screen, as a rule of thumb.

  • Use appropriate language:
    • Avoid coarse, rough, or rude language.
    • Observe good grammar and spelling.



  • Use appropriate intensifiers to help convey meaning.
    • Avoid "flaming" (online "screaming") or sentences typed in all caps.
    • Use asterisks surrounding words to indicate italics used for emphasis (*at last*).
    • Use words in brackets, such as (grin), to show a state of mind.
    • Use common acronyms (e.g., LOL for "laugh out loud").


Areas of Computer Ethics

Ethics is a set of moral principles that govern the behavior of a group or individual. Therefore, computer ethics is set of moral principles that regulate the use of computers. Some common issues of computer ethics include intellectual property rights (such as copyrighted electronic content), privacy concerns, and how computers affect society.

Areas of Computer Ethics:

  1. Information Accuracy
  2. Green Computing
  3. Codes of Conduct
  4. Intellectual Property
  5. Information Privacy

1. Information Accuracy

  • knowledge that is correct, or something that is true
  • do not assume all the information on the Web is correct
  • users should evaluate the value of a Web page before relying on its content

2. Green Computing

  • involves reducing the electricity and environmental waste while using a computer.
  • average computer users can employ the following general tactics to make their computing usage more green:
                        * use hibernate or sleep mode 
                        * use flat-screen or LCD monitors
                        * turn off computers at the end of each day
                        * use devices that comply with ENERGY STAR program
                        * recycle paper and buy recycled paper



 3.Codes of Conduct

  • written guideline that helps determine whether a specific action is ethical/unethical or not allowed.








4.Information Privacy

  • refers to the rights of the individuals and companies to deny and restricts the collection and use the information about them.


5. Intellectual Property

Intellectual property (IP) refers to creations of the mind, such as inventions; literary and artistic works; designs; and symbols, names and images used in commerce.
IP is protected in law by, for example, patents, copyright and trademarks, which enable people to earn recognition or financial benefit from what they invent or create. By striking the right balance between the interests of innovators and the wider public interest, the IP system aims to foster an environment in which creativity and innovation can flourish.
  • Patent
  • Trademark
  • Copyright

Patent 

A patent is a set of exclusive rights granted by a sovereign state or intergovernmental organization to an inventor or assignee for a limited period of time in exchange for detailed public disclosure of an invention. An invention is a solution to a specific technological problem and is a product or a process. Patents are a form of intellectual property.

Trademark

A trademark, is a recognizable sign, design, or expression which identifies products or services of a particular source from those of others, although trademarks used to identify services are usually called service marks.The trademark owner can be an individual, business organization, or any legal entity. A trademark may be located on a package, a label, a voucher, or on the product itself. For the sake of corporate identity, trademarks are often displayed on company buildings.



Copyright

protection provide to the authors of "original works" and includes such things as literary, dramatic, musical, artistic, and certain other intellectual creations, both published and unpublished.

  •  Artistic works: paintings, drawing, photographs, maps, architecture and advertisement.
  • Literary works: novels, poems, newspaper.




Selasa, 27 Februari 2018

Type of website

Type of website

1.Portal
2.Business
3.Blog
4.Wiki
5.Online social network



1.Portal
a websites that offers variety of internet services from single,
convenient location



2.Business
Contains content that promotes or sells product or services.


3.Blog
an informal web site consisting of time -stamped articles, or post in a diary or journal format, usually
listed in reverse chronological order.

4.Wiki
a collaborative web site that allows users to create, add to, modify, or delete the website content via their web browser

5.Online social Network
encourages members in its online community to share their interest, ideas, stories, photos, music and video with other registered users

Selasa, 13 Februari 2018

Internet Services






Type of internet services:

  1. World Wide Web (WWW)
  2. e-mail
  3. Instant Messaging
  4. Voice over Protocol (VoIP)
  5. Message Board
  6. File transfer Protocol (FTP)


1.World Wide Web (WWW)
        -is a world wide collection of electronic documents


2.e-mail
        -is the transmission of message and files via a computer network

3.Instant Messaging
        -is a real time typed conversation with another connected user 
         where you also can exchange photos, video, and other content

4.Voice over Internet Protocol (VoIP)
        -is a conversation that takes place over the Internet using a telephone connected
         to a computer, mobile devices,or other devices

5. Message Board
        -is an online area in which users have written discussions about a particular subject

6.File Transfer Protocol (FTP)
        -is an internet standard that permits file uploading and downloading with 
         other computer on the Internet







Type of Internet ServicesAdvantagesDisadvantages
WWWeasy to find informationplace to promote pornography
e-mailfaster communicationinformation overload
Instant Messaging ability to keep in contact with familyboth users must online to make conversation
VoIPinexpensive and easy to useneed high speed internet
Message Boardeasy to take opinion from otherquestion may be overload
File transfer Protocolwe can send files in bulkslow internet may delays the transfering

Types of Computer Security Risk and Security Measure

Types of Computer Security Risk  Definition of computer security risk: Any event or action that could cause a loss of or damage to ...