Saturday, September 18, 2010

Case 7

The following are:

1.)Do not run programs from unknown origins.
- Also, do not send these types of programs to friends and coworkers because they contain funny or amusing stories or jokes. They may contain a Trojans horse waiting to infect a computer.

2.)Consider making a boot disk on a floppy disk.
- In case your computer is damaged or compromised by a malicious program. Obviously, you need to take this step before you experience a hostile breach of your system.

3.)Secure Servers for Communicating
-Using publicly viewed and accessible applications like webmail leaves a business vulnerable to hack attacks. A secure server, like a hosted exchange, can provide a higher level of security. Many businesses prefer to use secure servers to access communications platforms to reduce the possibility of the public viewing secure information.

4.)Be prepared for individual security problems.
- For example, calling your Internet service provider in case you lose connection, preparing fire extinguishers and alarms near the computers, and using power surge protectors.

5.)SECURE COMPUTER SYSTEMS
-A number of systems have been built and designed which attack the general problem of
security in some form and to some extent. In some cases, privacy of data is the principal objective; in others, the prime objective is access control. For the security criteria which we shall establish, however, no existing system of which we are aware is adequate.

6.)Phishing
-Phishing attack is another growing threat for the online computers. Phishing is a type of online deception techniques that is designed to steal your confidential information, passwords, credit card information and important login and password through the fraudulent emails. The best solution to avoid this treat is to not open the email attachments from the unknown and unreliable sources. Secondly, never give your personal information to anyone even the emails claim to be delivered from big sources.

7.)Employee’s Sabotage
-An organization’s employees are most familiar with the computers inside an organization. There are a lot of examples where the annoyed employees of a company are involved in sabotaging the computer system. Employee’s sabotage include entering data incorrectly, destroying system hardware, deleting data, changing data, changing the passwords and entering the data incorrectly. The best way to avoid the situations like these is to delete the employees’ account after they leaves the company so that they can’t no more access company’s systems. Secondly, regularly monitor the activities of the employees and restrict their access to the sensitive resources in the overall IT infrastructure.

8.)Human Error
-Errors and the omissions are the great threats to the integrity of the data and the computer system. Data entry operators, programmers, system administrators often make errors that can compromise the system’s security. The effect of the various security threats caused by the human errors varies. Employee’s training and awareness training should be given to the employees to avoid such kinds of errors that can lead to the financial losses for a company.

9.)Physical Threats
-The physical threats to a computer involves the physically damage to the computer components with the fire, water and destructions. The best solution to avoid the physical threats to your important computer system and data is to set an off-site replication. Replicate your data regularly at some remote location.

10.)Make Backups of Important Files and Folders
-Whether you know it or not, you’ve divided everything you own into two broad categories: those items you can replace and those you can’t. For the items you can’t replace, you’ve probably stored them in a safe place, either somewhere in your living space or elsewhere, in a lockbox at a bank, for example. In either case, you’ve probably also bought insurance that provides the funds you’d need to buy replacements. Your insurance policy covers almost everything you own.

No comments:

Post a Comment