SECURITY MEASURES

SECURITY MEASURES


Definition of security measures:
The precautionary measures taken toward possible danger or damage.



DATA BACKUP




  • A data backup is the result of copying or archiving files and folders for the purpose of being able to restore them in case of data loss.
  • Data loss can be caused by many things ranging from computer viruses, hardware failures, file corruption, system failure or theft. 


Definition
Benefits
Importance
To copy files to a second medium (a disk or tape) as a precaution in case the first medium fails
In the case of system failure, you can restore the files by copying the backed up files to their original location.
Prevent against data loss


CRYPTOGRAPHY



Cryptography
Encryption
Decryption
Technology of encoding information so it can only be read by authirized individuals.
Process of converting readable data into unreadable characters to prevent unauthorized access.
Process to decode encrypted data.


To read the data :
  •  Must decrypt it into readable form.
  • The unencrypted data is called plain text.
  • The encrypted data is called cipher text.
  • To encrypt, plain text converted into cipher text using an encryption key.

Importance :
  • The process of proving one's identity. 
  • Ensuring that no one can read the message except the intended receiver.
  •  Assuring the receiver that the received message has not been altered in anyway from the original. 
  • A mechanism to prove that the sender really sent this message. 



ANTI-VIRUS



  • Anti-virus software : a program or set of programs that are designed to prevent, search for, detect and remove software viruses and other malicious software like worms, Trojan horses, adware and more.
  • If a virus infected a computer without an antivirus program, it may delete files, prevent access to files, send spam, spy on you, or perform other malicious actions.
  • Examples: Norton anti-virus, AVG anti-virus, Kaspersky anti-virus



ANTI SPYWARE



  • Spyware : a type of malware that is installed on a computer without the user's knowledge in order to collect information about them.
  •  Once installed, spyware can degrades system performance by taking up processing power, installing additional software, or redirecting users' browser activity.It also can monitors user activity on the Internet and transmits that information in the background to someone else.
  • Spyware can also gather information about email addresses and even passwords and credit card numbers.Anti-spyware is a type of software that is designed to detect and remove unwanted spyware programs. 
  • Anti-spyware software can be used to find and remove spyware that has already been installed on the user's computer. 
  • Examples :
          - Spyware Blaster
         -  Spy Sweeper



FIREWALL



  • A firewall : a system designed to prevent unauthorized access to or from a private network. 
  • A firewall can be implement either through hardware or software form, or a combination of both. 
  • Firewalls prevent unauthorized Internet users from accessing private networks connected to the Internet, especially intranets. 



PHYSICAL ACCESS CONTROL




Tips :
  • Lock your laptop whether you're at home, in a dorm, in an office, or sitting in a coffee shop, use a security device, such as a laptop security cable.
  • Lock doors and windows, usually adequate to protect the equipment.
  • Put the access code at the door to enter the computer room or your office.
  • Put the CCTV (closed-circuit television) in your office or computer room.
  • Make a policies who can access the computer room or your data center.


HUMAN ASPECTS : AWARENESS



Ethics - Be a good cyber citizen
  • Do not engage in inappropriate conduct, such as cyber bullying, cyber stalking or rude and offensive behavior.
  • Do not use someone else's password or other identifying information.


Lock it when you leave
  • It takes only a few seconds to secure your computer and help protect it from unauthorized access. Lock down your computer every time you leave your desk.
  • Set up a screen-saver that will lock your computer after a pre-set amount of time and require a password to log back in.

Phishing Emails
  • Never respond to requests for personal information via email. Businesses will never ask for personal information in an email.
  • Do not enter personal information in a pop-up screen.

Dispose of Information Properly
  • Destroy/shred hard copy confidential documents that contain personal information such as social security numbers, credit card numbers, bank account numbers, health records.
  • Ensure you are using the right tools when destroying and disposing of personal information or media storage from your computer and mobile devices

Protect data on mobile devices
  • Choose a strong password. A good password should always include upper and lowercase letters, numbers, and at least one special character. Never use the same password for multiple devices or accounts.
  • Store your portable devices securely. When not in use, store devices out of sight and when possible in a locked drawer or cabinet.




























Comments

Popular posts from this blog

NETWORK ARCHITECHTURE

INTERNET SERVICES

RULES OF NETIQUETTE