Computer Security

Computer threats and ways to secure them.

Malware   |   Social Engineering   |   Firewall   |   Crytography   |   Backups   |   Access


Malware
"malicious software" is any software program developed for the purpose of causing harm to a computer system, similar to a virus or trojan horse. Malware can be classified based on how it is executed, how it spreads, and/or what it does. The classification is not perfect, however, in the sense that the groups often overlap and the difference is not always obvious.



Social Engineering
In the field of computer security, social engineering is the practice of obtaining confidential information by manipulation of legitimate users. More commonly referred to as a "Con Artist", a social engineer will commonly use the telephone or Internet to trick people into revealing sensitive information or getting them to do something that is against typical policies. By this method, social engineers exploit the natural tendency of a person to trust his or her word, rather than exploiting computer security holes. It is generally agreed upon that “users are the weak link” in security and this principle is what makes social engineering possible.



Firewall
The primary method for keeping a computer secure from intruders. A firewall allows or blocks traffic into and out of a private network or the user's computer. Firewalls are widely used to give users secure access to the Internet as well as to separate a company's public Web server from its internal network. Firewalls are also used to keep internal network segments secure; for example, the accounting network might be vulnerable to snooping from within the enterprise.

In the home, a personal firewall typically comes with or is installed in the user's computer, like Windows Firewall. Advanced personal firewalls also detect outbound traffic to guard against spyware, which could be sending your surfing habits to a Web site. It alerts you when software makes an outbound request for the first time. In an organization, a firewall can be a stand-alone machine or software in a router or server. It can be as simple as a single router that filters out unwanted packets, or it may comprise a combination of routers and servers each performing some type of firewall processing.

Following are the different Firewall techniques. Several of them are often used in combination:



Cryptography
The conversion of data into a secret code for transmission over a public network. The original text, or "plaintext," is converted into a coded equivalent called "ciphertext" via an encryption algorithm. The ciphertext is decoded (decrypted) at the receiving end and turned back into plaintext.



Backup Technology
Backups may not prevent threats from occuring, but they are the best security measure to have to ensure that your data is recoverable from any incident. Events that threaten data can be anything from user error, malware corruption, and intruder theft, to natural desasters like fire.

Types of backups
Retention schedule
Backup Media

While there are thousands of possibilities, the majority of backup media falls into two catagories, Magnetic or Optical.


Access

Various names and technologies are used for this category such as: Identity Systems, Access Security, Authentication systems, Access Protection, etc. What we are talking about here are technologies that grant access to resources. The resources can be anything from workstations and servers to files and printers. What gets access can be users or even other programs such as backup systems or internet service.


TCP/IP Ports
TCP/IP is the language of the internet, which exchanges messages through things called "Ports". A hardware port is an electrically wired outlet on a piece of equipment into which a plug or cable connects, and networked software ports basically work the same way. Ports are identified doorways for communicating between computer systems. The security problem is that if unregistered ports are open on a system, unauthorized access can be gained to that system. One of the things firewalls try to do is lock down all the unregistered ports. Some ports are registered to use only a particular kind of communication, which make them much safer to use. The ports listed below are commonly known registered ports.


Back to Networks   |   Back to Akasha
1