1.Why has there been a dramatic increase in the number of computer related security incidents in recent years?
The number of computers increase in recent years because in today's generation many people uses computers..
And many children spend a lot of time to use computers in their homes..And many people spend a lot of time to use computers in their office.
2.What are some characteristics of common computer criminals including their objectives?
Breaches of Physical Security
Breaches of Personnel Security
Breaches of Communications and Data Security
Breaches of Operations Security
Ways of Detecting Common Attack
Computer crimes range from the catastrophic to the merely annoying. A case of computer-driven espionage might wreak devastating losses to national security. A case of commercial computer theft might drive a company out of business. A cracker's prank might not actually cause damage at all--but might cause a video game company or another computer user some annoyance. Some computer crimes are perpetrated for kicks, and some for social or political causes; others are the serious business of professional criminals. There is perhaps no other form of crime that cuts so broadly across the types of criminals and the severity of their offenses.
3.What actions must be taken in response to a security incidents?
If there is an incident and it’s identified as an attack, there are several things that can be done. The worst of course is the “lets close our eyes and maybe it will go away.” This happens more often than not. So with that said there are two ways to approach incident response: Reactive and Proactive. Either is better then nothing, but if you can set your organization up to incorporate both you have a plan that will carry you through the worst situation
Sunday, December 12, 2010
Assignment 2
Long term readers of this blog will know that I am keen on personal security from the computer perspective and also that I am keen on windows users installing personal firewalls. My friends will tell you how often my eyes roll when they ask me to fix their unprotected machines. First I guess, a definition of personal is required here. By this I simply mean it is a software based firewall that sits on the same machine it is intending to protect. So I’m not talking standalone stuff like Smooth wall or Fire starter (both *nix based and free) and neither am I talking about the big boys of Corporate security such as Checkpoint, Crisco Pixels, Cyberguards, well the list does go on.
Friday, December 10, 2010
IT104 Doraengene Isidoro.
firewall
(f+r´wâl) (n.) A system designed to prevent unauthorized access to or from a private network. Firewalls can be implemented in both hardware and software, or a combination of both. Firewalls are frequently used to prevent unauthorized Internet users from accessing private networks connected to the Internet, especially intranets. All messages entering or leaving the intranet pass through the firewall, which examines each message and blocks those that do not meet the specified security criteria.
Subscribe to:
Posts (Atom)