Always be aware of people who have physical access to your computer. The casual use of your laptop by a person you trust going to a dangerous site or opening a suspicious email, can blow your system out of the water.
TASK 4
With the growth of the information and technology, the network security becomes even more important to secure the database from the unauthorized person. Nowadays more cybercrime using the data for information leaking, Identity Theft, and Cyberstalking. Fortunately, there are available or a way to measure the security control for the airport such as implement the firewall, antivirus, service auditing and Intrusion-detection systems.
Firewall
Install an antivirus program that includes a firewall, and keep it always running and updated
The Computer Emergency Response Team (CERT) lists nine tasks for home computer security. The list includes; use of antivirus, maintain updates, use caution with email attachments, use firewall software, maintain regular backups, use strong passwords, use care installing downloaded programs, use a hardware firewall, and use encryption and access controls (CERT. 2002). These guidelines deal more with the computer than they person using it. This is in contrast to the guidelines in chapter seven of the book Computer Security Fundamentals, which deal predominately with reducing the risk of corporate espionage, but there is a degree of overlap between the two.
When we connect to the Internet or let other people to use your PC, we must make sure that our sensitive information remains safe and secure from other people or virus. Specially, if you share files with others and connect to public network to surf Web pages you should take steps to protect your computer from harm. Because hackers can attack on your computer, by breaking into your computer through the Internet and stealing your personal information, or by downloading malicious software onto your computer.
Conduct ongoing information security risk assessments, in particular access to personal devices, Wi-Fi access and physical security.
Now that you understand and see the need to protect your computer, the next step is to find firewall software that satisfies your needs. This means only you can decide what is right for you. The Home PC Firewall Guide at http://www.firewallguide.com/ offers third party reviews for small office and home users. For those users seeking a more technical approach to understanding, analyzing, designing, and/or testing firewall security the SANS Institute Information Security Reading Room at http://www.sans.org/infosecFAQ/firewall/norton.htm provides excellent articles written by GIAC-certified professionals. As a home user, I found Mark Greco?s article on Protecting Yourself with Norton Personal Firewall very informative. This article goes a step farther and steps you through the installation and configuration of Norton Personal Firewall.
We live in globally connected world which faces globally distributed cyber threat. These threats are not restricted by geographical boundaries and target at all technologies, Hardware, Software, service providers and the user Consumer, the private and public sector. The threats are all time high in terms of experience and volume and continue trend upward. Now days we can see that cyber security is popularly discussed topic among all I.T and Non- I.T firms due to increasing percentage of cyber-crime so every government and private organization are concerned about the security of their data, system, hardware, software etc. from being the victim of cyber-crime so all top mnc’s and government organization such as army have installed high security system so that no one reach their data and hardware etc. Now days we can see that security system are getting upgraded with high security so that any attacker or hacker cannot reach your computer or your content easily. We can take the example google.com in terms of security how they have made secured e-mail system as the user login their account they are not able to directly access their account first google identify whether right person is accessing the account or not by just sending 6 digit code to their hand phone via text message then user enter that code then they are able to access they account this security system of google prevent user from getting their email account hacked some time we have some confidential mails such as credit card number, company meeting details etc. so user don’t want these discussion to be published publically so that why security of email account is necessary.
...ct ones computer from viruses is to stay away from untrusted sites and having an Anti-Virus software installed on the computer. Nowadays, there are 2 major types of Anti-virus, the Internet Security and the Anti-virus(which only protects realtime locally). Internet Securities gives better protection when surfing the net since their database also includes trusted sites and malware/adware detection. One must also avoid plugging-in untrusted media to the computer such as flashdrives. Connecting to public networks may also cause viruses to replicate to your computer. Everytime a foreign media is plugged-in, one must always scan the media with anti-virus softwares before opening. Always keep backup of your important files in case of virus intrusions, to avoid losing important documents and data.
My office faces many IT security threats. Seeing as we carry classified and confidential data including new business recruitment packages, business income data, and employee data, security is very important, however I strongly believe that there is much room for improvement in this area. Some issues that we face frequently are computer viruses. Personally, I receive about 5 emails a week that carry viruses according to our information technology department. Sometimes these are caught before they go to my inbox but other times they go directly to my inbox. I was trained to not open any files that I do not recognize or from users I do not recognize which helps with security. Unauthorized access is also a threat to my office. Many phishing emails are received that claim to be from the city asking to reset our data with the goal of attaining password information. Again, strong communication and training helps prevent this, but it is still easy to open the files. Some older individuals in the city have opened the files and caused data breaches, which is why education regarding these issues has increased. We are protected by these threats by mandatory password changes once every three months, strong firewalls, and antivirus software. However, I would assert that my office is still not very protected against these threats. Password changes could be more frequent. Additionally, we do not backup data. We use quicken for our finance system, and this has never been backed up. If