Computer Security


 


What is Computer Security?


Computer Security is a branch of technology known as information security as applied to computers. Information security means protecting information and information systems from unauthorized access, use, disclosure, disruption, modification, or destruction. The objective of computer security varies and can include protection of information from theft or corruption, or the preservation of availability, as defined in the security policy.




Technological and managerial procedures applied to computer systems to ensure the availability, integrity and confidentiality of information managed by the computer system


 


Computer security imposes requirements on computers that are different from most system requirements because they often take the form of constraints on what computers are not supposed to do.


Typical approaches to improving computer security can include the following:




Physically limit access to computers to only those who will not compromise security.

Hardware mechanisms that impose rules on computer programs, thus avoiding depending on computer programs for computer security.

Operating system mechanisms that impose rules on programs to avoid trusting computer programs.

Programming strategies to make computer programs dependable and resist subversion.


Computer Security has three Layers:


o Hacking


o Cracking


o Phreaking


 


Hacking:


Unauthorized use or attempts to circumvent or bypass the security mechanisms of an information system or network.


Computer hacking always involves some degree of infringement on the privacy of others or damage to computer-based property such as files, web pages or software.

The impact of computer hacking varies from simply being simply invasive and annoying to illegal.

 


Cracking:


The act of breaking into a computer system.


Software Cracking is the modification of software to remove protection methods: copy prevention, trial/demo version, serial number, hardware key, CD check or software annoyances like nag screens and adware.


The most common software crack is the modification of an application's binary to cause or prevent a specific key branch in the program's execution.


 


Phreaking:


The art and science of cracking the phone network.


 


 


Security by design:


The technologies of computer security are based on logic. There is no universal standard notion of what secure behavior is. "Security" is a concept that is unique to each situation. Security is extraneous to the function of a computer application, rather than ancillary to it, thus security necessarily imposes restrictions on the application's behavior.


There are several approaches to security in computing; sometimes a combination of approaches is valid:




Trust all the software to abide by a security policy but the software is not trustworthy (this is computer insecurity).

Trust all the software to abide by a security policy and the software is validated as trustworthy (by tedious branch and path analysis for example).

Trust no software but enforce a security policy with mechanisms that are not trustworthy (again this is computer insecurity).

Trust no software but enforce a security policy with trustworthy mechanisms.


 


12 tips for computer security:




Update / patch ALL your software every now and then!

Check / adjust ALL your settings so they are safe, since they ARENT by default!

Use firewall, like ZoneAlarm to control what goes in and out from your computer!

Use good passwords: at least 13marks long, containing both letters and numbers. Remember to change your password every few months atleast and dont ever use the same password in two places!

Get a good antivirus program: NOD32, F-Secure or Norton Antivirus and keep it updated!

Don’t open or execute files that you are not 100% sure are absolutely safe nomatter where or how you get them.

Wipe your historyfiles (like cookies, internet history and temporary files, etc.), logs and personal files, with specific wiping program (like Eraser) instead of just deleting them.

Use encryption to enhance your privacy! Use encrypted email (like Hushmail or Ziplip), www-surfing and encrypt sensitive files on your computer (PGP).

When you are finished using some internet-based service like email, sign out of it rather than just closing your browser! Also, when you leave your computer, make sure that none of such programs or connections are left open that someone could abuse. In WindowsNT/2k/XP, press Windowskey+L to lock the workstation.

Don’t use public computers for anything you need to type in your logins, they usually have Trojan horses that capture your passwords.

Make backups and store them in safe place! Easiest way to do a total-backup is to make an "Image" of your harddrive or partition and store it on safe location, but floppies will usually be just fine for storing documents, etc.

Install and Use a Hardware Firewall


 


Regards,

Kethy Wright
www.perceptionsystem.com

Computers and Technological Innovations: A Way to Ease Life

Tired of the boring and routine work at the office? Bored with the bountiful paper works? Stressed in filing documents in cabinets and drawers? If so, you are one of the millions of employees who got hooked up with the traditional office operations and records keeping. To ease your burden, you need to use computers and other technological innovations to automate your operation and to ease your work load.


Scientists, manufacturers and companies continue to conduct research to innovate equipment and machines to give relief and comfort to everyday operations and routines, both at home, at school and at work. No matter where you are, what life you have and what work you do, you cannot escape technology. It is anywhere and everywhere you go.


Computers become a way of life for everyone. Majority of us cannot live and feel helpless without them. It cannot be denied that it has become a vital aspect in business, at home and in our personal lives.

It enables everyone to communicate with friends, relatives, family members and loved ones despite the distance between them. It helps students in their assignments and research works. It provides comfort in filing and tracking of records, thereby saving time and money. It lets you purchase items via electronic commerce and enables you to pay bills through Internet banking. It makes data analysis fast and easy by a click of a computer mouse. It lets you keep track of your inventory and logistics.

Other technological innovations and their associated significance:


Cellular phones and iPhones. Enable users to communicate with colleagues, office mates, friends, family members and loved ones anytime and anywhere.
Washing Machines.

Let homemakers do their laundry at less time and effort.

Photocopiers. Enable students, professionals, employees and ordinary individuals to copy vital documents.


Airbags. Can save the lives of both the driver and the passenger during car accidents.


Plasma television (TV). Enable you to watch movies, television programs and news at the convenience of your home.


Digital cameras. Let you capture important events and precious moments with a click of a button.


Hybrid automobiles. Enable users to travel and go places with less gasoline and without the danger of polluting the environment.
Magnetic Resonance Imaging. Enable doctors to see the presence to cancer cells and tumor.


Nanomedicine. A medical scheme that uses nanorobots to perform biological functions and medical procedures, such as repairing damaged tissues, attacking viruses and cancer cells and cleaning clogged arteries.


Laparoscopic surgery. A single incision surgery performed in a patients’ navel, reducing complications and hastens recovery period.
Closed-circuit television. Used by several companies and organizations to see illegal activities, like robberies, shoplifting, murder, holdup and many more.


Automated teller machines. Let you withdraw money anytime and anywhere.
Hydroponics. An inexpensive gardening method that gives farmers increased production, controllable conditions and less risks of damage crops.


No matter what innovations you choose and used, it is of utmost importance to use them wisely, efficiently and effectively without harming other people and the environment.

Computer Technology ? Where We've Come From and Where We Are

Computer Technology has come a long way over a short period of time. We'll discuss here a summary of the early stages of computer and how it has developed up to this point.


 


The first programmable digital computer was developed in 1944 by a partnership between IBM and Harvard. This was not however a purely electronic computer. It was constructed from seitches, relays, rotating shafts, and clutches. This machine weighed 5 tons and used 500 miles of wires, stood eight feet tall and was powered by a 5 hp electric motor. The machine ran continuously for 15 years.


Computers continued to evolve over time and by the 1960's, there were large mainframe computers in a great many corporate, government, and educational facilities. These computers were programmed through punch cards or teletype machines. The technology continued to evolve into the 70's.


The first Apple computer was the Apple I and it was introduced as a do it yourself kit in 1976.

This was an early precursor to the modern PC. This became viable with the invention of the microprocessor in the early 70's by Intel.

The first IBM PC ran a 4.77 mHz Intel 8088 microprocessor. It came equipped with 16kb o f RAM which could be expanded to 256K. It also came with one or two floppy drives. This computer had a base selling price of ,565.


This computer was marketed by Sears and Computerland stores. Less than four months after the PC was introduced by IBM, Time Magazine named this computer "Man of the Year".


Then in the early 80's Bill Gates developed MS-DOS and had it installed on the IBM PC's. This was a monumental development and helped to launch Gates as one of the richest men in the world.


The development of the MAC computers evolved from work done at the PARC Research Center in California.

This lead to the development of a graphical interface and ultimately to the introduction of the Macintosh computer in 1983. This was a significant development in computers and helped to set the stage for many other computers to follow.

Then in late 1983, Microsoft launched the introduction of Windows which was a program designed to run on IBM and compatible PC's. This was a graphical user interface type of program and replaced earlier MS DOS operating systems.


This set the stage for many more innovations in computing power as Intel made significant strides in this area as microprocessors became ever more fast powerful and complex. The amount of processing power in modern chips is truly staggering and has enabled tremendous strides in the work with personal computers can perform.


And the advancement of software has been equally impressive. These programs were optimized for the hardware they were written for and has helped to enhance our ability to capitalize on computers and has made the use of computer technology practical for virtually anyone anywhere.

The Impact of Computer Technology in Our Daily Lives

The technology that we have today continuously develops so that it makes our daily living more and more convenient and comfortable each day. And one of the most important contributions of computer technology is the enhanced communication technology that we have today.  Check out the GE Fanuc Series of components for example, for example the 90-30 GE Fanuc is an amazing piece of machinery .


Before, if we liked to send messages to our loved ones overseas, there is no other option but to send them "snail mail" which would take more than three weeks. But today, with the use of different communication devices such as computers and mobile phones, communicating with our loved ones has never been so easy.

With just a press of a button or click of mouse, we can instantaneously send and receive messages to our loved ones with the help of internet – we can even talk to them via video conferencing. We can also send and receive instant messages on our mobile phones which enable us to connect to our friends, families, and relatives wherever and whenever we like.

Another important role of computer technology is that it allows us to have a better understanding of everything such as education. Computers are being used nowadays to teach children easily and conveniently which develops their thinking and creativity skills at the same time.


Computer technology arouses the students' creativity as well as their thinking skills. Computers also help students with learning disabilities to be able to easily understand their lessons.

Also, teachers can use computer technology to improve their teaching skills.

Today, with the use of latest word processing applications, students can improve their spellings because these applications can tell if certain word is misspelled. Also, people who have communication disability such as the Mute and Deaf can easily express their thoughts and feelings with the use of computers.