Computer Security

In: Computers and Technology

Submitted By maksmojo
Words 465
Pages 2
This information should be protected and be mentioned in the acceptable use policy (AUP) to insure users understands the importance of Richman Investments classifications. Documents with the Internal Use Only classification should be handled with care and protected by everybody within Richman Investments. There are many different ways for sensitive information to be leaked but we will be focusing on these three: The User Domain, The Workstation Domain, and the LAN Domain. The User Domain is the weakest link but one of most important and it’s one that everyone has a hand in. When going through the AUP the user must sign and agree to the terms. This will give Richman Investments the leverage to make decision based on the employees conduct. We must insure we hire good trustworthy candidates for the job that will not violate the policies set before them. Word of mouth is another way that information leaks to outside agencies. Users should not be allowed to bring in their own media data without signed approval from the IT department. The users should also be limited access to the sensitive information based on their job descriptions. Workstation Domain is a part of the protection that needs to be kept up to date and mentioned in the AUP. Allowing a computer without the most current updates and patches could be a harmful. New threats have come along and need the newest updates to keep from allowing Viruses, Malware, or Spyware from getting into our Internal Use Only documents. Leaving your desk with your computer unlocked leaves it open for unauthorized access . A simple control+alt +del with a password protection would prevent this from taking place. Home media (CD’s, DVD’s, and USB’s) are great to have and should be used just not at work without proper authorization. These can carry small backdoors and leave our system open to attacks. One of the…...

Similar Documents

Computer Security

...Computer Security Careers Blake Eubank Harrisburg Community College 1 A. After going to http://www.giac.org I learned it is a great place to get certified in more than 20 different specialized information security areas. It targets specific skills sets rather than generalizing. They offer more disciplines and focus on the skills required to master specific jobs. (Northcutt, 2011) The Information Systems Security Association (ISSA) is a non-profit organization which provides forums, education, and publications for its security professional members. The main goal of ISSA is to promote leadership which will ensure confidentiality, integrity, and availability of information resources. Members include all levels of security professionals in a variety of different fields including government, public, and private sectors. (ISSA.org. 2011) Technology in Action doesn’t really cover computer security careers, it does reference the Information Systems Security Association web site on page 469 but no further discussion can be found in the text. (Evans, 2011) B. On the Helium web site author Chris Stubbs explains that one of the basic skills needed for any computer user is the ability to type. (Stubbs, 2009) In my opinion you don’t have to be able to type fast you just need a working knowledge of the QWERTY keyboard. Dan Morrill on it.toolbox.com references network engineering skills as the third and sixth most important information security skills needed out of the......

Words: 554 - Pages: 3

Computer Security

...Computer Security Victoria M. Deardorff Brevard Community College April 10, 2012 This paper is written as a basic overview of computer security for the non-technical user. This paper is meant to educate the reader on practical steps that can be implemented to secure their home-based computers. Additionally, the reader will be informed of industry and government needs for and methods of computer security. With this information, the reader should gain a better understanding of why agencies and companies have their rules and regulations pertaining to computer security. What do you think when you read or hear the words “computer security”? The word security implies freedom from risk, danger, doubt, anxiety, or fear and invokes a feeling of safety and confidence. As security relates to our computers, you may immediately ask yourself if you have done everything possible to guard your personal computer as well as the information stored on that computer. Also, you may think about the companies with which you do business and ask the same question; have they done everything possible to protect my personal information? The world of computer security or information security, as it is sometimes called, continues to evolve as consumers expand the use of computer systems. “The story of network attacks, bugs, viruses, and criminal actions stretches as far as the computer industry itself. One of the first bugs to develop in a computer system was precisely that: a moth was......

Words: 1938 - Pages: 8

Computer Security

...Contents INTRODUCTION 4 SECURITY 4 Client Security 4 Server Security 5 Document Confidentiality 5 Risks and threats to E-commerce Sites 5 Hackers 5 Software/hardware failure 5 WHY SECURITY FAIL 6 Exposure of confidential data 6 Modification of Data 6 Errors in Software 6 Poor stipulation and testing 6 Repudiation 6 Solutions to E-commerce Security Risks 7 Encryption 7 Data Encryption Standard (DES) 7 RSA Public Key Algorithm 8 Digital signatures 8 Digital certificates 9 Security for Transactions 9 Secure sockets layer 10 Secure Electronic Transactions (SET) 10 Conclusions 11 INTRODUCTION Internet security is not fully understood by many. However, it is an integral part of Using the Internet safely, most of the security on the Internet is not seen nor its Existence known to the user. The importance of web security is to keep the user, the E- Commerce Merchants and Authorised third parties safe whilst carrying out normal Browsing and transactions online. SECURITY To examine web security we need to look at all the main components of a connection, which are the browser and the Server and then examine the connection between the two. The user, via their web Browser, connects to a remote web server and requests a document. The server then Returns the document, and the browser displays it. This seems a simple enough process, So what could go wrong? From the users point of...

Words: 2106 - Pages: 9

Computer Security

...Information Security refers to the processes and methodologies which are designed and implemented to protect print, electronic, or any other form of confidential, private and sensitive information or data from unauthorized access, use, misuse, disclosure, destruction, modification, or disruption. Wikipedia says, "Information security means protecting information and information systems from unauthorized access, use, disclosure, disruption, modification, or destruction. The terms information security, computer security and information assurance are frequently used interchangeably. These fields are interrelated and share the common goals of protecting the confidentiality, integrity and availability of information; however, there are some subtle differences between them. These differences lie primarily in the approach to the subject, the methodologies used, and the areas of concentration. Information security is concerned with the confidentiality, integrity and availability of data regardless of the form the data may take: electronic, print, or other forms." Computer Security is concerned with the risks related to computer use, and ensures the availability, integrity and confidentiality of information managed by the computer system, permitting authorized users to carry out legitimate and useful tasks within a secure computing environment. ---Information security and computer systems are closely tied entities, these fields are interrelated and share ...

Words: 314 - Pages: 2

Computer Security

...CHAPTER 3 CO M P U TE R A N D I NT E R N E T C R IME QUOTE In view of all the deadly computer viruses that have been spreading lately, Weekend Update would like to remind you: when you link up to another computer, you’re linking up to every computer that that computer has ever linked up to. —Dennis Miller, Saturday Night Live, U.S. television show VIGNETTE Treatment of Sasser Worm Author Sends Wrong Message Unleashed in April 2004, the Sasser worm hit IT systems around the world hard and fast. Unlike most computer viruses before it, the Sasser worm didn’t spread through e-mail, but moved undetected across the Internet from computer to computer. It exploited a weakness in Microsoft Windows XP and Windows 2000 operating systems. By the first weekend in May, American Express, the Associated Press, the British Coast Guard, universities, and hospitals reported that the Sasser worm had swamped their systems. Computer troubles led Delta Airlines to cancel 40 flights and delay many others. Microsoft quickly posted a $250,000 reward, and by mid-May, authorities apprehended Sven Jaschen, a German teenager. Jaschen confessed and was convicted after a three-day trial. Jaschen could have received up to five years in prison, but because he was tried as a minor, the court suspended his 21-month sentence, leaving him with only 30 hours of community service. Copyright © 2007 by Thomson Course Technology. All rights reserved. This publication is protected by federal......

Words: 18526 - Pages: 75

Computer Security

...Computer Network Security Alternatives Computer network security and integrity is a large concern among all types and sizes of companies. The options for solving security risks are as varied as the companies themselves. However, it is possible to break down the methods for dealing with security risks into three major categories. Companies have the option to: 1. Select best of breed products for their various security needs and assemble the products together to form their own customized solutions. 2. Purchase a security suite that contains security products that will address their various security needs. 3. Outsource security to another company rather than handle it internally. This paper will summarize primary research conducted by Kang-hun Lee, Yonghoon Choi, Mike Loveridge, Tom Gonzales and David Linford over a three month period to determine market trends in the security software industry. A survey instrument was prepared to capture the following data. 1. What do companies consider threats to their network environment? 2. What preferences do they have regarding specific security services? 3. What sort of security option do they prefer when choosing between: best of breed, suites or outsourcing. Findings and analysis Once the data were collected, we were able to organize and analyze the results. This section will both specify the analytical procedures we used as well as report on the findings. There are three (will be more when......

Words: 766 - Pages: 4

Computer Security

...Contents 1.1) Computer threats categories 2 This attack covers: 2 2.) Bob signs up for internet banking. 3 2.1) how the security scheme works 3 2.2) is it secure against dongle theft 3 2.3) if safe from eavesdropping, does this eliminate need for dongle 3 2.4) the cryptographic primitives used 3 2.5) purpose of the serial number 3 2.6) does the serial number need to be randomly generated 3 Computer security and protecting our systems 4 Bibliography 5 Question 1 1.1) Computer threats categories This attack covers: i) Deliberate acts are the main threat category for this type of attack because the hacker is deliberately trying to cause harm. It also deliberates acts of espionage or trespass; deliberate acts of sabotage or vandalism; and deliberate acts of theft. ii) Compromises to intellectual property – copying of files, defacing the web page, and stealing credit card numbers iii) Technical failures. For instance, if part of the organizations software has an unknown trap door, then this type of hacker attack could occur. iv) The final category is management failure. This hacker attack could happen if management were to have a lack of sufficient planning and foresight to anticipate the technology need for evolving business requirements. Question 2 2.) Bob signs up for internet banking. 2.1) how the security scheme works The security token contains a secret key that is used...

Words: 898 - Pages: 4

Computer Security

...Computer Security Assignment 2 Solutions ECE568, Winter 2011 Introduction Answer the following questions. When a word count restriction is given for a question, exceeding it will result in marks being deducted. If your answer is more than twice the maximum length, you will get zero for the question. Please include a word count for all your answers. We recommend that you use a utility like wc on ECF to count the number of words in your answer. Your answers should be written in proper English, with full sentences. We reserve the right to deduct marks for poor English, unintelligible answers or illegible handwriting. All answers should be written in your own words - no copy-pasting! The completed assignments should be submitted in hardcopy during class on April 4, 2011. Note that all written assignments should be done individually. 1 DES and differential cryptanalysis Read http://securespeech.cs.cmu.edu/reports/coppersmith.pdf and answer the following questions: 1. Out of the 3 types of attacks an adversary can mount on a cryptographic algorithm, which ones does differential cryptanalysis utilize? [1 mark] 2. When was differential cryptanalysis first discovered? Which organization had knowledge of it at the time? [2 marks] 3. When did differential cryptanalysis first appear in public literature? List the title and the authors of the paper. [2 marks] 4. What is an active S-box as described in the article? Why is it important to maximize the number of active S-boxes? What property,...

Words: 2608 - Pages: 11

Computer Security

...Foundations of Network Security Fundamentals of Network Security 2 Firewall Fundamentals 43 VPN Fundamentals 79 Network Security Threats and Issues 111 CHAPTer Fundamentals of Network Security 1 C OMPUTER NETWORK......

Words: 16205 - Pages: 65

Computer Security

...Minwossi Zerbo Mrs. Jensen English 1A-21 14 November 2015 Computer Security: Worms and viruses Nowadays, in the domain of computer sciences, there is a big problem to face: Worms and viruses. Being in the technology is a good thing, but being n the technology without knowing how to avoid the consequences of the technology is worse. Viruses and worms affect the computer and damage, or in other words corrupt some files that are important to the good functioning of the computer. Viruses have many ways of penetration that computers user ignore, and that’s what makes the damage even more severe. First of all, let’s start by defining a viruses and a worm. A virus is a malware program (not a computer program), that auto run, and replicates by adding copies of their code into other computer program, any other type of data that it comes across. This will create an overall corruption of your database and your computer. In reality, there are three categories of computer infections malwares and we defined the first one which is viruses. The two second malwares are worms and Trojan horses. In a questions of codes or designs they are all similar, but the differences come in the way these three categories act. Contrarily to viruses that need a human action to spread, such as sharing files, running an infected program, and so on, worms have the ability to auto spread themselves, which mean that they don’t require the action of a human. They can travel by themselves by taking......

Words: 1076 - Pages: 5

Computer Security

...TITLE: PERSONAL NETWORK SECURITY INTRODUCTION: Computer security is the process of detecting unauthorised use of your computer or PC . As the old saying goes “prevention is better than cure” , going by this we realise that if we learn about the possible loopholes in the security we can prevent it in the first place. But the big question is 'why should i care about my computer security?' . We use computers for everything from banking and investing to shopping and communicating with others through email or chat programs.Although we may not consider our communiction a 'top secret' ,but you dont want others to eavesdrop on you conversations, read your mails, use your computer to attack others system , send forged mails from your computer to others or check the stuff from your computer hard drive. There are many people who whould want to break into you computer system they are generally known as hackers or crackers . More often they do this because they want to launch an attack on some computer system through your computer and other times it is done by some teenage kid who want to showcase his skills and feel proud of himself and maybe even gain some limelight. If your computer is connected to the internet then you dont need some hacker to personally attack your system . There are thousand of computer programs to do this job on the net. Even if you use your internet just to check your e-mails you could still be a huge target for attackers. Is it easy to break into......

Words: 1142 - Pages: 5

Computer Security

...appropriate behavior in order to avert the cybercrime. Many of these policies are just adopted, but till many companies find it necessary to be tailored so that it is tailored to an organization security needs and most till need to be updated to reflect ever changing impact of the cyberspace transactions in everyday activities. Like all company document, cyberspace follows good design and various format in order to make the document not be vague and follow government policies on security design. These policies also need to be reviewed regularly to ensure that they conform to the business needs that are ever changing gin the business environment. The following are the major items involved in the cybercrime plan actions. 1. Establish security roles and responsibilities Establishing security roles and responsibility in a company is one step towards combating cybercrime. The policies should clearly define the separation of roles with responsibility depending on the system in place. This means that a system will be designed on role based control which might not be well utilized when the procedures and policies are not well defined. The extend of employees can go with a system should show how much they can access in the system and the policies should be maintained at minimum. This means that: The security procedure clearly identifies data ownership in the company and employee roles are well defined. The employees should not inherit privileges from other users. This means that......

Words: 2072 - Pages: 9

Computer Security

...singer?Question #03: Kevin realizes that when he turns 21, he will no longer be under the jurisdiction of the Juvenile Court. He decides to hide and picks a name to use while hiding. What is the name and where did he get the name?Question #04: Kevin continues to hack Pacific Bell. His target is the Switching Control Center System (SCCS). Why did he choose that target? | | NIST 800-12 discussion of cryptography is remarkably up to date and correctly points out that cryptography depends on other controls for effective implementation.Question #05: Numerically list the 5 security controls that cryptography requires. In your own words, explain each control. | | Question #06: What is the main idea behind cryptography?Question #07: What is the main problem with symmetric cryptography?Question #08: What is the basic idea in asymmetric cryptography?Question #09: What does key length have to do with security?Question #10: What is a one-way hash function? Why is it used? SHA-1 is discussed by Bruce, but has been replaced by what current standard (you’ll have to search the Internet for this one)? | | OptionalCorrectly answer both questions is required to received 1 bonus point.We discussed the Caesar cipher in class. The offset in a Caesar cipher can be referenced several ways. For example, Caesar Cipher with an offset of 13 (is sometimes called ROTate by 13 places or ROT-13). 1) Decrypt this ROT-4 cipher text to clear / plain text:Fi e psriv. Xlex kmziw csy xmqi......

Words: 1379 - Pages: 6

Computer Security

...Computer Security Protecting Your Computer System Do’s and Don’ts Abstract This paper explores the computer security process of preventing and detecting unauthorized use of computers. I will also discuss: A. The prevention measures (do’s and don’ts) to help you stop unauthorized users (also known as “intruders”) from accessing any part of your computer system. B. Detections methods that help you to determine whether or not someone attempted to break into your system; a. If an attack was successful b. If so, what they may have done.   Computer Security Protecting Your Computer System Do’s and Don’ts We use computers for everything from banking and investing to shopping and communicating with others through email or chat programs. Although you may not consider your communications “top secret,” you probably do not want strangers reading your email, using your computer to attack other systems, sending forged emails from your computer, or examining personal information stored on your computer (such as financial statements). Intruders (also referred to as hackers, attackers, or crackers) may not care about your identity. Often they want to gain control of your computer so they can use it to launch attacks on other computer systems. Once an intruder takes control of your computer, they have the ability to hide their true location as they launch attacks, often against high-profile computer systems such as government or financial systems. Even if you......

Words: 1909 - Pages: 8

Computer Security

...Discussion Questions - Unit 1 1. Consider the information stored on your personal computer. Do you, at this moment, have information stored in your computer that is critical to your personal life? If that information became compromised or lost, what effect would it have on you? (150 - 200 words) I do have personal information stored on my computer that is very critical to my personal life. My personal computer holds credit card numbers, bank account details, passwords, medical information, websites I have visited, personal family pictures, some private letters and all my business ideas. Basically my whole life is on my personal computer and if it fell into the wrong hands someone might use it to commit fraud against me. I will have to take action quickly to minimize the potential for the theft of my identity. I will have to close compromised credit card accounts immediately and put an initial fraud alert on my credit report. I will have to place new passwords on old and new accounts that I open. I think getting my personal information compromised would leave me very paranoid and I will be watching for signs that my information is being misused and I think at the end it will leave me feeling much violated. 2. What is a mission statement? What is a vision statement? What is a values statement? Why are they important? What do they contain? Provide an example of one of the three. (150 - 200 words) A mission statement is a clear definition of what an organization is,......

Words: 651 - Pages: 3

Michel Israël | Nàng Thơ Xứ Huế | Episode 008 vostfr