Sunday, April 17, 2011

Tutorial IV: Computer Security Risk



It has come to my attention the importance of computer security. This loosely used term is vital to the computer user. I am going to educate you on the importance of computer security.
First we must understand the computer risks:


Internet and Network Attacks
Unauthorized Users
Information Theft
System Failures
Here above is a list of possible security risks. Lets go through and explain each one.

Internet and Network Attacks:
Internet and Network attacks are the most common form of cyber abuse. Hackers, or crackers, cyberterrorists are computer users committing crimes against other computer users. The definition of cybercrime is "Online Internet based illegal acts". This means any act of hackers violating your computers security to change or steal you personal information is considered a cyber crime. There is many different ways cyberterrorists use the Internet to destroy people personal computer. These terrorists use computer programs such as viruses to infect your computer in negative ways. These viruses are made to destroy or cripple your cyber use. Each one is designed to perform different functions, but ultimately with one major goal "computer destruction". Other forms of Internet abuse is from applications such as worms, rootkits and Trojan horses. These all sound different but are made for the same reason.

Unauthorized Users:
An unauthorized user is a person is using a computer without permission. This would not fall under the cybercrime law. The vulnerability of your computer is a high risk. Without computer passwords or locks enemies or associates can freely access your computer. Which has private information that is now shared with the wrong people. Many business's must be aware of this security risk. Potential clients and employees could cripple a business if an unauthorized user hacks of steals valuable information. Selling company information, secrets, or evidence to accuse large corporations. Financial records are now computer accessible.Which leads me to my next point.

Information Theft:
This is one of the most important security risks. Due to the amount of information stored on computer nowadays; hackers are subject to stealing and personal information. An example: I was on the web and bought a cell phone case. Days later my credit card number were taken off the web and used unauthorized by individuals who I did not know. I lost hundred almost thousands of dollars due to this cybercrime. My point is valuable information such as bank information, SS numbers, credit card numbers, address and even phone numbers are on the computers and even the Internet. This information could put our lives at stake. Identity theft has been a major campaign for the last couple of years. Companies such as ID watchdog and Lifelock are designed to ensure protection of personal information that is access online. Identitytheft.com states over 7.2 million homes affected by identity theft per year. This means watch the information you list, monitor your and your children's websites. Information theft is a huge industry for hackers and cyberterrorists.

System Failure:
Our last point we have is System Failure. Many computers today are destroyed by lightning. This can cause loss of information stored on these computers. Its a loss of money and time. People do not understand the importance of surge protectors. These devices are designed specifically to protect the device plugged into its outlets. Its is estimated 5 million computers are destroyed yearly by lightning strikes. You can buy surge protectors for cheap. $5 dollars could sace you hundreds for insuring your computer with a surge protector. All computer companies do not have lightning stike guarantee's. Above I have posted a screen shot o my search results for screen protectors
Discovering Computers 2010 (Cashman Series)
^^^^^Definitely best article to read^^^^  #james #marcic #jamesmarcic 

Sunday, April 10, 2011

Secure Email Project

I have just completed my secure email project. This project was very interesting. I was never aware of signed and encrypted emails. This was new surfing in new waters for myself. I must admit though, I found this project more direct and understandble than the Access project. This project was smooth. I started early and finished with plenty of time. I am really enjoying learning more and more in the computer world. I have a grasp of terms and phrases I would never of known unless this course. Below is a picture of my Thunderbird inbox. Here are my two email replies from Professor Means. I have highlighted the two with Arrow indicators.




In the article shown above, there is a report on email security. The importance of email security in the expanding computer age has become very prenevolent in the past couple years. The article focuses on how company's can become less vulnerable to data breaches through company emails. Many business are coming into the light of securing employee emails. Internet and data security is important to the survival of a young or old corporation. Leaking of precious information can cause loss of money, profit, and power.
The article states the email market has been steadily growing for the last decade. Between between 2005-2008 over 600 million new mailboxes were established through providers. The biggest loss of email security is through servers. To save email data a company needs a server to store all the data. Mass storage can lead to deleted information that is essential to a business.

Another form of email security loss is from the employees. More and more people are working from home offices or on the road. This requires laptops or portable computers. This means employee have access to offline email messages. So evidently this has a critical risk factor in data security.

The article states "
A large risk to email data within the enterprise is unlawful access to highly sensitive mailbox information". Many offices trust employee's with information. Constantly secure management of these data files is important to its security. Breaking information hackers are less of a problem then mad employees taking there anger out on the company. Data loss from employees selling information, or taking the information to use for themselves.