chapter 11 part 2

Cards (36)

  • Physical Access Restriction
    Restricting physical access to computers
  • Security Biometrics
    • Identification of humans by their unique traits
  • Passwords

    Most common tool used to restrict access to computers
  • Effective Passwords
    • Not real words
    • Changed frequently
  • Password Rules
    • Weak: password, 12345678
    • Strong: Mtwf!382, GatsbJ11*)
  • Passwords should have more than 8 characters, with numbers, symbols, upper and lower case letters
  • Don't use a password someone can guess, such as your name, birthday
  • Weak passwords
    • Saeed1994, 1stMarJohn
  • Strong passwords
    • S@ed#1$9, 13j*, nUiM
  • Access Privileges
    Access Control Software doesn't need to treat all users identically
  • Administrator account
    • Permission to install additional software, change system settings
  • Firewalls
    Protect from hackers by filtering information between a private system and the internet
  • Types of Firewalls
    • Software program
    • Hardware device
    • Both together
  • Encryption

    Scrambling transmitted messages to secure them using a secret code called a Key
  • Decryption
    Reverse process to retrieve original message
  • Left-shift Encryption
    Replace every letter with the 5th letter before it
  • Right-shift Encryption

    Replace every letter with the 5th successive letter
  • Anti-virus Software

    • Protect computer/files from harm, detect viruses and delete them, run scheduled scans, needs to be frequently revised for new viruses
  • It takes days to develop patches for new viruses
  • Audit Control Software
    Monitoring and recording user's computer transactions, tracing and identifying suspicious computer activity
  • Uninterrupted Power Supply (UPS)

    • Protects data loss due to power failure
  • Surge Protector
    • Shields electronic equipment from dangerous power spikes
  • Backups
    Used to replace originals, best data recovery insurance is regular backups
  • Backup storage

    • Online in the cloud - remote storage
    • Off-site - hard drives or flash drives stored in remote locations
    • Backup drive in laptops, external hard drives, network storage
  • Types of backups
    • Incremental: only new files or modified files, happens more or less continuously
    • Bootable: Entire system backup, makes a complete duplicate of a disk in case of a crash
  • Safe Computing Tips
    • If it's important, back it up
    • If it's sensitive, lock it up
    • If you're sending sensitive information, consider encryption
    • Beware of email bearing gifts
    • Share with care
    • Handle shareware and freeware with care
    • Don't pirate software
    • Disinfect regularly
    • Take your passwords seriously
  • Security measures
    Prevent crime but can also threaten privacy
  • Security measures that threaten privacy
    • Smart badges that broadcast identification codes, storing badge-location data, proximity recognition technology in smartphones
  • UAE Cybercrime Law No 5 of 2012

    Any form of misuse of a computer/smart device or an electronic network/system, stern punishments that could go up to a life sentence and/or a fine varying between Dh50,000 and Dh3 million
  • Breaching someone's privacy by copying, saving or publishing their photo or personal data using an electronic device is an offence punishable by at least six months in prison and/or a fine of up to Dh500,000, even if the photo was taken in a public place
  • Software Bugs

    • Cause more damage than viruses, impossible to eliminate all bugs, the bigger the system the bigger the problem
  • Google search Engine
    2010
  • Y2K Bug
    For decades only two digits were used for year, but in 2000 it would become 00 causing calculation errors, more than 100 billion dollars spent to avert the disaster, many programs had to be changed
  • Smart weapons

    • Missiles that use computerized guidance systems to locate their targets
  • Autonomous system
    Complex system that can assume almost complete responsibility for a task without human input
  • By attacking computer networks the enemy can cripple telecommunications, power grids, water and gas supplies