What Types of Devices Are Available to Protect Computers from System Failure?

System failure is the prolonged malfunction of a computer. It is a type of computer risk as it can damage and cause the loss of hardware, software, data or information. System failure can be caused by aging hardware, natural disasters, errors in computer programs and electrical disturbances such as noise, under voltage and power surge.

The devices available to protect your computer against system failure are:

  • A surge protector

Also called a surge suppressor, this device is able to protect against system failure because it uses special electrical components to smooth out minor noises, provide a stable current flow and keep an under voltage from reaching the computer and other electronic components. Here is a picture of a surge protector (click on the picture to enlarge):

tripplite_isoultra_parts2

  • An uninterruptible power supply (UPS)

A UPS connects between your computer and a power source. It is a device that contains surge protection circuits and one or more batteries that can provide power during a temporary or permanent loss of power. There are two types of UPS: standby (also called offline), which switches to battery power when a problem occurs in the power line. The second type is online, which always runs off the battery in order to provide continuous protection. Here is a UPSmain_UPS850GP

Keep in mind that a system failure is almost always unexpected and may cause the loss of your information therefore be ready. Whether you do or don’t have one of those devices, you can still protect your data and information by setting a regular backup for your files so that they do not get completely lost and damaged during a system failure.

How Do Software Manufacturers Protect Against Software Piracy?

Software piracy is the unauthorized and illegal duplication of copyrighted software. In other words, it is when software is stolen from the software manufacturers. Software piracy is a serious offense and is a type of software theft. Here are two things that manufacturers do in order to protect themselves from software piracy and illegal sharing of their software:

  • Issue a license agreement

A license agreement is the right to use the software. A license agreement is a legal agreement that grants someone permission to use something trademarked, copyrighted or otherwise protected in specific circumstances. Usually this right is given when the person has bought the software therefore licensing agreements are essentially permission slips that describe authorized use of the subject of the license. When people install software on their computers, they must review a legal document describing how the software can be used.

Here is an example of a license agreement: www.nearinc.com/pubs/draftsla_us.pdf

  • Require a product activation

Product activation is the procedure by which a piece of software or operating system is proven to be legitimately installed.

For example, after you install software such as Microsoft Office, you are asked to provide the activation key to prove that you have the right to this in order to use the full version of the product and get the future updates. Here is what it may look like: product-activation-450x413

The key is usually given to you online or by telephone when you buy the software.

What Are Techniques to Prevent Unauthorized Computer Access and Use?

cyber-safety2.jpg

Unauthorized computer access is when someone enters another person’s computer without the permission of the owner. Once a cybercrime perpetrator has access to a computer, he can now operate and steal information, destroy data and do other malicious things. It is therefore very dangerous and you should all adopt the few preventive practices below in order to avoid the unauthorized access to your computer and protect your privacy:

  • Use strong passwords. Use a personal password to prevent whoever from accessing your device after you. Use a personal one and make sure you change it often. Also keep the habit of locking your computer.
  • Use antivirus software. “Do not avoid security patches”. Download a strong antivirus to prevent viruses, worms and others. This will avoid your computer from being hacked.
  • Keep software up to date.
  • Verify your software security. Also do not allow any application to make changes to your computer.
  • Build personal firewall. A firewall is designed to create a shield between your device and the Internet. It prevents illegal access to your device. Always keep your firewall on as it detects danger and sends you an alert.
  • Back up early and often. Make use of websites that provide storage and allow you to keep a copy of your information. It will help to keep data safe.
  • Protect against power surges and loss.
  • Be careful while surfing on the Internet. If the file sharing feature is on and set to unlimited number of users, disable it and only share information with people you know.
  • Be careful while reading e-mails. Do not open an email if the source is unknown or seems shady. Emails have been widely used to send viruses.
  • Scan devices and downloaded programs. When you connect a device to your computer or when you download a program or file, scan it for viruses and other malware to prevent them from infecting your computer.

Here is a blog where the author gives detailed explanation on how some of these tips actually help you: http://dailytipsndtricks.blogspot.com/2013/01/how-to-prevent-unauthorized-access-to.html?m=1

What are safeguards against hardware theft and vandalism?

Hardware theft means stealing the computer equipment and hardware vandalism is when the computer equipment is being destroyed or defaced, for example, cutting a computer cable or breaking a computer screen. To reduce the amount of hardware theft, here are some safeguards against hardware theft and vandalism are as follows:

  • Physical access control. Put the hardware in a safe place and secure it by locking the place and protect the equipment.
  • Real time location. System of tracking and identifying the location of high-risk or high-value items.
  • Install alarm systems. When someone breaks into the safe room at a time where he is not allowed to and tries to steal or break hardware for example, the alarm will let the security forces know.
  • Use cables to lock computers to stationary objects. That way, it will not be easy to move the computer.
  • Install a mini security system. Same as the alarm system.

 

This online book has some interesting information about Computer security and this chapter focuses on hardware theft and vandalism:

books.google.co.za/books?id=qqdGbLYpl4wC&pg=PA569&dq=what+are+safeguards+against+hardware+theft+and+vandalism&source=bl&ots=cJuwPuZo7U&sig=vIEW9wRgPMGRHLgSHZ1aFRDoS9U&hl=en&sa=X&ei=dkZVPjFCdDOaPTjgeAP&ved=0CCkQ6AEwBQ#v=onepage&q=what%20are%20safeguards%20against%20hardware%20theft%20and%20vandalism&f=false

What Are Various Internet and Network Attacks, and how can users safeguard against these Attacks?

  • Internet and Network attacks

Internet and Network attacks are the criminal offenses done with use of the Internet and computer networks to divert money or to perform crimes. There are many of them and I’m going to give a definition of the 11 most known ones according to the Norton Security Center and list some of the others. Here is the link: http://www.symantec-norton.com/11-most-common-computer-security-threats_k13.aspx

Viruses: A computer virus is a program written for the purpose to spread stealthily and quickly to other computer program. It more or less seriously disrupts the functioning of the infected computer. It can spread through any means for exchanging digital data AS the Internet, including through emails or their attachments. The danger is very high.

SPAMs: It is massive and automatic delivery, sometimes repeated of unsolicited emails to persons with whom the sender has had no contact and he recovered email addresses irregularly. The danger is low.

Spoofing: Also known as identity theft, spoofing is the use of your identity or documents that could identify you (name, address, identity document…), without the user’s knowing or his complicity, by another person to gain an advantage: obtaining certain rights, claim to have gained some qualifications, fraud at your expense. It is very common on the Internet and the danger is very high.

Spyware: As the name says, a spyware is a software that spies. It is malicious software that collects personal information without the user knowing to retransmit them through the Internet connection. It is installed on a computer when a user browses the Web, makes a download from an untrusted site, or when using an instant messenger or file sharing. The danger is high.

Key Logging: Keylogging is the action of using a keylogger, which is a type of specialized spyware to spy on keystrokes on the computer that hosts it, and transmitting them over the Internet to an address where a hacker can exploit them. A keylogger is very dangerous as it can collect and transmit your passwords, ATM pin, and other logging private details.

Worm: A worm is program that can self-replicate and move across a network using the network mechanisms without actually needing a physical or logical media (hard disk, host programs, file…) to spread; a worm is a network virus. The danger is very high.

Trojan Horse: A Trojan horse is a seemingly harmless malware, yet very dangerous. One of the dangers is that it allows a hacker to break into an infected computer and take control of your computer, and, without the user knowing.

Blended threats: Blended threats is a multifaceted threat to both the level of the means of propagation and that these consequences. It combines different threats together, which makes it very dangerous. Nimda is an example of a blended threat. It is the first threat that uses four different means of propagation, thus ensuring maximum dissemination and eradication in infected, difficult is laborious.

Denial-of-service attack (DOS Attack): In Denial of Service attacks the attacker sends a large number of connections of information requests to a target with the aim of making it unable to meet the requests of its user’s computer application, which will overload the system that will be unable to respond. Mail servers can be victims of these attacks. This type of attack is extremely difficult to block because it is often impossible to differentiate a real application of a query DDos. The DDoS attack often uses a multitude of zombie PCs infected with backdoors exploited remotely by an attacker and attacking a single target simultaneously.

Phishing: Phishing is a fraudulent technique used by hackers to retrieve information from users using a fake website sent through emails that appear to be coming from a trusted company (usually banks). The information entered on this fake websites are then sent to the hacker.

Mail Bombing: Mail bombing is quite similar to DoS. It is when a cybercriminal sends a large amount of emails to the victim, usually hundreds of them. It disturbs the person’s network and while the victim is trying to fix it, the perpetrator uses this period of time at his advantage to get access to the victim’s personal information.

 Some of the Internet and Network attacks include SPIM or SPIT, Adware, man-in-the-middle, scareware, backdoor, wabbits, exploit, BotNet, dialer, dropper, fake antivirus, bluesnarfing, bluejacking, BootSector virus, browser hijackers, chain letters, virus document, mouse trapping, pharming, crimeware and SQL Injection. A brief definition of each is given on this link: http://forums.iobit.com/forum/iobit-security-software/iobit-security-softwares-general-discussions/other-security-discussions/15251-28-types-of-computer-security-threats-and-risks

  • How can users safeguard against these attacks?

In order to avoid the attacks mentioned above, users have to take precautions. Here are some few habits you should adopt to safeguard against malwares. First, make use of safe and strong password that will be hard for other people to crack and be careful while entering critical credentials and when you do, make sure the website is recognized and never reply to an email or SMS that asks you for personal information. Second, be careful about where you are downloading data as viruses and adware could be attached to your file, also disable autorun as viruses could install themselves automatically. Third, do not connect any devices to your computer without scanning them and also scan your computer regularly. Lastly, it is important to think well before clicking on a link and verify the sites you download stuff from. Also, keep in mind that once information is shared, it is not easy to take them back or erase them forever. Therefore, beware of everyone and do not share your life with everyone, especially your personal and private things to not fall into social engineering.

It is impossible to completely avoid your computer from being totally safe from viruses do not exist. All computers are exposed to such. Fortunately for Internet users, there are some ways to prevent those attacks and avoid viruses, SPAMs and others. A user can also safeguard against these attacks using these methods:

Encryption: To encrypt means using a secret code that is unknown to other computers. Users must make use of encryption method before sending messages to avoid having their messages intercepted and altered.

Antivirus: Get a safe antivirus to guard your computer from getting infected by viruses and worms. An antivirus is a software that detect viruses by inoculating existing files and protects your computer against those.

Firewalls: is a computer security software that protects Internet users from being spied on without them knowing. Indeed some malware (trojans, spyware and other malware) allow people located remotely to take control of the infected computer or just to gather information about the user. To overcome this problem the firewall controls inbound and outbound connections, we therefore talk about managing the flow of data.

Virtual Private Network (VPN): a virtual private network is an extension of a private network that encompasses links across shared or public networks like the Internet . It enables the exchange of data between two computers across a shared or public network in a manner that emulates a point- to-point private link .

Read more on the topic on this link: http://www.techrepublic.com/blog/10-things/10-ways-to-avoid-viruses-and-spyware/ I find their tips interesting and they give a well detailed explanation on the methods of protections.

What are Computer Security Risks and what are the types of Cybercrime Perpetrators?

  • Computer security risks

We all have or use electronic devices that we cherish because they are so useful yet so expensive. For that reason it is important that those devices stay safe by protecting your data and confidential information, networks and computing power (PCMag, 2014). It is called computer security.

However, this computer security is threatened by many risks and dangers, which are called computer security risks. Those are “any event or action that could cause a loss or damage the computer hardware, software, data, or information” (Wong, 2013). We share personal information on the Internet and perform personal matters involving sharing personal details or money transactions. On a larger scale, companies use the Internet to communicate, organize their enterprises and also expend large amounts of money to maintain their information and business going. The issue with this situation is that cybercrime perpetrators use cyber criminality to invade this privacy and have access to all the information that we make available on the Internet. Thus, theft, destruction or alteration of data can be significant risks. These risks include the theft of a person’s identity and credentials, information extortion, human error or failure and sabotage or vandalism. Those risks can lead to people, companies and government losing personal information, privacy contents and large amounts of money. Indeed, modification of data can be huge risks distorting the functioning of the company. A modification of any parameter may thus ultimately lead to the production of a defective end product.

These risks are to be considered for all companies and every individual because they can cause a break in the continuity of the business or ruin a person’s life as well as destroying devices.

  • Cybercrime perpetrators

A cybercrime perpetrator is the author of the cybercrime. They are the ones who put our computers at all the risks mentioned above. What they do is illegal and dangerous for one’s privacy and safety. Therefore it is important to know more about them. The apprehension of the motivations and goals of the perpetrator will help you better prepare for the proper defense. Those malicious individuals can be classified into seven groups which are:

Hackers: Hackers hijack computers by exploiting programs written by others, have only little knowledge of how they operate and often try to impress with their latest computer skills. These are not criminals of the cyber world: their main motivation is not money, but to boast.

Crackers: Their main method is to use fake antivirus programs that manipulate your identity, use your credit card numbers or steal your passwords. Some earn money through illegal advertisements, often paid by a legitimate company that wants to boost its business.

Insiders: An insider is a member of a company who has access to passwords and confidential information and makes use of this to exploit within the company’s network.

Industrial spies: They use hacking methods to discover the secrets of an industrial competitor in the design, manufacture or production in order to get competitive advantage.

Cybercriminals: Their main goal is to make a lot of money. They target confidential business data that they can then sell to the most generous bidder. There are two distinct categories within this group: the first category focuses on the long term with advanced persistent threats, while the other category focuses more on financial gains in the short and medium term.

Cyberterrorists: They are part of the cyber war. At least 100 countries would develop ways to use the Internet as a weapon to target financial markets, state computer systems and utilities. The “cyberterrorist” can act as advanced persistent threats or as corporate spies, but all they learn is aimed at a specific military objective.

Hacktivists: Usually considered strikers these activists frequently operate numerous software tools readily available on the Internet to spread their message to a wider audience in order to further social or political ends.

You can follow this link to know more about the frequency of attack of these cybercrime perpetrators, the level of risk and the resources available to them: http://www.scribd.com/doc/6625212/Perpetrator-Types.