Puter Security
Puter Security
Puter Security
The first is the same psychology that drives vandals and arsonists. For some people,
that seems to be a thrill. If that sort of person knows computer programming, then
he or she may funnel energy into the creation of destructive viruses.
The second reason has to do with the thrill of watching things blow up. Some
people have a fascination with things like explosions and car wrecks. Creating a
virus is a little like that -- it creates a virtual bomb inside a computer, and the more
computers that get infected, the more "fun" the explosion.
The third reason involves bragging rights. Sort of like Mount Everest -- the
mountain is there, so someone is compelled to climb it. If you are a certain type of
programmer who sees a security hole that could be exploited, you might simply be
compelled to exploit the hole yourself before someone
And then there's cold, hard cash. Viruses can trick you into buying fake software, steal
your personal information and use it to get to your money, or be sold on the digital
equivalent of the black market. Powerful viruses are valuable -- and potentially lucrative
-- tools.
Virus History
Traditional computer viruses were first widely seen in the late 1980s,
Some Virus the Melissa virus in March 1999 was spectacular in its
attack. Melissa spread in Microsoft Word documents sent via e-mail.
The ILOVEYOU virus, which appeared on May 4, 2000, was even
simpler. It contained a piece of code as an attachment. People who
double-clicked on the attachment launched the code. It then sent
copies of itself to everyone in the victim's address book and started
corrupting files on the victim's machine.
Use a Firewall
1. Packet Filter
Looks at each packet entering or leaving the network and accepts or rejects it based on
user-defined rules. Packet filtering is fairly effective and transparent to users, but it is
difficult to configure. In addition, it is susceptible to IP spoofing.
2. Application Gateway
Applies security mechanisms to specific applications, such as FTP and Telnet servers.
This is very effective, but can impose a performance degradation.
3. Circuit-level Gateway
Applies security mechanisms when a TCP or UDP connection is established. Once the
connection has been made, packets can flow between the hosts without further checking.
CYBERCRIME
Cybercrime encompasses any
criminal act dealing with
computers and networks (called
hacking). Additionally, cybercrime
also includes traditional crimes
conducted through the Internet.
For example; hate crimes,
telemarketing and Internet fraud,
identity theft, and credit card
account thefts are considered to be
cybercrimes when the illegal
activities are committed through
the use of a computer and the
Internet.
COMPUTER ETHICS
Computer Ethics is set of moral principles that regulate the use of computers. Some common issues of computer
ethics include intellectual property rights (such as copyrighted electronic content), privacy concerns, and how
computers affect society.
You shall not copy or use proprietary software for which you have not paid.
You shall not use other people's computer resources without authorization or proper compensation.
You shall not appropriate other people's intellectual output.
You shall think about the social consequences of the program you are writing or the system you are designing.
You shall always use a computer in ways that ensure consideration and respect for your fellow humans.
HACKERS AND CRAKERS
A hacker is a person intensely interested in
the arcane and recondite workings of any
computer operating system. Hackers are
most often programmers. As such, hackers
obtain advanced knowledge of operating
systems and programming languages. They
might discover holes within systems and the
reasons for such holes. Hackers constantly
seek further knowledge, freely share what
they have discovered, and never
intentionally damage data.
Cybercrimes
Intellectual Property
There are two different types of backup supported: File backup and system
image.
File backups are saved to ZIP files. Two methods of file backup are supported:
The first, normal backup, stores everything selected for backup. The second,
incremental backup stores only files that are changed after a previous backup.
System image: The image-based full system backup option, called Complete PC
Backup in Windows Vista or system image in Windows 7, allows for the
imaging of the entire system including operating system and data volumes.
The backed up image can later be restored through the Windows Recovery
Environment either to the same computer or to a new computer of different
brand and type.
TO BACKUP YOUR FILES
1. Open Backup and Restore by clicking the Start
button , clicking Control Panel, clicking System and
Maintenance, and then clicking Backup and Restore.