Banner

WELCOME TO FARAHSTARSSS!
Click below to navigate to:
 

Friday, 9 March 2018






COMPUTER SECURITY
💘





COMPUTER SECURITY RISK 
💣

Definition of computer security risk:

Any event or action that could cause a loss of or damage to computer hardware, software,
 data, information or processing capability.






Perpetrators of cybercrime and other intrusions fall into seven basic categories

  • Hacker someone who accesses a computer or network illegally

  • Cracker - someone who accesses a computer or network illegally but has the intent of. destroying data, stealing information, or other malicious action


  • Script kiddie - same intent as a cracker but does not have the technical skills and knowledge

  • Corporate spies - have excellent computer and networking skills

    • hired to break into a specific computer and steal its proprietary data and information.
    • help identify security risks in their own organization.

  • Unethical employees - break into their employers’ computers for a variety of reasons:

      • want to exploit a security weakness
      • seek financial gains from selling confidential information
      • disgruntled employees may want revenge.

  • Cyber extortionist - someone who uses e-mail as a medium for extortion

    • Send an organization a threatening e-mail message indicating they will expose confidential information if they are not paid a sum of money. 

  • Cyberterrorist - someone who uses the Internet or network to destroy or damage computers for political reasons

      •  the nation’s air traffic control system,

      •  electricity-generating companies

      •  telecommunications infrastructure.







1. MALICIOUS CODE

Malicious code is code causing damage to a computer or system. It is code not easily or solely controlled through the use of anti-virus code

I) COMPUTER VIRUS

A computer virus is a potentially damaging computer program that affects or infects, a computer negatively by altering the way the computer works without the user’s knowledge or permission.


II) WORM

A worm is a program that copies itself repeatedly.


III) TROJAN HORSE


A program that hides within or looks like legitimate program. It does not replicate itself to other computers.



2. UNAUTHORIZED ACCESS & USE

Unauthorized access 


the use of a computer network without permission.



Unauthorized use - the use of a computer or its data for unapproved 
Access control - security measure that defines who can access a computer, when they can access it, and what actions they can take while accessing the computer or possibly illegal activities . 

PIN - a numeric password 

Possessed object - any item that you must carry to gain access to a computer or computer facility. 



3. HARDWARE THEFT 


Hardware theft - the act of stealing computer equipment.

Hardware vandalisme - the act of defacing or destroying computer 
equipment.

Safeguards :

- physical access control
- install alarm systems
- Device tracking app



4. SOFTWARE THEFT


Software theft :

- steals software media
- intentionally erases media
- illegally copies a program
- illegally registers and / or activates a program.

Safeguards :

- keep original software boxes and media
- back up their files and disks 
- protect themselves from software piracy



5. INFORMATION THEFT


Information theft occur when someone steals personal or confidential information.

Safeguards :

- Protect information on computers located on organization's premises.

- Use variety of encryption technque 
  • Encryption process of converting readable data into unreadable characters to prevent unauthorized access.


6. SYSTEM FAILURE 

A system failure is the prolonged malfunction of a computer. It can cause loss of hardware, software, data or information

- Electrical power variations
- Electrical disturbance
  • noise
  • Undervoltages
  • Overvoltages

Safeguards :

- Use a surge protector
  • Surge protector -  uses electrical components to smooth out minor noise , provide a current flow and keep an overvoltages from reaching the computer and other electronic equipment.



SECURITY MEASURE
💥

Definition of Security Measures 

The precautionary measures taken toward possible danger or damage.



1. DATA BACKUP

- Definition :

To copy files to a second mediumas a precaution in case the first medium fails.

A data back up is the result of copying or achiving files and folders for the purpose of being able to restore them in case of data loss.


- Benefits :

If system fails , you can restore the files by copying the backed up files to their original location.

- Importance :

Prevent agaisnt data loss

Data loss can be caused by :

  • computer viruses 
  • hardware failures 
  • files corruption
  • system failure or theft

2. CRYPTOGRAPHY


 Cryptogrsphy
Technology of encoding information so it can only be read by authorized individuals

- Encryption

Process of converting readable data into unreadable characters to prevent unauthorized access


- Decryption

Process of decode encrypted data


- How ?

  • Unencrypted ⇒ plain text
  • Encrypted ⇒ cipher text
  •  To encrypt, plain text converted into cipher text using an encryption key.


3. ANTIVIRUS

Anti-virus software is a program or set of programs that are designed to prevent, search for, detect and remove software viruses and other malicious software like worms Trojan
horses, adware and more.

Basic Function :

  • scan specific files or directories
  • Allow to schedule scans
  • Allow to initiate a scan of a specific files
  • Remove any malicious code detected


4. ANTI SPYWARE



Spyware

Spyware is a type of malware that is installed on a computer without the user's knowledge in order to collect information about them. 

Anti Spyware


Anti-spyware is a type of software that is designed to detect and remove unwanted spyware programs. 




5. FIREWALL



A firewall is a system designed to prevent unauthorized access to or from a private network. 





6. PHYSICAL ACCESS CONTROL

   

    • Lock your laptop
    • Locks door and windows
    • Put the access code
    • Pur the CCTV 
    • Make a policies 





    7. HUMAN ASPECTS

    AWARENESS :


    • Ethics - be a good cyber citizen
    • Lock it when you leave
    • Pishing Emails
    • Dispose of Information Properly
    • Protect data in mobile devices 






    Thursday, 8 March 2018




    RULES OF NETIQUETTE 
    🙆


    NETIQUETTES




    Definition of Netiquette :

    Netiquette is the code of acceptable behaviours users should follow while on the Internet or online or cyberspace.


    Netiquette :

    1. Be polite. Avoid offensive language

    2. Avoid sending or posting flames.

    3. Be careful when using sarcasm and humor

    4. Do not use capital letters -> SHOUTING

    5. Use emoticon to express emotion,

    - Smile ( :) )
    - Indifferences ( :| )
    - Surprise ( :o )
    - Frown ( :( )
    - Undecided ( :/ )
    - Wink ( ;) )


    6. Use abbreviation and acronyms phrases :


    - By the way ( BTW )
    - For your information ( FYI )
    - In my humble opinion ( IMHO )



    7. Be forgiving for other mistakes .




    AREA OF COMPUTER ETHICS
    🙌



      

       
    DEFINITION OF COMPUTER ETHICS


       The moral guidelines that govern the use of computers, mobile devices and information systems.





    1. Information Accuracy




    - Be aware that the organization providing access to the information may not be the creator of the information.

    - - Do not assume all the information on the web is correct



    2. GREEN COMPUTING
      
      Green computing 

     - Green computing is the environmentally responsible and eco-friendly use of computers and their resources.

    - - Reducing the electiricity and envorinmental waste using a computer

      • Use the hibernate or sleep mode when away from a computer for extended periods.

      • Use flat-screen or LCD monitors, instead of conventional cathode ray tube (CRT) monitors.

      • Buy energy efficient notebook computers, instead of desktop computers.


    3. CODES OF CONDUCTS






    Definition of codes conducts :

    Written guideline that helps determine whether a specific action is ethical/unethical or allowed/not allowed.






    4. INTELECTUAL PROPERTIES 



    Definition of intellectual properties

    - To protect any original work that created by individual person/ company for example, image, drawing, lyric, publishing and so on.

    - Preserve the features and processes that make things work. This lets inventors profit from their inventions.


    I) PATENT


    Definition of Patent


    Patent is a set of exclusive rights granted by a govenrment to an investor or applicants for a limited amount of time.




    ii) TRADEMARK


     Definition of Trademark

      - Trademark is a word, phrase, symbol, design, combination of letters or numbers, or other device that identifies and distinguishes products and services in the marketplace.






    iii) COPYRIGHT


    Definition of Copyright



    Protection provided to the authors of “original works” and includes such things as literary, dramatic, musical, artistic, and certain other intellectual creations, both published and unpublished

    • Literally works
    • Artistic works





    5. INTELECTUAL PRIVACY




    Definition of Intellectual privacy



    Unique and original works such as ideas, inventions, literary and artistic works, processes, names and logos.