![]() | |
![]() | |
![]() |
Security Information |
|
![]() |
Computer Security
What is computer security? Why should I care about computer security? Who would want to break into my computer at home? Having control of your computer gives them the ability to hide their true location as they launch attacks, often against high-profile computer systems such as government or financial systems. Even if you have a computer connected to the Internet only to play the latest games or to send email to friends and family, your computer may be a target. Intruders may be able to watch all your actions on the computer, or cause damage to your computer by reformatting your hard drive or changing your data. How easy is it to break into my computer? When holes are discovered, computer vendors will usually develop patches to address the problem(s). However, it is up to you, the user, to obtain and install the patches, or correctly configure the software to operate more securely. Most of the incident reports of computer break-ins received at the CERT/CC could have been prevented if system administrators and users kept their computers up-to-date with patches and security fixes. Also, some software applications have default settings that allow other users to access your computer unless you change the settings to be more secure. Examples include chat programs that let outsiders execute commands on your computer or web browsers that could allow someone to place harmful programs on your computer that run when you click on them. Technology What does broadband mean? What is cable modem access? Typical speeds tend to be lower than the maximum, however, since cable providers turn entire neighborhoods into LANs which share the same bandwidth. Because of this "shared-medium" topology, cable modem users may experience somewhat slower network access during periods of peak demand, and may be more susceptible to risks such as packet sniffing and unprotected windows shares than users with other types of connectivity. (See the "Computer security risks to home users" section of this document.) What is DSL access? DSL access is not as susceptible to packet sniffing as cable modem access, but many of the other security risks we'll cover apply to both DSL and cable modem access. (See the "Computer security risks to home users" section of this document.) How are broadband services different from traditional dial-up services?Traditional dial-up Internet services are sometimes referred to as "dial-on-demand" services. That is, your computer only connects to the Internet when it has something to send, such as email or a request to load a web page. Once there is no more data to be sent, or after a certain amount of idle time, the computer disconnects the call. Also, in most cases each call connects to a pool of modems at the ISP, and since the modem IP addresses are dynamically assigned, your computer is usually assigned a different IP address on each call. As a result, it is more difficult (not impossible, just difficult) for an attacker to take advantage of vulnerable network services to take control of your computer. Broadband services are referred to as "always-on" services because there is no call setup when your computer has something to send. The computer is always on the network, ready to send or receive data through its network interface card (NIC). Since the connection is always up, your computer's IP address will change less frequently (if at all), thus making it more of a fixed target for attack. What's more, many broadband service providers use well-known IP addresses for home users. So while an attacker may not be able to single out your specific computer as belonging to you, they may at least be able to know that your service providers' broadband customers are within a certain address range, thereby making your computer a more likely target than it might have been otherwise. The table below shows a brief comparison of traditional dial-up and broadband services. Dial-up Broadband How is broadband access different from the network I use at work? Although your ISP is responsible for maintaining the services they provide to you, you probably won't have dedicated staff on hand to manage and operate your home network. You are ultimately responsible for your own computers. As a result, it is up to you to take reasonable precautions to secure your computers from accidental or intentional misuse. What is a protocol? What is IP? An overview of TCP/IP can be found in the TCP/IP Frequently Asked Questions (FAQ) at http://www.faqs.org/faqs/internet/tcp-ip/tcp-ip-faq/part1/ and http://www.faqs.org/faqs/internet/tcp-ip/tcp-ip-faq/part2/ What is an IP address? If you need to make a telephone call but you only know the person's name, you can look them up in the telephone directory (or call directory services) to get their telephone number. On the Internet, that directory is called the Domain Name System, or DNS for short. If you know the name of a server, say www.cert.org, and you type this into your web browser, your computer will then go ask its DNS server what the numeric IP address is that is associated with that name. Every computer on the Internet has an IP address associated with it that uniquely identifies it. However, that address may change over time, especially if the computer is dialing into an Internet Service Provider (ISP) What are static and dynamic addressing? Dynamic IP addressing allows the ISP to efficiently utilize their address space. Using dynamic IP addressing, the IP addresses of individual user computers may change over time. If a dynamic address is not in use, it can be automatically reassigned to another computer as needed. What is NAT? Using NAT masquerading, one or more devices on a LAN can be made to appear as a single IP address to the outside Internet. This allows for multiple computers in a home network to use a single cable modem or DSL connection without requiring the ISP to provide more than one IP address to the user. Using this method, the ISP-assigned IP address can be either static or dynamic. Most network firewalls support NAT masquerading. What are TCP and UDP Ports? In the same way that a telephone number or physical mail box might be associated with more than one person, a computer might have multiple applications (e.g. email, file services, web services) running on the same IP address. Ports allow a computer to differentiate services such as email data from web data. A port is simply a number associated with each application that uniquely identifies that service on that computer. Both TCP and UDP use ports to identify services. Some common port numbers are 80 for web (HTTP), 25 for email (SMTP), and 53 for Domain Name System (DNS). What is a firewall? Software firewall - specialized software running on an individual computer, or Network firewall - a dedicated device designed to protect one or more computers. Both types of firewall allow the user to define access policies for inbound connections to the computers they are protecting. Many also provide the ability to control what services (ports) the protected computers are able to access on the Internet (outbound access). Most firewalls intended for home use come with pre-configured security policies from which the user chooses, and some allow the user to customize these policies for their specific needs. More information on firewalls can be found in the Additional resources section of this document. What does antivirus software do? New viruses are discovered daily. The effectiveness of antivirus software is dependent on having the latest virus profiles installed on your computer so that it can look for recently discovered viruses. It is important to keep these profiles up to date. More information about viruses and antivirus software can be found on the CERT Computer Virus Resource page http://www.cert.org/other_sources/viruses.html Computer security risks to home users What is at risk? Confidentiality - information should be available only to those who rightfully have access to it Integrity -- information should be modified only by those who are authorized to do so Availability -- information should be accessible to those who need it when they need it These concepts apply to home Internet users just as much as they would to any corporate or government network. You probably wouldn't let a stranger look through your important documents. In the same way, you may want to keep the tasks you perform on your computer confidential, whether it's tracking your investments or sending email messages to family and friends. Also, you should have some assurance that the information you enter into your computer remains intact and is available when you need it. Some security risks arise from the possibility of intentional misuse of your computer by intruders via the Internet. Others are risks that you would face even if you weren't connected to the Internet (e.g. hard disk failures, theft, power outages). The bad news is that you probably cannot plan for every possible risk. The good news is that you can take some simple steps to reduce the chance that you'll be affected by the most common threats -- and some of those steps help with both the intentional and accidental risks you're likely to face. Before we get to what you can do to protect your computer or home network, let's take a closer look at some of these risks. Intentional misuse of your computer Trojan horse programs http://www.cert.org/advisories/CA-1999-02.html Back door and remote administration programs http://www.cert.org/vul_notes/VN-98.07.backorifice.html Denial of service http://www.cert.org/advisories/CA-2000-01.html It is important to note that in addition to being the target of a DoS attack, it is possible for your computer to be used as a participant in a denial-of-service attack on another system. Being an intermediary for another attack Unprotected Windows shares Another threat includes malicious and destructive code, such as viruses or worms, which leverage unprotected Windows networking shares to propagate. One such example is the 911 worm described in http://www.cert.org/incident_notes/IN-2000-03.html There is great potential for the emergence of other intruder tools that leverage unprotected Windows networking shares on a widespread basis. more... For complete article please visit: http://ramis.aspfreeserver.com/Home_Network_Security.asp
MORE RESOURCES: Waltz and staff used Gmail for government communications, officials say The Washington Post MAD Security achieves CMMC Level 2 Certification, setting standard for cybersecurity and compliance excellence Industrial Cyber Adva Network Security leads DE-QOR project to demo modular, high-performance QKD encryption Morningstar Fight at maximum security unit precedes tour by state’s prison work group - South Dakota Searchlight Fight at maximum security unit precedes tour by state’s prison work group South Dakota Searchlight Another security layer: BCSC proposes adding high school school security officers, and a school resource officer The Republic News What is social security 2025 payment schedule? What we know about SSA, SSI payments The News Journal White House suggests national security adviser Mike Waltz received work-related emails on his personal Gmail account New York Post Alaska Capitol will get airport-style security checkpoint, legislative panel orders Anchorage Daily News New WALLIX Web Session Manager elevates web application security and compliance standards Industrial Cyber EU analysis highlights space capabilities, lists scenarios for space security by 2050 Industrial Cyber Armenia refuses to finance Russian-led CSTO security alliance budget The Kyiv Independent Security Briefs The Rider News Fortress Government Solutions receives impact Level 6 security accreditation from US Navy Industrial Cyber Forget Signal. National Security Adviser Waltz now accused of using Gmail for work - theregister.com Commission presents a European internal security strategy European Commission Restaurant owner hires security guards after quadruple shooting; residents wonder if it is enough WBAL-TV Mobile police installing new security cameras at city parks, following shootout at Langan Park fox10tv.com Native Community Protests MPLS Security Company Who Beat, Maced, and Cuffed Indigenous Man Unicorn Riot Lawmatics Achieves SOC 2 & HIPAA Compliance, Reinforcing Commitment to Data Security and Privacy LawSites Your smart home may not be as secure as you think Help Net Security How Mobile-Integrated Security Technology is Changing Campus Safety Campus Safety Magazine Waltz and staff reportedly used Gmail for official U.S. government business, raising security issues Mashable MPD: Driver of security truck issued several traffic citations after hitting pedestrian along S. Parkway East Action News 5 Mike Waltz Faces Another Embarrassing Data Security Failure The Daily Beast Pasadena school security officer accused of duct-taping 11-year-old girl's mouth shut for 'talking too much' ABC7 Los Angeles Balancing data protection and clinical usability in healthcare Help Net Security SCOTUS examines court’s role in national security Courthouse News Service Breaking the Cone of Silence: The Jigsaw Puzzle of Operational Security Security Clearance Jobs City to receive $94K in Homeland Security grant funding Oil City News Does AI leave security teams struggling? TechRadar Security officer made Pasadena middle schooler duct-tape her own mouth shut, father says Los Angeles Times Women in Security: Tia Eskandari, Senior Director, Allied Universal Security Sales & Integration Could drones replace school security guards? FOX 7 Austin Northwest Dallas security guard fatally shoots man outside motel FOX 4 News Dallas-Fort Worth Value per Security Business Wire Blocking 7-Eleven deal on security grounds would hurt Japan's image, head of state-backed fund says Reuters Pasadena school security guard fired after allegations she forced student to duct tape mouth Pasadena Star News ReliaQuest Closes $500M Round to Boost Agentic AI Security BankInfoSecurity Oracle plays coy on reported Cloud, Health security breaches theregister.com "Credible Threat" to 2025 Chincoteague Pony Swim Prompts New Security Policies Chesapeake Bay Magazine South Korea’s acting president urges calm, tighter security ahead of impeachment ruling The Mighty 790 KFGO Israel’s National Security Council Warns of Increased Threats to Jews Abroad Ahead of Passover Algemeiner.com Akron-Canton Airport has new security measure: K9 Luna Cleveland 19 News BitLyft Gives Back to the Information Security Community GlobeNewswire |
![]() |
![]() |
![]() |
RELATED ARTICLES
Email Scams - Ten Simple Steps To Avoiding Them According to the Anti-Phishing Working Group (APWG) email scams also known as phishing attacks claim more than 2,000 victims each day from more than 75 million phishing emails that are sent each day. The APWG also claims that these email scams steal close to $1 billion a year from its victims. Corporate Security for Your Home Business The words Corporate Security may conjure up images of a group of techies working in a wire-filled basement room of Microsoft or HP, combating hackers and terrorists online using words like algorithm and encryption. If you own your own business, do not allow yourself to think that security is only for big corporations. Cybercriminals Trick: Targeted Trojan-Containing Emails Threats we ordinary Web users face online leave us no choice but learn. Haven't you noticed how many new things you learned lately? We are much better informed about malicious programs than just a year ago. How to Prevent Online Identity Theft Identity theft rates one of the fastest growing crimes in mAmerica today and the Internet can make it even easier for some criminals to take your good name and drag it through the mud.Identity theft involves criminals stealing your personal information such as credit card numbers, social security numbers and other information, usually to buy things on credit or to empty out your bank accounts. Whats All This I Hear About Firewalls? At this point, if you've got the whole "turning the computer on" thing down; you are ready to learn about firewalls. Whether you use your computer for business or pleasure, it is important to have a firewall. A New Low A new variation of the Nigerian Scam themeThe scam artists are employing the Nigerian Scam to fleece unwary sellers who advertise pets for sale.This is particularly despicable because not only are people losing their money but dogs are being abandoned in freight terminals or being killed to get rid of them. Instant Messaging - Expressway for Identity Theft, Trojan Horses, Viruses, and Worms Never before with Instant Messaging (IM) has a more vital warning been needed for current and potential IM buddies who chat on line.John Sakoda of IMlogic CTO and Vice President of Products stated that,"IM viruses and worms are growing exponentially. Viruses and Worms: The Problems and Their Solutions History and BackgroundThe virus was one of the first ever threats to computer security. It brought a whole new fear upon computer users. Online Shopping: 10 Tips For Safe Online Shopping Have you ever bought a product or service from the internet?Yes? Me too. You're not alone?Some of the reasons why most people are shopping online are: they can buy anything at anytime because Internet shopping is available 24 hours, all the time. How Did This Happen to Me? Top 10 Ways to Get Spyware or Viruses on Your Computer If you use the internet, you have probably been infected with a virus, trojan or spyware. According to the SANS Internet Storm Center, the average unprotected PC is infected within 20 minutes of normal internet usage. How To Give Away Your Personal Information Identity Theft and Your Personal Information--------------------------------------------Identity theft is apparently the "in thing" these days. By media accounts, hackers and evildoers lurk everywhere trying to steal your personal information. Why you Must Secure your Digital Product and Thank You Web Page A couple of years back, I paid my dues the 'hard way'.My web site was up and running, the sales letter had been 'crafted' with the most influential marketing techniques and the profits had been consistently coming-in, until. How To Cover Your Tracks On The Internet Every single time you access a website, you leave tracks. Tracks that others can access. Reclaim Your PC from the Internet Spies Viruses are, however, not the only malicious software programs out there. The newest addition to the evil software family is the so called Spywares and a good anti-virus program or firewall is not enough to safeguard against these clever programs. Are You Surfing Safe? Ok, you've got a computer, and you get online. You surf your favorite sites, Sports, Shopping, Cowchip Tossing Blogs, and so on. SPYWARE - Whos Watching Who? I am in the midst of Oscar Wilde's The Picture of Dorian Gray. "The basis of optimism is sheer terror. Adware and Spyware: The Problems and Their Solutions The Threat10 years ago you could probably have run no Internet security applications and still have come out after a browse of the Internet with a virus and malware free computer, but this situation is no longer apparent. Several years ago, before I knew of the dangers of the Internet, I had absolutely no spyware or adware protection. Anti-Spyware Protection: Behind How-To Tips There is no doubt that "how-to articles" have become a separate genre. One can find such an article about almost anything; there are even some entitled "How to Write a How-To Article". Types Of Computer Infections Computer infections can be broken up into 4 main categories which are explained in detail below:VirusesComputer Viruses are small pieces of software that attach themselves to real programs. An example would be a virus that attaches itself onto windows explorer. Wells Fargo Report Phishing Scam First off I should explain what phishing is. Phishing is basically the act of tricking a victim into divulging information. ![]() |
home | site map |
© 2006 |