Linggo, Hulyo 10, 2011

Computer and Internet Security

Security for Today
by Rick Lehtinen, Deborah Russell, and G.T. Gangemi Sr.
Computer Security Basics, 2nd ed. O'Reilly Media, Inc., 2005


The first part of the book -- Computer Security Basics -- introduced what computer security is and its importance and its role in today's society. It also summarized the different threats to computers and information and an overview of the different types of computer security.


It is said that computer security has changed dramatically since the terrorist attacks in 2001 and different forms of threats have arose as well. Network attacks, bugs, viruses and identify theft are only some of the most common computer crimes. These threats have the capability to paralyze both our computers and network systems. In lieu of this, companies have been adapting modern ways of securing  and protecting their data from malicious software and other threats.  


Computer security is built on three pillars, Confidentiality, Integrity and Availability. From these these three pillars sprung other terms that are important to note as well, these are Identification, Authentication, Authorization and Accountability. Today's computer and internet security is highly relevant and the information stored in it places a much higher value. Companies do not think twice anymore in spending time and money in guarding and protecting their information. 


- - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

I learned that there are a lot of ways to protect our data from external threats. It is even easier to imagine. Picture a “glass house”  from which your core data is safely stored and placed strategically inside it. The walls may in a sense guard and protect them by ensuring that only an authorized person has the right of access. We can use other tools to ensure that our data is protected by installing things like biometrics or a much more complicated retina scanner.


I also learned about CERT and its role in lending expertise and spreading techniques on how to better protect our data when threats come about. CERT or Computer Emergency Response Team together with other agencies was put up to answer the demands in support of fighting cyber attacks. For Singapore and other parts of Southeast Asia, we have SingCERT to call on to.


Lastly, I learned that we have a responsibility to computer technologies that we use. We have a responsibility to ensure that if a virus attack or a disk failure happens, we have a backup plan and that includes procedures for backing up our data.


As a computer user, I have the responsibility to be aware of computers in general. Educating myself on how to fix it if it breaks down, knowing how  and when to back up my files to prevent data loss in case something unexpected happens to my computer, making sure that my virus software is up-to-date and periodically update. It is much like taking care of my personal belongings and knowing their value. They do say that prevention is better than cure (Better safe than sorry).





Walang komento:

Mag-post ng isang Komento