2. Ăngela Aparicio4ÂșA
Definition of computer security:
The protection of computer systems and information from harm, theft,
and unauthorized use. Computer hardware is typically protected by the
same means used to protect other valuable or sensitive equipment,
namely, serial numbers, doors and locks, and alarms. The protection of
information and system access, on the other hand, is achieved through
other tactics, some of them quite complex.
Types of coputer security:
There are essentially two major types of computer security , software and
hardware security ,with a number of other categories within them.
Hardware security:
Hardware security refers to practices regarding how physical devices and
computer hardware are handled and overseen. The physical server main
frames that often house various networks and Internet websites can be
damaged, resulting in loss of data, or they could be physically attacked in
an effort to steal information directly from the system through data
transfer between devices.
Many companies and individuals should also be aware of considerations
regarding different types of computer security and physical theft. As
computer technology improves, memory and data storage devices have
become increasingly smaller. This means that someone can steal a single
computer tower or laptop from a business or a personâs home and
potentially obtain vast amounts of data and information that may be
private. Small data storage devices, such as thumb drives, should also be
protected, as someone may carelessly forget such a device at a public
computer terminal and create a very real opportunity for data loss.
2
3. Software security:
Software security usually consists of server protection and security,
system security from viruses and other malicious software programs, and
data security through theft prevention and safe computer practices.
Hardware security usually consists of physical devices, including server
main frames, computers, and external or portable memory and storage
devices.
Most types of computer security practices or considerations can easily be
viewed as either regarding software or hardware security. Software
security refers to ways in which attacks can be launched on data streams
and software, without physical interaction of different devices or
hardware. One of the most important security measures for many
businesses is network and server security. This usually refers to the ways
in which a business protects and secures its networks and any Internet
services it may offer, including commercial sites and private data storage.
Other security concerns involving software include issues with malicious
programs, such as viruses or spyware. These programs can get onto a
system and remain unseen, causing damage to data, providing intruders
with access to remote systems, and otherwise creating problems for
businesses and private individuals. Data theft is also a serious security
consideration for many companies and individuals, as this can result in
loss of information that can be used for identity theft and the
compromise of corporate secrets or private information.
Malwares:
Malware is a portmanteau, a term combining
"malicious" and "software" to describe a type of
program designed to steal information from or
cause damage to a computer. It includes things
like spyware and adware programs, including
pop-ups and even tracking cookies, which are
used to monitor users' surfing habits without
permission. It also includes more sinister hazards, such as
keyloggers, Trojan horses, worms, and viruses. In simpler terms,
it is any software that is intended by the developer to cause
3
4. harm or exploit people's computers or private records without
consent.
Types of Malwares:
Worms:
Worms spread through computers by exploiting vulnerabilities and can do so
undetected. They do not change the computer or network they pass
through, but can encrypt files ands send e-mails from the host computers
according to PC Magazine. Worm infected computers are commonly used to
send spam and junk e-mail to other users while keeping the hacker's website
hidden. A worm can copy itself and quickly spread over the Internet to
systems that are usable.
Trojans:
A Trojan, also referred to as a Trojan horse, is a form of malware that
disguises itself by appearing to perform a desirable function, but allows
unauthorized computer access instead. Trojans were created to allow
hackers remote access of a user's computer to perform operations like data
theft, software installation and file downloading. According to Symantec,
Trojans are not a self replicating form of malware and can only spread if they
are downloaded from sources like e-mail attachments and program
installations.
Spyware:
This type of malware is used to collect information about users without their
knowledge. Spyware can monitor what websites a user visits and use it for
commercial gain by delivering annoying pop-ups and rerouting web
browsing to advertisement sites. Users are often tricked into installing
Spyware the same way that Trojans are downloaded. Spyware can also add
new toolbars to a web browser and change its home page.
Adware:
Adware is a type of malware that downloads and frequently displays
advertisements onto a computer after infected software is installed. It is
usually bundled and downloaded with software like WeatherBug and Smiley
Central. According to McAfee, adware earns revenue for its vendor and can
4
5. slow down a computer's speed. It does not steal personal information, but is
an annoyance when trying to do simple tasks like surfing the web.
Crimeware:
Crimeware is designed to help hackers steal money from bank accounts,
transfer sensitive data and commit identity theft. The sole purpose of
crimeware is to facilitate cybercrimes through an infected computer.
Crimeware is spread through peer-to-peer file sharing and web application
vulnerabilities. The New York Times reports that this form of computer
malware will use keystroke loggers, bots and a wide range of malicious
software to commit criminal acts.
Anti-malwares:
Anti-malware resources are comprehensive solutions that maintain
computer security and protect sensitive data that is transmitted by
a network or stored on local devices. Anti-malware tools often
include multiple components, including anti-spyware and phishing
tools, as well as antivirus solutions for prominent viruses, which are
isolated and identified by security resources.
Anti-malware tools may employ scanning, strategies, freeware or
licensed tools to detect rootkits, worms, Trojans and other types of
potentially damaging software. Each type of malware resource
carries its own interface and system requirements, which impact
user solutions for a given device or system.
Encryption types:
Wi-Fi Protected Access (WPA) and Wi-Fi Protected Access II
(WPA2) are two security protocols and security certification
programs developed by the Wi-Fi Alliance to secure wireless
computer networks. The Alliance defined these in response to
serious weaknesses researchers had found in the previous system,
WEP (Wired Equivalent Privacy).
5
6. WPA became available in 2003. The Wi-Fi Alliance intended it as an
intermediate measure in anticipation of the availability of the more
secure and complex WPA2. WPA2 became available in 2004 .
Dangers of wifi connections:
If you connect to your Wi-Fi network open, you're exposing your
connection to possible hackers, these hackers can steal passwords for
accounts on social networks, or even your bank account, they can steal
information from your computer,and you can avoid it if you only connect
to secures Wi-Fi.
E-Commerce:
Electronic commerce, commonly known as E-commerce or eCommerce,
is trading in products or services conducted via computer networks such
as the Internet. Electronic commerce draws on technologies such as
mobile commerce, electronic funds transfer, supply chain management,
Internet marketing, online transaction processing, electronic data
interchange , inventory management systems, and automated data
collection systems. Modern electronic commerce typically uses the World
Wide Web at least at one point in the transaction's life-cycle, although it
may encompass a wider range of technologies such as e-mail, mobile
devices, social media, and telephones as well.
Electronic commerce is generally considered to be the sales aspect of e-
business. It also consists of the exchange of data to facilitate the financing
and payment aspects of business transactions. This is an effective and
efficient way of communicating within an organization and one of the
most effective and useful ways of conducting business. It is a Market
entry strategy where the company may or may not have a physical
presence.
E-commerce can be divided into 7 subsections:
-E-tailing or "virtual storefronts" on websites with online catalogs,
sometimes gathered into a "virtual mall"
-Buying or selling on websites and/or online marketplaces
-The gathering and use of demographic data through web contacts and
social media
6
7. -Electronic data interchange, the business-to-business exchange of data
-E-mail and fax and their use as media for reaching prospective and
established customers (for example, with newsletters)
-Business-to-business buying and selling
-The security of business transactions
Service management
Service management is integrated into supply chain
management as the intersection between the actual sales and
the customer. The aim of high performance service
management is to optimize the service-intensive supply chains,
which are usually more complex than the typical finished-goods
supply chain. Most service-intensive supply chains require larger
inventories and tighter integration with field service and third
parties. They also must accommodate inconsistent and
uncertain demand by establishing more advanced information
and product flows. Moreover, all processes must be coordinated
across numerous service locations with large numbers of parts
and multiple levels in the supply chain.
Among typical manufacturers, post-sale services (maintenance,
repair and parts) comprise less than 20 percent of revenue. But
among the most innovative companies in Service, those same
activities often generate more than 50 percent of the profits.
Internet communication:
The Impact of the Internet on Communication
The internet has revolutionized all forms of communication
since the beginning of its existence. The world has now become
âsmaller' or more like a âglobal village', so to speak. The internet
was first used by the U.S military for communications purposes.
The internet, from the communication point of view, has
brought on new developments and techniques to keep in touch
not only for individuals, but for businesses as well. An example
7
8. of how the internet has impacted communication would be an
example of doctors now communicating through live video
feeds via the internet with patients or other doctors to diagnose
patients or to even guide and advise surgeons through
complicated procedures.
8