|
|
System Downtime
Downtime can disrupt your business, customers, and damage your company's reputation. But how do you prevent or minimize downtime? Can a server monitoring service help? To answer these questions, first we need to understand the causes of downtime....
That Darned Old Internet Gateway!
WARNING! WARNING! DANGER! DANGER! This is just how I felt after recent experiences of helping a friend of mine get his new wireless router working. I was talking him through some of the settings on the phone while looking at my router, which is the...
The Metaphors of the Net
I. The Genetic Blueprint
A decade after the invention of the World Wide Web, Tim Berners-Lee is promoting the "Semantic Web". The Internet hitherto is a repository of digital content. It has a rudimentary inventory system and very crude data...
What to look for in an assembled PC
Not too well versed with the hardware jargon but need a computer? For starters, read Ask these 3 questions before you buy a computer. Once you are sure what you need one for, get cracking. Here is a basic guide to get you started. Do note: while...
Which Web Server?
If you've been lurking in the various forums and newsgroups devoted to webmastering, you could hardly fail to notice the heated debate going on at this time. No, it's not which is the best browser. This debate is about web servers. More...
|
|
|
|
|
|
|
|
Security in Today's World
There are many things in life that are worth protecting. Our children, our valuables, our resources and of course, ourselves. Only twenty years ago, if security was mentioned, you were speaking of protecting your home. And you were most likely discussing a security system, monitoring, watchdogs, firearms and cameras.
With the explosion of the personal computer, and the internet’s ease of access to information, security has now taken on additional roles. With over 605 million people online at any given moment worldwide, criminals are no longer bound by geographic location. Today’s cyber criminal can hack from the comfort of his home just by getting online.
There are software programs that do nothing but scan the internet for un-secure ports and open networks so that they can enter into those unprotected machines to access critical information. There are many users who know little about internet security and rely on their ISP to provide it for them.
To look deeper into this topic, let’s examine the qualities that make security both similar and different. With your home, you have a physical area that you can protect with fire and motion sensors, cameras, glass-break detectors and decals strategically placed to deter would-be thieves. For your computer, you protect a virtual space usually containing sensitive information relevant to your personal finances or key identity theft items such as family names and social security numbers. To protect these resources, one must install software (anti-virus, port scanners, Trojan hunting software, firewalls) as one level of protection. You can also add another layer of security through a hardware firewall of connectivity to and from the internet or network.
Both home security and computer security have maintenance costs associated with them. Reliable home security will usually consist of a one-time fee to install the hardware in your home, and then an agreement to have 24-hour monitoring service for a given length of time. Computer security will consist of buying the software and then either a monthly or yearly subscription fee to receive the latest information and protection from internet threats.
One difference between the two are the methods of monitoring. While computer security is only responsive while the computer is active or online, home security monitoring is responsive at all times provided the system is properly armed.
Another distinction is the method of response. In home security, a human will respond by dispatching police, fire or EMS directly to your home or business site. On a computer, the response is when the software vendor becomes aware of the problem, creates a solution, and has an update available for download.
With the
advances of technology, monthly fees for home security monitoring are reasonable for the service they provide. Be warned: not all monitoring companies have the same capabilities when it comes to quick response. That’s one reason why it’s a good idea to make sure that any security company you choose has a UL certification. This can be critical as it indicates that the security company has met stringent standards for management system compliance (such as a back up source of power). The same methodology should apply for a security software provider. Just because they say they’re the best, doesn’t mean that they are. Due diligence is the user’s responsibility. Your information is too valuable to be taken lightly.
Both home security and cyber security are similar to having insurance. You have it, but you hope you never need it. And if you do need it, you want a company or vendor that has a history of excellent customer service.
There are those people who think that having a firearm is all they need for protection. While that may hold true in some form, a firearm won’t let you know if someone is trying to enter your home through the back door while you are sleeping and notify you or the authorities. Another common perception is that a watchdog will alert a homeowner to intrusion, but again, man’s best friend sleeps 10 to 12 hours a day and can’t notify the police.
There are some computer users who claim that they can detect a virus by the email that is sent with some obvious taglines meant for the user to open and infect the machine. Not all viruses are in emails, although that is the most common form. They can also be uploaded to a website, or embedded in Java Applets or Active X controls.
Trojans, which can log all of the users keystrokes and sites visited, are secretly downloaded in the form of free games or free software, and are undetectable by anti-virus software. This is the preferred method of attack by a hacker on a machine. By not altering the performance of a machine (like a virus or worm does), the user blissfully continues to use their machine to make online purchases, and enter sensitive information, thinking they are secure, while the Trojan secretly records all of the information and will simply send all of the user’s information at designated intervals to the hacker.
Many times a decision about security measures for your home or computer is based on budgetary constraints. But always consider what it is that you are protecting and how much you would pay to get back whatever was stolen, lost or destroyed if an unfortunate event occurred in your life.
About the Author
Paul has been involved in network security for over 4 years and is still looking for answers!
|
|
|
|
|
Tom's Hardware |
: Tom's Hardware Guide is the Internet's premiere resource for hardware news and reviews. |
www.tomshardware.com |
  |
HardwareCentral - Your source for in-depth computer hardware info. |
HardwareCentral is the #1 Hardware Information Resource on the 'Net. Featuring over 600 pages of Hardware information, including advice on System ... |
www.hardwarecentral.com |
  |
Apple - Hardware |
Find your favorite Mac, iPod and other Apple accessories. |
www.apple.com |
  |
Ace Hardware |
Nationwide (United States) hardware and home improvement retailer. Includes products, dealer locator and corporate information. |
www.acehardware.com |
  |
Computer hardware - Wikipedia, the free encyclopedia |
The hardware of a computer is infrequently changed, in comparison with software and ... Personal computers, the computer hardware familiar to most people, ... |
en.wikipedia.org |
  |
Hardware - Wikipedia, the free encyclopedia |
Hardware is the general term that is used to describe physical artifacts of a technology. ... In a looser sense, hardware can be major military equipment, ... |
en.wikipedia.org |
  |
Open Directory - Computers: Hardware |
Hardware Central - Computing-centric community providing vital information, support, tools and interaction facilities for power computer users and ... |
dmoz.org |
  |
Microsoft Hardware – Home Page |
Learn about Microsoft mice, keyboards, desktop sets, webcams, media center peripherals, gaming products, fingerprint readers and presentation tools. |
www.microsoft.com |
  |
AnandTech: your source for hardware analysis and news |
Independent hands-on reviews of computer hardware such as motherboards, graphic cards, and CPUs. |
www.anandtech.com |
  |
hardware.com - Routers, switches, firewalls, servers, memory ... |
Supplier of new and refurbished networking hardware and approved and compatible network accessories. Located in the United Kingdom. |
www.hardware.com |
  |
Slashdot: News for nerds, stuff that matters |
From the article: "Although the news caused barely a ripple of reaction in the audience of software and hardware engineers, there are industry analysts who ... |
hardware.slashdot.org |
  |
InformationWeek HardwareTech Center |
Our hardware coverage ranges from mobile computers and PDAs to servers and supercomputers, and the infrastructure issues enterprises deal with every day. ... |
www.informationweek.com |
  |
What is hardware? - A Word Definition From the Webopedia Computer ... |
This page describes the term hardware and lists other pages on the Web where you can find additional information. |
www.webopedia.com |
  |
Google Directory - Computers > Hardware |
Hardware Central - http://www.hardwarecentral.com/ Computing-centric community providing vital information, support, tools and interaction facilities for ... |
www.google.com |
  |
Gifts: Unique Gifts & Gift Ideas at Restoration Hardware |
At Restoration Hardware, you'll explore an exceptional world of high quality unique gifts. Browse our products to find gift ideas & more at Restoration ... |
www.restorationhardware.com |
  |
HwB: The Hardware Book |
HwB provides you with circuits, pinouts, cable/adapter descriptions and other technical information. |
www.hardwarebook.net |
  |
Reg Hardware: Product News and Gadget Reviews from The Register |
More Gadgets Stuff. 5th December 2006 12:09 GMT. Author: Reg Hardware ... 27th November 2006 15:31 GMT. Author: The Hardware Widow ... |
www.reghardware.co.uk |
  |
red hat hardware compatibility lists |
hardware.redhat.com/ - Similar pages |
|
  |
TrueValue.com |
Here's our tip to hang strands of lights with ease. Jeanenne & Jim Tucker Plantation True Value Hardware Richmond, TX ... |
www.truevalue.com |
  |
A complete illustrated Guide to the PC Hardware |
A complete illustrated Guide to the PC Hardware, Logic and Architecture. 500 easy-read articles about the modern PC. Understand the basic architecture of ... |
www.karbosguide.com |
  |
|