COMPUTER SECURITY - PART 2



COMPUTER SECURITY - PART 2

To understand more about the Computer Security, we have to go deep in other areas and evaluate and consider the RING OF SECURITY AND COMFORT. What does this mean?


Think of yourself and analyze everything around you, now think what are the security levels which surround you, analyze what are your strengths and weaknesses and what weaknesses or vulnerabilities when you are attack. This analysis is beyond what you think and see in our daily basis, we consider this is by done ok. What I mean is:

Now, in a technological way… we can switch to computers, phones, tablets and others and review the following points:


SYSTEMS AT RISK
Computer security is critical in almost any industry which uses computers. Currently, most electronic devices such as computers, laptops and cellphones come with built in firewall security software, but despite this, computers are not 100 percent accurate and dependable to protect our data.

There are many different ways of hacking into computers. It can be done through a network system, clicking into unknown links, connecting to unfamiliar Wi-Fi, downloading software and files from unsafe sites, power consumption, electromagnetic radiation waves, and many more.

However, computers can be protected through well-built software and hardware. By having strong internal interactions of properties, software complexity can prevent software crash and security failure.


ELECTRONIC MONEY ON SHOPPING WEBSITES
Web sites and apps that accept or store credit card numbers, brokerage accounts, and bank account information are prominent hacking targets, because of the potential for immediate financial gain from transferring money, making purchases, or selling the information on the black market. In-store payment systems and ATMs have also been tampered with in order to gather customer account data and PINs.


CONSUMER DEVICES
Desktop computers and laptops are commonly infected with malware either to gather passwords or financial account information. Smart phones, tablet computers, smart watches, and other mobile devices such as Quantified Self devices like activity trackers have also become targets and many of these have sensors such as cameras, microphones, GPS receivers, compasses, and accelerometers which could be exploited, and may collect personal information. WiFi, Bluetooth, and cell phone networks on any of these devices could be used as attack vectors, and sensors might be remotely activated after a successful breach.

 
LARGE COMPANIES
Large corporations are common targets. In many cases this is aimed at financial gain through identity theft and involves data breaches such as the loss of millions of clients' credit card details by Home Depot, Staples, and Target Corporation. Medical records have been targeted for use in general identify theft, health insurance fraud, and impersonating patients to obtain prescription drugs for recreational purposes or resale.


GOVERNMENT
Government and military computer systems are commonly attacked by activists and foreign powers. Local and regional government infrastructure such as traffic light controls, police and intelligence agency communications, personnel records, student records, and financial systems are also potential targets as they are now all largely computerized. Passports and government ID cards that control access to facilities which use RFID can be vulnerable to cloning.


INTERNET OF THINGS AND PHYSICAL VULNERABILITIES
The Internet of Things (IoT) is the network of physical objects such as devices, vehicles, and buildings that are embedded with electronics, software, sensors, and network connectivity that enables them to collect and exchange data - and concerns have been raised that this is being developed without appropriate consideration of the security challenges involved.

In particular, as the Internet of Things spreads widely, cyber-attacks are likely to become an increasingly physical (rather than simply virtual) threat. If a front door's lock is connected to the Internet, and can be locked/unlocked from a phone, then a criminal could enter the home at the press of a button from a stolen or hacked phone. 




Comments

Popular posts from this blog

REASONS TO REPLACE YOUR COMPUTER FAN AND HEATSINK

LET’S TALK ABOUT PC AUDIO SPEAKERS

LET’S TALK ABOUT - NETWORK FORENSICS