COMPUTER SECURITY - PART 2
To understand more about the Computer Security, we have to go deep
in other areas and evaluate and consider the RING OF SECURITY AND COMFORT. What
does this mean?
Think of yourself and analyze everything around
you, now think what are the security levels which surround you, analyze what
are your strengths and weaknesses and what weaknesses or vulnerabilities when
you are attack. This analysis is beyond what you think and see in our daily
basis, we consider this is by done ok. What I mean is:
Now, in a technological way… we can switch to
computers, phones, tablets and others and review the following points:
SYSTEMS AT RISK
Computer security is critical in almost any industry which uses
computers. Currently, most electronic devices such as computers, laptops and
cellphones come with built in firewall security software, but despite this,
computers are not 100 percent accurate and dependable to protect our data.
There are many different ways of hacking into computers. It can be
done through a network system, clicking into unknown links, connecting to
unfamiliar Wi-Fi, downloading software and files from unsafe sites, power
consumption, electromagnetic radiation waves, and many more.
However, computers can be protected through well-built software and
hardware. By having strong internal interactions of properties, software
complexity can prevent software crash and security failure.
ELECTRONIC MONEY ON
SHOPPING WEBSITES
Web sites and apps that accept or store credit card numbers,
brokerage accounts, and bank account information are prominent hacking targets,
because of the potential for immediate financial gain from transferring money,
making purchases, or selling the information on the black market. In-store
payment systems and ATMs have also been tampered with in order to gather
customer account data and PINs.
CONSUMER DEVICES
Desktop computers and laptops are commonly infected with malware
either to gather passwords or financial account information. Smart phones,
tablet computers, smart watches, and other mobile devices such as Quantified
Self devices like activity trackers have also become targets and many of these
have sensors such as cameras, microphones, GPS receivers, compasses, and
accelerometers which could be exploited, and may collect personal information. WiFi,
Bluetooth, and cell phone networks on any of these devices could be used as
attack vectors, and sensors might be remotely activated after a successful
breach.
LARGE COMPANIES
Large corporations are common targets. In many cases this is aimed
at financial gain through identity theft and involves data breaches such as the
loss of millions of clients' credit card details by Home Depot, Staples, and
Target Corporation. Medical records have been targeted for use in general
identify theft, health insurance fraud, and impersonating patients to obtain
prescription drugs for recreational purposes or resale.
GOVERNMENT
Government and military computer systems are commonly attacked by
activists and foreign powers. Local and regional government infrastructure such
as traffic light controls, police and intelligence agency communications, personnel
records, student records, and financial systems are also potential targets as
they are now all largely computerized. Passports and government ID cards that
control access to facilities which use RFID can be vulnerable to cloning.
INTERNET OF THINGS AND
PHYSICAL VULNERABILITIES
The Internet of Things (IoT) is the network of physical objects such
as devices, vehicles, and buildings that are embedded with electronics,
software, sensors, and network connectivity that enables them to collect and
exchange data - and concerns have been raised that this is being developed
without appropriate consideration of the security challenges involved.
In particular, as the Internet of Things spreads widely, cyber-attacks
are likely to become an increasingly physical (rather than simply virtual)
threat. If a front door's lock is connected to the Internet, and can be
locked/unlocked from a phone, then a criminal could enter the home at the press
of a button from a stolen or hacked phone.
Comments
Post a Comment