E Biermann, E Cloete, L.M Venter, Special Features: A comparison of Intrusion Detection systems, Computers and Security, v n.8, p, December. This part of the book provides a basic introduction to computer security, the Unix operating system, and security policy. The chapters in this part are designed to. Computer Security Basics. David Young Cytoclonal Pharmaceutics Inc. The cardinal rule of security is that. No one thing makes a computer secure. Making a.


Author: Prudence Buckridge
Country: Thailand
Language: English
Genre: Education
Published: 18 October 2016
Pages: 327
PDF File Size: 1.65 Mb
ePub File Size: 50.84 Mb
ISBN: 621-7-98336-714-7
Downloads: 54953
Price: Free
Uploader: Prudence Buckridge


Now you can get everything on Safari. To purchase books, visit Amazon or your favorite retailer. See our FAQ or contact customer service: No one loves security, but most peoplemanagers, system administrators and users alikeare starting to feel that they'd better computer security basics it, or at least try to understand it.

Spoofing is when someone configures a third machine to use the network address of one of the trusted hosts to impersonate that machine. Computer security basics the spoofing machine responds faster than the computer security basics trusted host, communications will be carried out with it unnoticed.

Spoofing requires that the infiltrator have physical access to the network in a location that falls close to the target machine in the network topology, which usually means being physically close to the target machine.

Get into the system and cover tracks. Once one of the above techniques is successful in gaining access computer security basics the system, the first order of business is to alter any records that would reveal the presence of an illegal entry to the system administrators.

Try to get superuser access. Just as there are many ways to get into a user account, there are many ways to get into the root level account or get equivalent access to the machine.

Once entry has been gained, that access can be used to intentionally install security breaches so that the hacker can still get back into the system if the original method of entry is cut off.


At this point, the hacker can steal data, destroy information, alter files, use CPU time, lock everyone else out of the system, etc. How to combat illegal entry Here are a list computer security basics ways to make computers more secure and some minimal suggestions for when they should be used.

For systems that are critical to operation, all of these and more may be computer security basics.

Computer Security Basics

Keep doors locked if feasible. Install locks on accessible but attended machines. Install locks and alarms on machines left unattended. This should be done on all computers.

Computer Security Tutorial

Use a surge suppressor. Use an uninterruptable power supply. All PC and Macintosh computers. High volume or critical multiuser machines.

Cyber Security Basics

Continual memory resident virus checking. PCs or Macs used by many people, such as in public labs. When data routinely comes from many sources.

For organizations that can conduct business with limits on the internet services accessible from inside the organization. Where outside access to company data could do significant harm to the business. Having no internet connection or no internal network at computer security basics is done when data is particularly sensitive or reliability is of key importance.

Computer Security Tutorial

Bank record systems and air traffic control systems are some examples. Programs to enforce the use of good passwords. Systems with a moderate to large number of users. Systems which have a large number of users or are a likely target for illegal computer security basics.

Old, unused accounts are just that many more passwords for someone to find out. If it is not feasible to remove old accounts, the passwords can still be deleted.