Verified Document

Security Measures Course Name, Course Number, & Essay

¶ … Security measures You just received a brand new computer for your home environment. It comes with the latest Operating System. You also have an Internet Service Provider where you can easily use the existing network to connect to the Internet and to perform some online banking. Describe the steps you plan to go through to ensure this system remains as secure as possible. Be sure to discuss the details of firewall settings you plan to implement within your operating system, browser privacy settings, and recommended software (e.g., Anti-virus and others) you will install. Also, describe your password strength policy you plan to adopt, and what you envision to do to ensure your online banking site is encrypted and using the proper certificates. Discussion of operating system patches and application updates should also be included. As you discuss these steps, be sure to justify your decisions bringing in possible issues if these steps are not followed. You can discuss this for a specific type of computer (e.g. MAC or PC) to make the scenario more appropriate for your environment.

Answer:

There are simple steps that one can take to make the computer safer. Any computer connected to the network is vulnerable to attack, but by following the steps below I would minimize security risk associated with using internet. They describe the threats of not following proper security measures and what one can do to defend against them:

Enable Firewall Protection:

A firewall is software or hardware that checks information coming from the Internet or a network and then either turns it away or allows it to pass through to your computer, depending on the firewall settings. In this way, a firewall can help prevent hackers and malicious software from gaining access to the computer. Mac OS X includes a firewall known as Advanced Firewall Settings (10.5). The fire logging option would keep track of all connections to the Mac and allow me to see what machines tried to connect and which ones were denied while Stealth Mode will hide the fact that the machine even exists from unauthorized machines

Use virus protection:

If the computer is connected to the Internet a person share files with anyone and thus needs anti-virus software. One common function of this malware is to record keys that are typed on the computer and then forward collected information to central locations for analysis and distribution. This recorded information may include passwords and even credit card information. Viruses, worms, and Trojan horses are also programs created by hackers that use the Internet to infect vulnerable computers. Viruses and worms can replicate themselves from computer to computer, while Trojan horses enter a computer by hiding inside an apparently legitimate program, such as a screen saver. Destructive viruses, worms, and Trojan horses can erase information from the hard disk or completely disable the computer. Others don't cause direct damage, but worsen the computer's performance and stability.

Macintosh Anti-Virus Software such as ClamXav and Sophos Anti-Virus for Mac Home Edition are available that would scan email and other files on the computer for viruses, worms, and Trojan horses. If one is found, the antivirus program either quarantines (isolates) it or deletes it entirely before it damages the computer and files. With malware writers taking advantage of any potential security hole, it's just as important for Mac users such as me to keep up-to-date with patches as anyone else. The fact that these patches exist at all may be seen as proof that the platform is far from air-tight.

Use spyware protection

"Spyware" is anything that hijacks personal information and shares it with someone else. Spyware can gather and send information including what Web sites one visits, email addresses and even passwords and credit card numbers. It also uses memory and system resources that can lead to computer crashes and general system instability. Dealing with spyware and its effects can be equal to that of dealing with viruses and worms. The fix for such issues can be problematic and painstaking. The anti-spyware for MAC is MacScan that I would install. This Anti-spyware software works by periodically scanning the computer for spyware programs, and giving me the opportunity to remove any harmful surveillance software found on the computer.

Updating the Operating System:

As flaws are found in the computer's operating system, they are patched through system updates. All operating systems require updates to repair security flaws that are found after the software was originally released. Automatic Macintosh Update through OS X is available...

To prevent hackers from compromising my accounts, the password would need to be as long and complex as possible. Multiple character sets would be used (letters, numbers and symbols) and common words and phrases would be avoided. They would include both upper and lower case letter. Passwords would not be repeated from one site to another, and passwords would be changed regularly, especially for highly sensitive logins such as online banking.
Ensuring that the online banking website is secure:

A secure connection is an encrypted exchange of information between the website that I am visiting and me. Encryption is provided through a document the website provides called a certificate. When one sends information to the website, it is encrypted the computer and decrypted at the website. Under normal circumstances, the information cannot be read or tampered with while it is being sent, but it's possible that someone might find a way to crack the encryption. The certificate that is used to encrypt the connection also contains information about the identity of the website owner or organization. This would be viewed by me to ensure the connection is secure and to verify the website's identity. Both secure (HTTPS/SSL) and non-secure (HTTP) web server connections might be displayed on the website. Some malware might try to route the request for a bank website to a malicious one. The security certificate of the webpage I am visiting would always be checked. Even if the connection is SSL secured (https:// / / ) and the site presents a security certificate, I will still verify the issuer, the owner and the expiration date to ensure it belongs to a bank.

When I will visit a website that uses a secure connection, the color of the Security Status bar will tell whether the certificate is valid or not, and it displays the level of validation that was performed by the certifying organization.

Phishing, by far the most common vector of attack, is often an email, text message or even call, that, through a technique called "social engineering" which fools one into believing that the bank contacted us. Social engineering is art of manipulating persons in order to bypass security measures and tools. The purpose is to obtain confidential information from users through phone, e-mail, snail mail or direct contact and secondly use these data to gain illegal access. In order to protect myself I would never click on links in emails pertaining to be from banks and other financial institutions. Even if I believe the message might be from a trusted source, I would go directly to the bank website by typing the web address or call the bank directly.

Question: Your son, who just turned 13, wants to join Facebook and post his picture and contact information on the site. Assuming, you are willing to allow him to have a Facebook account, describe what types of guidelines you would discuss with him to ensure his privacy and security are protected. Be sure to justify your decisions by describing possible issues if your guidelines are not followed.

Answer:

ID fraudsters target Facebook and other social networking sites to harvest information about people. I would recommend my son to set the Facebook privacy options in a manner such that one is protected against online identity theft.

I would present the following guideline on how to set more secure levels of privacy which would reduce the chance of becoming a victim of online identity theft.

Why proper privacy management on Facebook is important?

Right now, 350 million people are using Facebook, and as more and more people start to use the social networking portal, more and more criminals will use it as a valuable source of profit and information. Criminals are attracted to large groups, and social networking is a gold mine for infection vectors, if the criminal wants to spread Malware, or information gathering, if the criminal wants to buy and sell information.

Facebook has seen Malware attacks, which spread via malicious links or applications, Phishing scams, which again spread via applications and posted links, as well as common robbery, where people are tricked into sending money to someone pretending to be a friend. Facebook has built-in privacy settings. These are designed to help protect personal information…

Sources used in this document:
References:

Increasing Your Facebook Privacy and Security By Dave Taylor onSeptember 16, 2011

Safe Computing provided by the Office of Information Technology University of California, Irvine Last Updated: January 28, 2011
Cite this Document:
Copy Bibliography Citation

Related Documents

Female Workforce in Australia. The
Words: 2438 Length: 9 Document Type: Term Paper

As we take a broader view of the Australian employment landscape, a very different picture emerges. The inaugural census of women in business (released in 2002) surveyed the top 152 companies listed on the Australian Stock Exchange and reported that women held 8.4% of executive management positions, 52.6% of companies had no women executive managers, only 17.8% of companies have two or more women executive managers, and women held

Aloud or in Writing, Making
Words: 17261 Length: 55 Document Type: Thesis

Companies such as XYZ Widget Corporation are well situated to take advantage of burgeoning markets in developing nations, particularly in Asia and Africa. 2. XYZ can grow its business by expanding its operations to certain developing nations in ways that profit the company as well as the impoverished regions that are involved, particularly when marketing efforts are coordinated with nongovernmental organizations operating in the region. 3. Several constraints and challenges must

Direct to Consumer Advertising History of Drug
Words: 16271 Length: 59 Document Type: Term Paper

Direct to Consumer Advertising HISTORY OF DRUG ADVERTISING THE DTC ADVERTISING PHENOMENON CREATING DEMAND DECEPTIVE ADVERTISING - A WOLF IN SHEEP'S CLOTHING CAUSE OF DEATH PROFIT UTILIZATION, PRICING, AND DEMOGRAPHICS LEGISLATION, POLITICS AND PATENTS LEGISLATIVE INITIATIVES REGARDING DTC RECALLED and/or DEADLY DRUGS In order to provide the most efficient method of evaluation, the study will utilize existing stores of qualitative and quantitative data from reliable sources, such as U.S. Government statistical references, University studies, and the studies and publications of non-profit

Small Computer Systems Proposed Research
Words: 4808 Length: 15 Document Type: Term Paper

According to Paul B. Mckimmy (2003), "The first consideration of wireless technology is bandwidth. 802.11b (one of four existing wireless Ethernet standards) is currently the most available and affordable specification. It allows a maximum of 11 megabits per second (Mbps)" (p. 111); the author adds that wired Ethernet LANs are typically 10 or 100 Mbps. In 1997, when the IEEE 802.11 standard was first ratified, wireless LANs were incompatible and

MP3 Players Industry Brief History
Words: 5567 Length: 13 Document Type: Term Paper

The initial MP3 founders backed by the open source model coded the MP3 software that speeded up the recognition of the MP3 audio format. (Behind the Files: History of MP3) at the time of writing the code for MP3 format, an array of compression intensities can be programmed. To take an example, an MP3 made with 128 Kbit compression intensity will have enhanced sound reproduction quality and bigger file

Wireless Broadband Technology
Words: 20344 Length: 50 Document Type: Term Paper

Wireless Broadband Technology Overview of Wireless technology Presently it is quite evident to come across functioning of a sort of wireless technology in the form of mobile phone, a Palm pilot, a smart phone etc. With the inception of fast connectivity in the sphere of commerce it is customary and useful to operate from central locations communicating with the remote branches, conducting conferences in remote places, discussing with every body at every

Sign Up for Unlimited Study Help

Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.

Get Started Now