Security Part 2 Flashcards
Physical Access Restriction ?
Security Biometrics : It’s Identification of humans by their unique traits
Passwords ?
Most common tool used to restrict access to computers like
Effective Passwords:
Not real words and Changed frequently
Access Privileges ?
It’s an access Control Software
Doesn’t need to treat all users identically
Example : At least one of the
accounts on a PC must be administrator
which has additional privileges:
Permission to install additional software
Change system settings
Firewalls ?
Protect from hackers
It filters information between a private system
and the rest of the internet
It could be either : Software program , Hardware device
Encryption ?
Scrambling transmitted messages to secure them using a secret code called Key
Reverse process to retrieve original message is called Decryption
Protection and prevention ?
Anti- Virus Software :
Protect computer/files from harm
Detect viruses and delete them
Run scheduled scans in the background
Audit Control Software ?
It’s monitoring and recording user’s computer
transactions
( tracing and identifying suspicious computer activity)
Backups and other precautions ?
Uninterrupted Power Supply (UPS) :
It Protects data loss due to Power failure
Surge Protector :
It Shields electronic equipment from
dangerous power spikes
Backup ?
Backups are used to replace originals
Best data recovery insurance is Regular Backups
Backup storage :
Online in the cloud : remote storage
Off-site: hard drives or flash drives stored in remote locations
Backup drive in laptops, external hard drives, network storage
Types of Backups ?
Incremental: only new files or modified files
Happens more or less continuously
Example : Hourly, Daily
Bootable: Entire system backup
Makes a complete duplicate of a disk in case of a crash Example : Weekly or after installing new software
Safe Computing ?
Share with care
Handle shareware and freeware with care
Don’t pirate software
Disinfect regularly
Take your passwords
seriously
Security and Privacy ?
measures prevent crime but they can also threaten privacy
like :
Smart Badges :
broadcast identification codes
A badge-location database stores data about
the location of the badge (or person)
Instead of paging the entire hospital, an
operator could route the call
Security and Reliability ?
Software Bugs : which can cause more damage than viruses
It is impossible to eliminate all bugs
The bigger the system the bigger the problem
Y2K Bug : For decades only two digits were
used for year; e.g. (89 to 1989)
But in 2000 it would become 00 causing calculation errors and
More than 100 billion dollars spent to avert the disaster
UAE Cyber crime Law ?
Law No 5 of 2012
Any form of misuse of a computer/smart device or an electronic network/system
Computers At War ?
Smart weapons :
Missiles that use computerized guidance
systems to locate their targets
Autonomous system :
Complex system that can assume almost complete responsibility for a task without
human input