In today world which information is transferring using cable and satellite, it has become very convenient for us to transfer or send information to the other end of the world. Email message can just be send within seconds but how is the data been transfer? In the other end who is reading the message? Can other people steal the information in the middle of the transfer? Will the message reach the other end? This entire question is concern about Information Security.
What is information security? Information security ensures that digital document which is typically processed by a computer and stored on removable devices such as CD or DVD is well protected, Transmitting Information that transfer over the network such as LAN or the internet is secure.
Information has value and the value of the information come from its characteristics. The three characteristic of information which must be protected are Confidentiality, integrity and availability. Confidentiality refers to the documents or information will only can view by authorized personnel. Integrity ensures that the information is correct and has not been alter by unauthorized person. Availability ensures that data is available for access or download whenever an authorized person needs to retrieve them.
Monday, September 29, 2008
Sunday, September 28, 2008
Is hacking illegal?
Yes, hacking without a permission is illegal. Hacking is a term to define breaking into others people computer network without the knowledge of the owner with or without bad intention.
In the other hand, hacking legally means breaking into computer systems with the permission of the owner. This will be done when an organisation wanted to test their network for vulnerabilities and fix it before a hacker will do it in the same way.In the IT industry this is call the penetration testing.
In the other hand, hacking legally means breaking into computer systems with the permission of the owner. This will be done when an organisation wanted to test their network for vulnerabilities and fix it before a hacker will do it in the same way.In the IT industry this is call the penetration testing.
Saturday, September 20, 2008
how to protect your password?
From the new paper 19 sept 2009
Who hacked my email?
NO. Actually not people hacked your email or may be yes,but the chance is small. Most probabbly iS that your password has been crack, steal or known by people.They probably use your password to gain access to your accounts.To prevent at least follow some of the guideline below:
oDon’t reveal a password to anyone, this include your boss, your superior and the IT administrator.
oDon’t use a password for multiple accounts.
oDon’t share your password with anyone.
oDon’t reveal or hint the format or way that you construct your password.
oDon’t use the remember password feature in of application.
oDon’t write down your password on a sticky note and “ hide” somewhere
oDon’t write your password in any questionnaire.
Email account is always very personal or at work,confidential. So we dont want our privacy to be view by others. Start praticing to use strong and secure password.
Sunday, September 14, 2008
Password
Password is a string of unique characters that you provide usually with a username to get authenticate before accesing a certian place.
However a weak password can be easily crack or guess by people to be use to gain access to your account. so building a strong password is always recommended. A strong password meet ALL of the foloowing:
oContain both lower case and upper case character, (e.g. a, b, c…, A, B, C….)
oContain both numbers and punctuation characters. (e.g. 1, 2, 3…! @ , #, $)
oPassword must be at least 10 characters
However a weak password can be easily crack or guess by people to be use to gain access to your account. so building a strong password is always recommended. A strong password meet ALL of the foloowing:
oContain both lower case and upper case character, (e.g. a, b, c…, A, B, C….)
oContain both numbers and punctuation characters. (e.g. 1, 2, 3…! @ , #, $)
oPassword must be at least 10 characters
Web Browser
A web broswer is an application software that allows users to access and view web pages on the world wide web(WWW).
The most widely use broswer are Internet Explorer(IE), Mozilla, Opera, Netscape and safari.
The most widely use broswer are Internet Explorer(IE), Mozilla, Opera, Netscape and safari.
Saturday, September 13, 2008
Virus
In computer language, virus is a computer program or a piece of code that can manipulate itself without the knowledge of the user. A virus might destroy your data on your HDD, make your computer performance slow and even spread itself to all your email contacts.
Virus can easily spread through email attachment, removeable media such as floppy disk or thumbdrive. virus can also be spread through downloading file on the internet.
The most common way to protect your computer being infected is to install an anti-virus software and update at least twice a week(i personally update everyday)and do not download email attachment if you don't know who is the sender.
Virus can easily spread through email attachment, removeable media such as floppy disk or thumbdrive. virus can also be spread through downloading file on the internet.
The most common way to protect your computer being infected is to install an anti-virus software and update at least twice a week(i personally update everyday)and do not download email attachment if you don't know who is the sender.
Subscribe to:
Posts (Atom)