Security
Secure Passwords
Which is the most secure password?:
United-1
united
United
Un1ted
Un1ted-89
In this case the bottom password is the most secure. It uses a combination of lower case and upper case letters; numbers and symbols.
Having a secure password is the first line of defence in security of your systems.
Security Issues
- Hackers - we all know that hackers try to gain access to your data without your permission. The best way to prevent this is to use firewalls, a secure password and encrypt any data travelling across networks (and over the internet)
- Viruses - these are designed to harm your computer and its data. One way to prevent viruses is to keep your bluetooth switched off when its not in use. Also use a virus checking software or anti-malware software.
- Phishing - phishing emails con people into giving away personal information such as bank details and passwords (usually they say you must respond urgently!). This can then mean they have money taken from accounts as people steal their identity. Below we show you a phishing email and you must be able to recognise the 'tell-tale' signs of a phishing email.
- Cookies - cookies store information about your 'buying' and other web accounts on your computer. They make it easier for someone to gain access to your accounts (for example when the systems 'remember' your passwords!). Learn how to delete cookies using the browser options.
- Unsecured Wireless networks - we have covered this in the networks page, but you must secure your wireless networks with a password and encrypt data travelling over it.
- Physical Threats - this can include theft, fire and accidents. Always keep your computers in a safe place (at work they should always be in a locked room). Backup the data on a regular basis (in a work situation this should be on a daily basis)
- Bluejacking - this is where unwanted messages are sent to 'open' bluetooth connections. The way to prevent this is to keep the bluetooth switched off when it is not in use.
Phishing email
Know how to identify some of the typical characteristics that identify a phishing email. The clip below shows someone describing a Paypal phishing email and how you might be easily caught when you follow the link.
Fraud
Using computers to commit fraud is a problem that is growing at an alarming rate as the as the fraudsters become more elaborate in what they do. There is a law to protect us from fraudsters it is called the 'Computer Misuse Act' (see the page on Ethics and Laws)
Firewalls
What is a firewall?
Biometrics
Biometrics is the identification of humans by their characteristics or traits. Biometrics is used in computer science as a form of identification and access control. Biometrics might involve things like fingerprint recognition; iris scanning even vein scanning (currently in development).
Biometric systems are used in passports and for computer security because they uniquely identify an individual.
But sometimes people do not agree with the way these developments in technology might be being used. Watch this clip:
No comments:
Post a Comment