Skip to main content

Hacking tutorial part-1

Potential Security Threats To Your Computer Systems
A computer system threat is anything that leads to loss or corruption of data or physical damage to the hardware and/or infrastructure. Knowing how to identify security threats is the first step in protecting computer systems. The threats could be intentional, accidental or caused by natural disasters.

In this article, we will introduce you to the common computer system threats and how you can protect systems against them.

What is threat ?
The ISO 27005 defines a threat asa potential cause of an incident that may result in harm of systems and organization. The cause could be physical such as someone stealing a computer that contains vital data. The cause could also be non-physical such as a virus attack. In these tutorial series, we will define a threat as a potential attack from a hacker that can allow them to gain unauthorized access to a computer system.

What are Physical Threats?
A physical threat is a potential cause of an incident that may result in loss or physical damage of the computer systems.

The following list classifies the physical threats into three (3) main categories;

Internal: The threats include fire, unstable power supply, humidity in the rooms housing the hardware etc.
External: These threats include lightening, floods, earthquakes etc.
Human: These threats include theft, vandalism of the infrastructure and/or hardware, disruption, accidental or intentional errors.
To protect computer systems from the above mentioned physical threats, an organization must have physical security control measures.

The following list shows some of the possible measures that can be taken:

Internal: Fire threats could be prevented by the use of automatic fire detectors and extinguishers that do not use water to put out fire. Unstable power supply can be prevented by the use of voltage controllers. An air conditioner can be used to control the humidity in the computer room.
External: Lightening protection systems can be used to protect computer systems against such attacks. Lightening protection systems are not 100% perfect, but to a certain extent, they reduce the chances of lightening causing damage. Housing computer systems in high lands is one of the possible ways of protecting systems against floods.
Humans: Threats such as theft can be prevented by use of locked doors and restricted access to computer rooms.
What are Non-physical threats?
A non-physical threat is a potential cause of an incident that may result in;

Loss or corruption of system data
Disrupt business operations that rely on computer systems
Loss of sensitive information
Illegal monitoring of activities on computer systems
Others
The non-physical threats are also known as logical threats. The following list is the common types of non-physical threats;

Virus
Trojans
Worms
Spyware
Key loggers
Adware
Denial of Service Attacks
Distributed Denial of Service Attacks
Un-authorized access to computer systems resources such as data
Phishing
To protect computer systems from the above mentioned threats, an organization must have logical security measures in place. The following list shows some of the possible measures that can be taken

To protect against viruses, Trojans, worms etc, an organization can use anti-virus software. In additional to the anti-virus software, an organization can also have control measures on the usage of external storage devices and visiting website that are most likely to download unauthorized programs onto the user’s computer.

Unauthorized access to computer system resources can be prevented by the use of authentication methods. The authentication methods can be, in form of user ids and strong passwords, smart cards or biometric etc.

Intrusion-detection/prevention systems can be used to protect against denial of service attacks.There are other measures too that can be put in place to avoid denial of service attacks.

Summary
A threat is any activity that can lead to data loss/corruption through to disruption of normal business operations.
There are physical and non-physical threats
Physical threats cause damage to computer systems hardware and infrastructure. Examples include theft, vandalism through to natural disasters.
Non-physical threats target the software and data on the computer systems.

Comments

Popular posts from this blog

COMPUTER ASSISTED KNEE REPLACEMENT

  COMPUTER ASSISTED KNEE REPLACEMENT What is Knee Replacement Surgery? Knee Replacement is a surgical procedure for replacing the damaged area of the knee joint. A component of metal and plastic is used to replace the damaged area of the knee joint. Through this Knee Replacement Surgery, the patient can relieve pain and disability. Computer Assisted Knee Replacement A computer is utilized to achieve the desired accuracy during a knee replacement surgery .  How does Knee Replacement work? The crucial part of the knee replacement surgery is the proper positioning of the components of the new joint. The surgeon is assisted by the computer to position the components of the new joint accurately, thereby bringing this type of surgery the name  “computer-assisted surgery” . Similar to an autopilot which assists the pilots or a GPRS that aids the driver to reach their destination easily and safely, computer helps the surgeon to achieve the desired accuracy during knee replacement...

FIX THERE IS A PROBLEM PARSING THE PACKAGE ERROR

Android is the most popular Mobile Operating System today. The reason is because of its Versatility, User Friendly and Easy to Use for all Users. There is not Doubt that Most People Prefer Android ahead of other Mobile Operating System. But this Doesn’t Mean you will never Face any Problem or Error while using Android Smartphones. We all like to Install Different apps or Games in our android smartphones but Sometimes while installing you my be Displayed an Error which says “ There is a Problem Parsing the Package ” So if you face this kind of error while Installing any App or Game in your Android smartphone and want to get rid of it, then Do not worry because here in this article i am going to discuss About this error, The Reason and How to Fix it Etc. REASONS OF THERE IS A PROBLEM PARSING THE PACKAGE ERROR The Downloaded .apk file is Currupted or not fully downloaded You might have turned off “Allow installation of apps from Unknown Sources” If the App...

ACL RECONSTRUCTION SURGERY

  Arthroscopic Anatomical ACL Reconstruction During the past decade, the anterior cruciate ligament (ACL) has become a familiar term. The ACL is the main stabilizer of the knee joint during abrupt change in direction. With the increase in sports participation, injury to the ACL has become one of the most common sports injuries. The operative treatment has evolved from open procedures to arthroscopically performed outpatient procedures with early weight bearing. What happens if the ACL is torn? The knee becomes unstable while abruptly changing direction. Many authors have stated that the ACL injury is career ending for the athletes. Ireland calls this a "heart attack of the knee . Why does the ACL fail to heal? Unlike other ligaments about the joint, the ACL passes through the joint and is surrounded by joint fluid. Other ligaments heal by scar formation This fluid is designed to dissolve and prevent blood clotting within the joint Without blood clot, scar tissue does not form. The...