Introduction
Computer use in the contemporary world has become widespread. Computers have first penetrated into they society due to their efficiency in terms of data management storage and accuracy .Internet on the other has made the use of computers even more fascinating .Organizations and individuals are using computers and the internet to connect with their clients and other people around the globe. Geographical distances have been greatly shrunk by the use of internet .Social platforms such as Facebook, twitter and Skype have extremely made communication very easy. However, not every good idea lacks enemies. As specialists are working around the clock to improve computers, there are other ill-motive fellows who are burning the mid night oil to compromise the efficiency and reliability of computer. Hackers, identity thieves and scammers have becoming the greatest threat to the use of internet and computers. As such, measures need to be put in place in order to protect systems from possible attack by viruses and unauthorized retrieval of data.
Scenario 1
a)
Setting up a firewall is the most basic yet the most important aspect of the computer security mechanisms. Windows operating system do automatically install the firewall software automatically. I9t is the duty of the user to setup the firewall such that it serves the best security support requirements. The most important aspect of the firewall, is to monitor and filter the traffic that into and out of your network. The most basic rule I will apply for my new computer system is to activate the ‘deny-all’ feature. This rule limits and filters all un-allowed traffic on the network from gaining access to your computer (Lehtinen 2006). The purpose is to ensure that anonymous networks that are characteristics of insecure networks are completely locked out. Only trusted networks will therefore be able to gain access into my computer. In this state, the firewall will always notify me when a new network requires access into my computer. I will possess the exclusive rights to allow or deny.
Once the firewall I will then update the windows operating system and all other running programs that require user controlled or automatic updates. Since the firewall is already activated, there will be no risk of updating from insecure sites. The updates are important since they ensure that all software installed into your system are not become obsolete with time. Skipping this exercise can sometimes even lender some security features obsolete which would expose the computer system to attackers. Thus, to prevent such a scenario, I run the necessary updates and set the computer system to notify me when new updates are available over the internet so that I can authorize download or installation.
Another important aspect is the installation of recommenced software such as antivirus. I decided to use the Microsoft Security Essentials antivirus as it provides the least challenges in installation, update and general maintenance while ensuring a great deal of security. The Microsoft security Essentials protects the computer from all malware and viruses. Having the antivirus though should not be the reason as to why other security mechanisms are abandoned as it is important to note that one security technique cannot protect the computer system from all risks (Nosworthy 2000).
.
Handling browser privacy settings is another crucial technique. The computer has its default browser settings that allow the use of cookies. I will deactivate this feature while also ensuring that I regularly clear the efficiently manage browsing history so that any system related information is not exposed to easy access by outside parties.. I will set the browser to clear all history at the end of every browsing session. This would ensure that anyone using my computer or gaining access to cannot obtain any personal information that would compromise on the security of data within my computer system. A combination of cookie data, browsing data and any other information that the browser could provide to an outside party can give the attackers a clue of personal information.
1b).
Using strong passwords minimize the overall risk and vulnerability to breach of security. Nonetheless, a strong password does not sufficiently security needs for a system (Bosworth 2002). With means such phishing, wiretapping keystroke logging, dumpster driving, side-channel attacks, shoulder surfing and software vulnerabilities it is important to adopt a password policy which can adequately protect a system from malicious retrieval. In any password policy, there are two key factors to consider
- how many times an attacker can test to find out the correct password
- How easy the hacker/attacker can check the validity of every password entered.
The rate over which a hacker can submit generated passwords to a system is the key security determinant.
For my new computer, I would adopt a password policy that provides my online accounts maximum security. The policy that I will adopt must sufficiently address the following
- The passwords I will use should have at least 8 characters
- The password should not be part of logging in name /user name
- The password should not be the name of family member, pet or friend
- It should have spaces between characters
- Passwords should not be common names.
For my accounts, I will avoid writing down passwords or saving passwords for my accounts with the browser. The above mentioned will be part of my password security policy for both online and non-online accounts. Following those tips, ensure strong password entropy. At last, contacting the ITS support team would be appropriate whenever I feel my passwords are at threat.
For maximum protection of my online bank account, I would prefer using banking services which are backed SSL protocol. Secure Socket Layer (SSL) is in itself a form of encryption that provides secure environment for the information being moved or transferred from my personal computer to the browser (Cook 2011).
Secure Socket Layer utilizes a public key cryptography that’ secures information transmissions through the internet. The beauty of using Social Socket Layer is its ability to certify data transfers. In practice and for certification purposes, the browser relays a message via SSL to the server of the bank. On the other hand, the server sends back a certificate that contains the public key of the bank. The browser therefore authenticates or approves the certificate and affirms that you are dealing with the right server.
- Under SSL, authentication that I am communicating with the appropriate server
- Encryption scuttle data transfer &
- Integrity of data ensures that information exchanged between the bank and me is not altered.
c)
One may not see the importance of patching as long as the computer is working fine. However, failure to patch leads to malware that significantly compromises the security of the applications including the browser. This opens the entire system to vulnerabilities that is a major security and identity threat. Therefore patching softwares is inevitable for security reasons.
Constant application updates is another step towards securing the system. Failure to install updates leads to obsolescence of applications and softwares including anti viruses and other security aspects of a system. Coupled with batching, OS updates are key areas that should not be left out for the overall security of a system (Gollmann 1999)
.
Scenario 2
Guidelines to ensure security and privacy on Facebook
Facebook has over the last few years gone through massive growth and it is currently the most popular social networking site in the world with over 7000000 users. With this enormous number of members, it is only plausible that breaching of personal privacy and security is a common feature. It is therefore crucial for everyone who possesses Facebook account or who hopes to open in the future to be very conversant with the methods of ensuring privacy and security on this global social networking platform. Below is a list of guidelines that I would personally discuss with my 13 year old son who is opening a Facebook account so as to protect his privacy and security. These guidelines are not exclusive to 13 year olds but can be applied to any person of any age who wishes to protect their privacy on the online social platform.
- Choose a very secure password that you are sure nobody is aware of and that cannot be breached. The best option would be to use a combination of numbers, characters and letters. It is also advisable that you use a long password. In addition, you should always choose a password that you are sure you are not likely to forget.
- Ensure that you have restricted the people who can see you post or update
Here, the most advisable option would be the custom setting where you limit the viewership of your updates to let’s say a few friends or family members. If you utilize the public, the status update is not only visible to individuals who are not your friends on Facebook, but it is also visible to entire public “not” on Facebook. This includes search engines which may gain access to your content therefore exposing you to the entire globe. Basically, you have opened what is referred to as a “Pandora’s box” and even if you for instance, if you later change your mind and decide to delete the status update, you can never really be sure or confident that the message is not lurking someplace out there.
- Control your timeline and also the instances where you are tagged
Facebook has recently started providing privacy settings where you can for example preview tagged pictures or status updates before they are posted. However, make sure that you have activated these settings to control the nature of the tagged content that appears on your timeline which may invade you privacy and security.
- Stop friend’s applications from the right of use of your private information.
There are many users of Facebook who are actually not aware that unless privacy settings in the correct manner, the games, websites and applications use buy your “friends” can access your personal information including updates and photos. Therefore make sure that you have critically reviewed the social apps that you will allow to gain access to your private information. If for example you are not comfortable with them posting updates on your behalf, revoke them completely (Gollmann 1999).
.
- Do not post private things on Facebook.
- This in fact the most basic guideline in ensuring personal security and privacy that many people tend to assume. There are a huge number of people out there posting personal stuff on Facebook on a daily basis. By posting personal things on this social networking platform, it is like you are opening a very wide door for people to enter into your private world.
- The final guideline which is also a very basic one is that you should never share your login details or credentials with anyone. These include the login email address, the password and even the phone number that your Facebook account is associated with.
Following these guidelines will not only ensure that your privacy and security on Facebook is guaranteed, but will provide you with an enjoying browsing and social networking experience.
References
Bosworth, S., & Kabay, M. E. (2002). Computer security handbook. New York: John Wiley & Sons.
Cook, D. M., Szewczyk, P., & Sansurooah, K. (2011). Seniors language paradigms: 21st century jargon and the impact on computer security and financial transactions for senior citizens.
Films for the Humanities & Sciences (Firm), Films Media Group, & EBS Trust (Firm) (2005).Computer security. New York, N.Y: Films Media Group.
Gollmann, D. (1999). Computer security. Chichester: Wiley.
Lehtinen, R., Russell, D., & Gangemi, G. T. (2006). Computer security basics - computer security for the 21st century (2. ed.).
Nosworthy, J. D. (2000). Implementing Information Security In The 21st Century Do You Have the Balancing Factors? Computers & Security.
Online Banking Tips to Keep Your Accounts Secure - My Money (usnews.com). (n.d.). Retrieved from http://money.usnews.com/money/blogs/my-money/2013/02/26/online-banking-tips-to-keep-your-accounts-secure
Shim, J. K., Shim, J. K., Qureshi, A. A., & Siegel, J. G. (2000). The international handbook of computer security. Chicago, Ill: Glenlake Pub.
Software Patches & OS Updates | Information Services & Technology. (n.d.). Retrieved from http://ist.mit.edu/security/patches