Login
Register as
Teacher
/
Learner
Forgotten your password
Cambridge GCSE Computing Online
Home
About Us
FAQs
System security
System security
Introduction
33. Security measures
Security measures: Part A
Security measures: Test A
Security measures: Part B
Security measures: Test B
Security measures: Part C
Security measures: Worksheet
34. Network policies
Network policies: Part A
Network policies: Test A
Network policies: Part B
Network policies: Test B
Network policies: Activity
Network policies: Worksheet 1
Network policies: Worksheet 2
System security overview
Overview
Introduction
System security
←
Restart this test
Computer science has brought about huge changes to people's lives, most of them beneficial, but it has also introduced new opportunities for the worst section of humanity, criminals. They have used the technology to devise new ways of exploiting and stealing from the rest of us.
Often the criminals employ old methods with the new technology and use ‘con tricks' to find out our personal information, such as login names and passwords, which they can then use. These methods include phishing, blagging and shouldering, and are referred to as
social engineering
.
Others use software called
malware
to gain unauthorised access to our computers. They may then disrupt its functioning or gather information without our knowledge. Obviously, a large corporate network is a more lucrative target than an individual user's computer, and criminals use techniques such as
data interception
,
SQL injection
and
zero-day
attacks to gain access in order to find, use and steal confidential information. They may also launch
denial of service
attacks where an organisation's servers are flooded with requests and crash.
Organisations need to identify vulnerabilities in their networks by constantly carrying out
penetration tests
, where they take the role of the hackers trying to break into the systems. They can then rectify any potential weaknesses.
Computer science hasn't caused this increase in criminality; it has merely provided new opportunities and areas in which criminals can operate. And just as we wouldn't think of going out leaving all of our doors and windows open with a large sign saying ‘Come in and help yourselves to anything you want', we shouldn't leave our computers unprotected, especially when connected to the internet.
Hardware and software can provide defence solutions, but the weakest link in security is always the
people
using the technology; organisations need strict
network policies
that all users have to abide by.
How often do you change your password and check its strength? Encrypt messages? Check your firewall? Enter your credit card details without checking a site's security certificate? Upload personal information to social networking sites and download data from unknown providers?
« Previous
Next »