This is yet again emphasized the need to return to this very
important subject related to IT and computer systems. and no one I know who do
not have some form of security to him or his property. No matter whether they
live in the 6-digit home or in rented accommodation. The action could range
from a single key to a highly sophisticated alarm and surveillance systems, but
the point is they all have some form of security.
The same should be true of our computer systems. No matter
if your system is connected with national security or stand alone in your
house, if it contains sensitive data for you, you should take steps to protect
it.
In this article I will go through several steps that you can
put into action to ensure that the candidate made life difficult for thieves.
Physical Step
When it comes to IT security world, it is easy to overlook
the obvious. When I was at school one of the 'catch you out' questions like
these:
"If a red house is made of red brick and yellow house
made of yellow bricks, what is a green house made of?"
Logical answer is the only green bricks but the correct
answer is glass. The question is posed in such a way as to lead you to think a
certain way. When it comes to IT, for some reason we think of ways to manage
complex security when some simple practical steps may be all thats needed.
Lock It Away
If you have a notebook make sure that you lock it away when
not in use or away from your desk overnight. Although this may be convenient
for the desktop is still an option. I know at least one major bank that puts
all of its desktop pc into a strong room in the evening. It may be boring, but
very effective.
Bolt It Down
If your computer is the server and then turn it off and
store it may not be an option. Then consider a run down. You can purchase a
safety cage that bolts to the floor and would take too long for a thief right
to cut and steal.
Many of the appropriate server that comes with lockable
front panel, which prevents the computer from being opened, and / or the drive
is removed. Why not take advantage of this simple deterrent?
Monitor Sensitive Systems
If you are a business, then relatively little money is easy
to set up surveillance. All you need is a security camera (low-cost starting
from 200 pounds) is connected to the computer base. This system not only record
events, but also can send images to a computer outside the office or even send
alerts to your mobile phone. You can log into the camera from a remote site
using the Internet, this is very useful if the alarm system goes off and you
want to check out your place soon.
Other Options
Password Protect
You will be amazed at how many systems and sensitive
documents do not have the security password. There are at least four important
things about using a password.
Use strong passwords
A strong password has the following characteristics:
A mixture of lowercase /
Including the number
Includes characters such as @ &%
At least 8 characters.
If your password does not contain the above, then your
system may have security equivalent of a rusty bolt with a few screws loose!
Do not use one password for everything
Change passwords on a regular basis
Some servers can be set to force a password change on a
regular basis every month or whatever time scale you choose. This system can
also force the password can not be reused in many cycles.
Never use a password system is sensitive to the unknown
It is the policy of the sound advice you have any questions.
Break it at your peril. You have been warned. To do so is like leaving a full
set of buttons labeled in a public place. There are several software products
available in the market that keeps a history of logging all keys pressed on the
keyboard. Some even detect a mouse click option. If you must use the password
(perhaps in a life or death situation) on the unknown system to change your
password as soon as you can from a secure system is known.
Write down your password!
Yes, I know many of you will read that twice and wanted to
know if I've lost plot.The advice from any bank or institution never write your
password down anywhere. I actually agree. You should never write your password
in a form everyone can identify. But with so many passwords we need to
remember, it is amazing that people use the same password over and over again?
What I did, was write down my password is encrypted in a way that I can
understand but no one else will know what the numbers mean. Most, if not all
credit cards work with 4-digit pin number. What you can do is write it in the
wrong order and add 1 or 2 more numbers in the same place each time or always
add the same amount over the original number. Also, I never write my password
or PIN number along with other sources, for example, I did not write the name
of the bank with a number beside it. I designed a system to provide bank
account name and password. If someone finds my list they will never know the
meaning of information and are more likely than not throw it away.
Practice
Firewall
A unique problem associated with the IT theft is that the
thief did not have to enter your property to gain access to sensitive systems
or data. Thanks to the Internet can be a thief on the other side of the world,
sits drinking coffee while he's stealing from you.
All businesses must have a firewall stop, full well! A good
router comes with a built in firewall of varying quality. From behind the
fire-walled router, will be the thief got the answer when he / she is trying to
'ping' your IP address to find out if there are computers at the other end. Do
not worry about the technical terms, just Firewall makes your computer
invisible to the outside world.
Prohibit / prevent the use of file transfer and chat
programs
If you are a business router or a third-party software can
restrict access to the file transfer program that is commonly used to download
music or chat programs. The program can act as a gateway through your firewall
security.
Security Software
If you are a home user or a business you should consider
using one of the many third-party software package known as Internet Security.
I recommend the one that marks a secure website for the search.
Protecting Mobile Devices
Many companies have the personnel who use mobile devices
that contain up to date data is usually like email, milk and event reminders.
Most of the devices synchronization with the main server in the office. The
tool is easily susceptible to theft. What many users may not know is that they
can be remotely removed from the sensitive data no matter where the design is
in the world.
Backup
To protect your property it is common to insure against
losses from fire, theft and accidental damage. There is no discussion about the
security would be complete without mentioning the backup, the equivalent of
accidental damage. Here, I just wanted to mention one method of backup that I
asked about more and more these days - the backup site.
Many third-party groups are now offering offsite backup. The
options available for home and business users. Of course there are some good
points in favor of this option, but there are limitations that I would like to
draw your attention to:
Should not be considered as an answer to the
It is rare that one solution fits all needs. For example,
what happens if your broadband connection goes down?
The cost of money
Of course, as the services offered there are costs involved.
Vendor service fees based on the amount of data stored offsite. Costs range
widely. As a believer in 'you get what you pay for' You need to investigate
each offer carefully.
Data transfer rates and the number of
You have to calculate how much data you need to go back.
Remember that time offsite backup will depend on how fast your broadband
connection (if you do not have a broadband option is a non starter). Most
systems work by moving the first backup all the files - which can take days -
then just do incremental backups thereafter.
If a service contract with your operator to limit the amount
of data you can transfer you have to make sure you do not have problems of
excess costs.
Generally, you can not beat doing a full backup and store
the tapes offsite own. I see this as a good choice for small files but it is
very important as a tool in the arsenal.
If you would like help or advice on any of the issues raised
in this article please visit my website at http://www.bdp.co.uk
For further information or assistance from Steve R Bryan
http://www.bryansdataprogramming.com please visit the website at where you can
find information about products, services and download a free monthly
newsletter Bryan Programming the data are packed full of the latest news,
information and advice about computing world
Tidak ada komentar:
Posting Komentar