Computer Security Do I?
Every organization and individual has certain vital information - a unique formula, specialized customer database, a personal journal, annual financial data, etc. The organization would be compromised when they fall into the wrong hands.
Until a few years ago, the protection of such information is relatively simple. All required a strong one was safe with a single key to access. However, as privacy no longer exists. Encryption is the only way to protect your valuables. Currently, with the exception of a few strong encryption packages, there are no resources for this critical encryption function.
Passwords within most programs (Word, Excel, Access etc.) can be broken by a few beginners without any knowledge of computing. Such password breaking tools are easily found on the worldwide web for as little as $ 5.95, or sometimes even free!
Most companies invest millions of dollars in setting up firewalls and try to secure their networks. Ironically, they have the least amount of money to spend to protect the area where the data actually resides or has made the PC for their employees to use. The costs involved in securing data at the level of the user minimum. They just refuse to pay $ 35 for a security.
Encryption makes your data even if accessed by an unauthorized person, incomprehensible and unusable. By adopting the simple preventive techniques you can ensure complete data privacy.
Hacking no longer requires experts. There are literally thousands of off-the-shelf programs available on the Internet that are as easy as using the software packages that you are so familiar. Anyone, even a child with limited or no computer know-how, these packages can hack into your systems. There is no defined requirement learning curve - or the amount of background knowledge essential to an effective 'hacker' is almost zero.
Simple acts like going online to check your email to expose your machine is hacked. It is a trivial task to 'listen' someone e-mail, so that all future correspondence is now in the inbox of the hacker as well.
On http://www.cs.auckland.ac.nz/ ~ pgut001/pubs/secure_del.html find a scientific study made by Peter Gutmann, from Department of Computer Science at the University of Auckland, which is explained in full technical details of the principles of magnetic order principle and which methods can be used to recover files after they have been overwritten several times with data. You can also find a ton of references to other scientific paper on the same subject.
Sunday, April 4, 2010
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment