Pada minggu yang kedua belas kelas Dr. Johari, topik yang dibincangkan adalah mengenai Network & Computer Security. Apa yang saya fahami dari topik ini adalah ianya terdiri daripada peruntukan dan dasar yang diguna pakai oleh pentadbir rangkaian untuk mencegah dan memantau akses yang tidak dibenarkan, penyalahgunaan, pengubahsuaian, atau penafian rangkaian komputer dan rangkaian sumber diakses. Tujuannya adalah untuk mengelakkan daripada sebarang kecurian data, maklumat peribadi dan sebagainya.
SSL or Secure Socket Layer certificates :
• small data files that digitally bind a cryptographic key to an organization’s details.
• allows secure connections from a web server to a browser.
• when installed on a web server, it activates the padlock and the https protocol .
• Typically, SSL is used to secure credit card transactions, data transfer and logins.
• small data files that digitally bind a cryptographic key to an organization’s details.
• allows secure connections from a web server to a browser.
• when installed on a web server, it activates the padlock and the https protocol .
• Typically, SSL is used to secure credit card transactions, data transfer and logins.
Phishing and Web Spoofing :
1) Phishing
– Attacks are performed with the intention to acquire personal information like credit
card numbers, bank account, etc.
– One common approach of performing phishing attack – send e-mails to stem from
an official representative of a well-known company.
– The recipients are encouraged to enter personal identification data.
– Attacks are performed with the intention to acquire personal information like credit
card numbers, bank account, etc.
– One common approach of performing phishing attack – send e-mails to stem from
an official representative of a well-known company.
– The recipients are encouraged to enter personal identification data.
2) Web Spoofing
– Mocking the web presences of trusted corporations with the intention to trick
customers.
– Also employed for phishing attacks.
– Typically relies on the following factors:
•Convincing website and email design
•Use of convincing URLs
•Pretending “secure” connections.
– Mocking the web presences of trusted corporations with the intention to trick
customers.
– Also employed for phishing attacks.
– Typically relies on the following factors:
•Convincing website and email design
•Use of convincing URLs
•Pretending “secure” connections.
Desktop Security Issues :
• End users’ security can be endangered through threats like adware, spyware,
viruses and worms.
• It is up to the clients computers to counteract these security threats by using internet
services thoughtfully, updating OS, updating browser software, and using additional
security software like firewalls and virus scanners.
• End users’ security can be endangered through threats like adware, spyware,
viruses and worms.
• It is up to the clients computers to counteract these security threats by using internet
services thoughtfully, updating OS, updating browser software, and using additional
security software like firewalls and virus scanners.
No comments:
Post a Comment