Minggu, 14 Oktober 2012

Need an Information Security System? Why?

Firstly let me ask you why we need to secure our System Information? 

There are many reasons why you should protect the information you use on your computer, including:

Ensuring that your information remains confidential and only those who should access that information, can
Knowing that no one has been able to change your information, so you can depend on its accuracy (information integrity)
Making sure that your information is available when you need it (by making back-up copies and, if appropriate, storing the back-up copies off-site)

Are you understand ? sure you have to understand it first! 
you need to understand, why we have to secure our system information besides to backing up your data.

So, how to secure your data? 

1. Password Protection


             Using passwords is one of the most basic methods of improving information security. This measure reduces the number of people who have easy access to the information, since only those with approved codes can reach it. Unfortunately, passwords are not foolproof, and hacking programs can run through millions of possible codes in just seconds. Passwords can also be breached through carelessness, such as by leaving a public computer logged into an account or using a too simple code, like "password" or "1234."
For better security, a computer user may want to consider switching to a new password every few months.


2. Antivirus and Malware Protection


             One way that hackers gain access to secure information is through malware, which includes computer viruses, spyware, worms, and other programs.  Antivirus programs scan the system to check for any known malicious software, and most will warn the user if he or she is on a webpage that contains a potential virus. Most programs will also perform a scan of the entire system on command, identifying and destroying any harmful objects.
Antivirus software can also be downloaded for free online, although these programs may offer fewer features and less protection than paid versions.
             Users must be aware of the name and contact method of each anti-virus program they own, however, as some viruses will pose as security programs in order to get an unsuspecting user to download and install more malware. Running a full computer scan on a weekly basis is a good way to weed out potentially malicious programs.

3. Firewalls


A firewall helps maintain computer information security by preventing unauthorized access to a network. There are several ways to do this, including by limiting the types of data allowed in and out of the network, re-routing network information through a proxy server to hide the real address of the computer, or by monitoring the characteristics of the data to determine if it's trustworthy. Specific websites, protocols (like File Transfer Protocol or FTP), and even words can be blocked from coming in, as can outside access to computers within the firewall.


4. Codes and Cyphers


             Encoding data is one of the oldest ways of securing written information. Governments and military organizations often use encryption systems to ensure that secret messages will be unreadable if they are intercepted by the wrong person.  As long as the code method is kept secret, encryption can be a good basic method of information security.
             On computers systems, there are a number of ways to encrypt data to make it more secure. With a symmetric key system, only the sender and the receiver have the code that allows the data to be read.Secure socket layers use digital certificates, which confirm that the connected computers are who they say they are, and both symmetric and asymmetric keys to encrypt the information being passed between computers.

5. Legal Liability


             Businesses and industries can also maintain information security by using privacy laws. Workers at a company that handles secure data may be required to sign non-disclosure agreements (NDAs), which forbid them from revealing or discussing any classified topics. If an employee attempts to give or sell secrets to a competitor or other unapproved source, the company can use the NDA as grounds for legal proceedings. The use of liability laws can help companies preserve their trademarks, internal processes, and research with some degree of reliability.

6. Training and Common Sense

             One of the greatest dangers to computer data security is human error or ignorance. Those responsible for using or running a computer network must be carefully trained in order to avoid accidentally opening the system to hackers. In the workplace, creating a training program that includes information on existing security measures as well as permitted and prohibited computer usage can reduce breaches in internal security.
             Likewise, a business that doesn't establish a strong chain of command for keeping data secure, or provides inadequate security training for workers, creates an unstable security system. By taking the time to ensure that data is handed out carefully and to reputable sources, the risk of a security breach can be significantly reduced.