Understanding Your Computer

 Threats to computers and networks have been an issue since computers were introduced to the general public. Today, any computer or network that is connected to the Internet is at risk to various types of attacks. It is important that we keep all of our PC's both at home and at work, up-to-date on the latest security patches and bug fixes. CERT (the Computer Emergency Response Team funded by Carnegie Mellon University) cautions that:




"Intruders form groups and develop scripts that they share with each other on how to maliciously exploit vulnerabilities in systems. Intruders dedicate time to developing programs that exploit vulnerabilities and to sharing information. They have their own publications, and they regularly hold conferences that deal specifically with tools and techniques for defeating security measures in networked computer systems."


For more information on the great things CERT is doing please visit their website. The CERT/CC and the Internet Community


Your Computer in a Nutshell


There are four basic components to the system that we call a PC (Personal Computer) that you may have sitting on your desk at work or at home.


The first is called the BIOS. The BIOS is an acronym for Basic Input Output System. The BIOS is responsible for booting the computer by providing a basic set of instructions. It performs all the tasks that need to be done at start-up time and this allows the Windows operating system to start. Access to the BIOS can allow an attacker to completely disable the computer and render it useless.


The second piece of the puzzle is called the Operating System or otherwise referred to as the OS. Many different files compromise an operating system. These files control the operation of your Windows machine and allow it to function properly. Access or corruption to these files can allow an attacker to do harmful things to your data and the operation of your computer. Viruses that infect the files that comprise the operating system can replicate themselves and spread to other workstations and servers thus causing more damage by spreading across the network the machines are connected to.


The third critical piece of your computer is called the Desktop. The desktop is the basic interface for your Windows operating system. Access to the desktop can allow applications to be added, deleted and modified as well as modifications to the core of the Windows operating system. If preferences are changed this can be confusing to the user of the computer and may cause unintentional damage.


The last component that runs on a PC is called an Application. Applications have many different purposes and they are typically separate from the BIOS, Operating System and the Desktop. But, most all Applications depend upon the existence of the previous three components. Access to an application can allow an unauthorized user to manipulate the application and its' data in ways it is not intended to do. Changes in configuration and preferences can lead to confusion and corruption of the application and the data within it.


General Problems with Legacy Microsoft Windows Systems


Many users do not understand how their computer behaves and why it behaves the way it does. This is ok, but what we all must understand is that each and every one of us computer users must take the appropriate steps to gain a better understanding of what are risks are.


Two of the older Microsoft Windows systems called Windows 95 and Windows 98 were designed for the home user and never intended to be deployed in a corporate network environment. These versions of the Microsoft Windows operating system are inherently insecure. They offer no sufficient password protection for protecting access to the desktop and various files on the hard drive. These versions were also not designed for use in a public environment. These machines are basically just a high-end word processor that should not be joined to any network including the Internet. The Windows 95 and 98 versions also offer no security management abilities to prevent the machine from unauthorized changes. This can result in significant data loss, degradation and theft.


Protect Yourself


With the release of Microsoft Windows 2000 came much improved security enhancements. This Windows operating system allows users to create accounts, allow and disallow permissions to files and folders as well as the most important, securely locking the workstation. Your workstation can be locked in Windows 2000 by pressing and holding three keys; they are Control (Ctrl), Alt and Delete (labeled "Del" on some keyboards). When you press and hold these three keys at the same time you will have a dialog box that appears. The very fist button on the left is titled "Lock Computer". If you hit your key or click on that button, this will lock your workstation and prevent others from using it or viewing your data. Remember, you are responsible for actions that happen with your login id and computer. So please take this simple step to prevent any future problems. In order to unlock your workstation simply hit the same three keys, Ctrl, Alt and Delete. A fun way to remember this is by calling it the 3-finger salute. Just remember to give your computer the 3-finger salute prior to leaving it unattended. This will help protect yourself from someone else causing harm, even unintentional under your user account.


Chad Boeckmann, CISSP, GSEC

http://www.securedigitalsolutions.com


Article Source: https://EzineArticles.com/expert/Chad_Boeckmann/786134




Article Source: http://EzineArticles.com/5133681

Comments

Popular posts from this blog

Efficient Multi-Boot and Drive Partition Management with BootIt Collection

Advantages of Renting a Drone Versus Buying One

Google's Firebase Web and Mobile Application Dev Tool