Page 259 - DCAP104_EXPOSURE_TO_COMPUTER_DISCPLINES
P. 259

Exposure to Computer Disciplines



                   Notes
                                   14.7   Backing up Data
                                   14.8   Safeguarding Your Computer Hardware
                                        14.8.1  Physical Access and Data Security
                                   14.9  Summary
                                   14.10  Keywords
                                   14.11  Self-Assessment Questions
                                   14.12  Review Questions
                                   14.13  Further Reading

                                 Objectives

                                 After studying this unit, you will be able to:
                                    •  Understand keeping your system safe.

                                    • Explain protect yourself.
                                    • Understand protect your privacy.
                                    • Explain managing cookies.

                                    • Discuss spyware and other bugs.
                                    • Explain keeping your secure.

                                    • Discuss backing up data.
                                    • Explain safegauarding your computer hardware.

                                 Introduction


                                 Your home computer is a popular target for intruders. Why? Because intruders want what you’ve
                                 stored there. They look for credit card numbers, bank account information, and anything else they
                                 can find. By stealing that information, intruders can use your money to buy themselves goods
                                 and services. But it’s not just money-related information they are after. Intruders also want your
                                 computer’s resources, meaning your hard disk space, your fast processor, and your Internet
                                 connection. They use these resources to attack other computers on the Internet. In fact, the more
                                 computers an intruder uses, the harder it is for law enforcement to figure out where the attack is
                                 really coming from. If intruders can’t be found, they can’t be stopped, and they can’t be prosecuted.
                                 Why are intruders paying attention to home computers? Home computers are typically not very
                                 secure and are easy to break into. When combined with high-speed Internet connections that are
                                 always turned on, intruders can quickly find and then attack home computers. While intruders
                                 also attack home computers connected to the Internet through dial-in connections, high-speed
                                 connections (cable modems and DSL modems) are a favorite target.
                                 No matter how a home computer is connected to the Internet, intruders’ attacks are often successful.
                                 Many home computer owners don’t realize that they need to pay attention to computer security.
                                 In the same way that you are responsible for having insurance when you drive a car, you need to
                                 also be responsible for your home computer’s security. This document explains how some parts
                                 of the Internet work and then describes tasks you can do to improve the security of your home
                                 computer system. The goal is to keep intruders and their programs off your computer.



        252                               LOVELY PROFESSIONAL UNIVERSITY
   254   255   256   257   258   259   260   261   262   263   264