Development in the areas of communication such as the internet at this time is the rapidly growing into one of the interesting things to discuss, because the impact of the Internet as IT in like as a two-edged knife, On the one hand is very useful for users for example to access the information without limit, making the distance and time can be vague or very close also called, the other has a value destroyer such as data theft, pornography, cybercrime, credit card theft, and the activities of other hackers.
There are many resources that we can take advantage of the Internet such as email, newgroups, chat, phone call, internet telephony (VOIP), RealPlayer, streaming, internet radio broadcasting, video streaming, video conferencing, and others. Internet network that is very knowledgeable in like is a community that is connected between the other one with the virtual.
We also want the security of each other when each email without having to worry there is no responsible party can read, modify, or delete the contents of this email. We also want security when making a purchase transaction via the Internet without fear someone can steal credit card information so that we hurt our in other days.
Security at this time become a basic requirement because global computing is not secure. For example, with moving data from point A to point B on the internet, it may be through some other point during the journey and to open opportunities for others to cut it or change your data.
All this still more with the spread of information in print media such as magazines often discuss hacking and computer security system. Generally, before leaving the house the door will lock the first, but in the use of computers, people tend to be careless. This includes not only end-user or users, but including all those in the field of IT.
Here are 5 errors in security:
1. Write down the password in paper
2. A bad password selection. Password in the election tended to use the name who someone close to them as husband or wife, boyfriend name, name of parents, a former boyfriend, artist names pet, pet names, or even use the date of birth.
3. Leave computer that is being used as such without the slightest protection, so other people can come and sit down to access data in a computer live.
4. Opening email attachments without first making examine. Along with many people use of email, many viruses spread through email.
5. There is no policy in the computer security company. This policy is to set up everything related to computer security, such as the implementation of each of the password (eg password long minimal and combination and numeric characters as its content), and this policy contains which will received sanctions if violations occur.
Buat Toko Online Berbasis Blogspot
13 years ago
0 comments:
Post a Comment