Thursday, 27 January 2011

A few threats of IT and how to solve them

A firewall is a barrier that helps to protect your computer system and also other computer systems that you are connected to. A firewall will notify you if there is any incoming traffic such as someone trying to gain access to your PC will then hit the firewall and warn you of this. Also some firewalls that are a more advanced software can detect outgoing traffic too.

Backups are a very helpful and popular way today in IT if things do not got as planned in IT, such as losing data or also stolen, if they are stolen make sure you have all security possible on the information you had so no one can gain access to it. Backups are very useful as of if an organisation may lose someone’s personal details, with a backup they can get them back, the more backups you have the better, but the more backups you have the more chance someone’s details can be stolen or lost then you dont know where they are at all, this is why you need to protect these backups with as much security as possible or the legal implication can become of job loss and the organisation be sewed.

Spam are things such as advertising e-mails and pop ups that contain viruses that will end up damaging your computer system, and not running how you would like it too. A way around this is only opening e-mails your know where they are from, if you receive an e-mail from an anonymous user do not open or click any link attached and delete, also if you have an e-mail telling you to perform a certain action for example your bank asking to send personal information or to deactivate your account, contact the bank or go to the bank itself to confirm that the e-mail was from them, as hackers and phishers will be after your personal information.

Social Impacts of IT



- A mind map of the impacts IT has had on people's lives.

Social Impacts of IT

IT to a lot of people has made a huge impact on people’s lives, such as in jobs for peoples researching and storing data in organisations and different computer systems. Also people have found that using the web for not only researching helpful, but socialising and finding family and friends to stay in contact with.
Things like entertainment as some people spend a large amount of time online gaming and playing on or off internet active games, listening and downloading music, downloading videos and images, also some people like to shop online.

IT is now a modern commonly used thing in most people's everday life, either to do with working, socialising or just for entertainment, but what ever used for used by most people everday. Being used everday is showing how much of an impact it has made on people from before they were made as you could not just look for something you would like to know on the web and find it out in seconds or be entertained by gaming on a screen, or even buy products online.
Today IT systems hold so much important information on organisations that it could be such an impact if it was to be stolen or lost so it may be an impact but also a risk so also organisations are having to protect there systems as much as possible storing personal information, so this is also showing that its made an impact by us having our private data stored on IT systems.

Threats and abuse of IT

Yes IT may have been a great impact on people, but the things on the internet with there personal details and certain downloads can be huge risks. Such as socialising on the social websites there have been numbers of crimes for anonymous people wanting to meet people they randomly add on the site, basically stalking an individual so check who you have on your account and make sure you know the person to remain safe. On the entertainment side of the internet with downloads, you need to make sure your security set up is all up to date and active as a lot of downloading websites contain alot of viruses, which if you don’t not have good enough security it then spreads itself across your computer system and may lead to things such as corruption or disabling certain things on your system or not running to expectations. Whilst having security on your computer on each website it shall notify you weather the website is trusted or not, so when online shopping be careful where you purchase from as of you will have to enter and submit your personal bank and billing details which hackers today are out to search for tracking peoples IP address and hacking into systems without security.

Thursday, 13 January 2011

IT Security threats

Virus - A virus is a programme created to purposely alter the way your computer system operates. It creates copies of itself to folders and files etc, when these files are opened it then may damage or also delete them, spreading themselves through attachments in e-mails, instant messengers and can also be contained on CD-ROMS and floppy disks etc.

Hackers -   A hacker is a individual person that gains unauthorised access to data within an IT system. There are different kinds of hackers such as a white hat hacker, a white hat hacker is someone that breaks through an IT security for a non-malicious reason.
Also a Grey hat hacker, a grey hat hacker is someone who surfs the web and hacks into a website to let the administrator know they have got into the system.
Next the Blue hat hacker, the blue at hacker is an individual from outside computer security firms to bug test a system looking for something to be exploited so it can be closed down.
A black hat hacker, also known as a cracker, is someone who breaks a computer security but without authorisation or uses technology for vandalism, fraud, identity theft or other illegal actions. 

Spyware, Adware and Malware - Spyware, one of the biggest internet threats today. It often arrives from a free programme that is downloaded from the net or in a attachment to an E-mail. It is used for advertising purposes as you will suddenly find pop up adverts appearing on your screen, even when you not connected online.  Also you may recognise a tool bar that you have not installed and type in a web address and this will take you to a completely different site, which is very similar to adware. 



More of a malicious type of spyware will not appear in that way, but instead can record every key stroke you make, which then someone may find out web addresses, personal information and also financial details, but the worst part about spyware is if you have one piece of spyware you may have a lot more than you know about. Some adware can also be classified as spyware, a type of Malware which steals information. For example Bonzi-BUDDY, an application marketed as an "Intelligent software agent", corrupted many of the user's system files, forcing the display of many obscene advertisements and the main application logged browsing details and sent them to various third parties.