Continued from page 1
FIREWALLS / DETECTION NETWORKS
Firewalls screen all communications to a system, including e-mail messages, which may carry logic bombs. The term "firewall" is a relatively generic term for methods of filtering access to a network. They may come in
form of a computer, router or other communications device, or in
form of a network configuration.
The services and access that are permitted to each user are defined by firewalls. One method is to screen user requests to check if they come from a previously defined domain or Internet Protocol (IP) address. Another method is to prohibit Telnet access into
system.
Here are a few key things to remember in order to protect yourself from Cyberterrorism:
i. All accounts should have passwords and
passwords should be unusual, difficult to guess, and alphanumeric where possible.
ii. Change
network configuration when defects become known.
iii. Check with venders for upgrades and patches. iv. Audit systems and check logs to help in detecting and tracing an intruder.
v. If you are ever unsure about
safety of a site, or receive suspicious email from an unknown address, don't access it. It could be trouble.
TRACING SOFTWARE
There are software companies that create products designed to trace exactly where anyone connecting to your network is coming from. Giving you detailed information on
registered owner's name, address, etc. Greater possibility of detection always reduces
incidence of crime.
PROTECTION SUITES
Click here:http://www.irieisle-online.com/cyberterrorism for a suite of online services which combine a number of protection strategies.
Today's commercial off-the-shelf software is riddled with holes. Microsoft products in particular, seem to be targeted. A recent Gartner Group report strongly suggests that changing from Microsoft's Internet Server would be a positive step. Software makers should design more secure products, which should be shipped to consumers pre-configured with high security settings. Such efforts will probably mean higher costs and slower progress in
short term but will pay off in
long term.
There are no foolproof ways to protect a system, as completely secure system can never be accessed by anyone. Your organization's classified information can be kept on machines with no outside (internet/intranet) connection, as a form of prevention of Cyberterrorism. In
end,
onus of fighting Cyberterrorism is really on each company or organization. The cost to protect your data will be a small fraction of what will be lost if your information systems are attacked or accidentally damaged.

Godfrey Heron is the Website Manager of Irieisle Online a leading webhosting and design company. www.irieisle-online.com Visit our website now, to start profiting from the internet. Visit our archives at www.irieisle-online.com/archive/articles.htm