Information Security for SMEs

Written by Thom Leggett


This article explores computer security, aiming to give businesses an insight into why they must be proactive in protecting their systems. There are many aspects to security onrepparttar Internet and a lot has been made recently ofrepparttar 132021 security of e-commerce transactions. Whilst many ofrepparttar 132022 security issues that a website administrator faces are similar to those that your businesses computers are threatened with, this column will concentrate on how and why you should secure your internal IT investment.

The Internet in its current state is similar to a city with no locks onrepparttar 132023 doors of its houses, where computers can be thought of as houses andrepparttar 132024 networks making uprepparttar 132025 Internet,repparttar 132026 city streets. Computers as they are sold today are inherently insecure, allowing access to anyone with a bit of curiosity or malicious intent. As businesses come to rely more and more on electronic information (not least e-mail),repparttar 132027 potential disruption caused by a data burglary, informational arson attack or digital graffiti has reached a level that businesses should not ignore

The threat Any computer onrepparttar 132028 Internet exposes a series of ports through which information flows. By default these are all open and unlocked. Whilst many of them may lead to empty rooms or brick walls, an attacker will only need to find one port vulnerable to attack forrepparttar 132029 whole system to be compromised.

Even if your ports are secure; intruders can get into your computer in a Trojan horse. A piece of software disguised as something useful can contain a malicious sub-program to install a backdoor into your system. Often these programs claim to give something for free or display small games whilst an attacker has a good nose around

One ofrepparttar 132030 most worrying developments has beenrepparttar 132031 proliferation of automated attacks. These can be run from an attacker's computer, scanning hundreds or thousands of computers in a day; or can berepparttar 132032 self-replicating Internet worm. These are a hybrid of virus programs and computer security attacks. In worst-case scenarios, they can bring whole segments ofrepparttar 132033 Internet to a standstill.

Attacks on your information can be carried out for as varied reasons as an arsonist burns things, a robber steals things or kids spray-paint walls. An electronic attack could leave you with no data (imagine losing your accountsrepparttar 132034 day before your filing date), data that has been altered in subtle ways (imagine your accounts with 10% taken off each figure), a website that is 'owned' by a teenager in another country or an office full of computers that no longer dorepparttar 132035 job for which they were intended.

When we drive a car we are accepting and using a set of standards that have evolved sincerepparttar 132036 turn ofrepparttar 132037 century to ensure safety, convenience and fair access for all users ofrepparttar 132038 road system. Some of these standards are globally accepted (for instance a road is made from tarmac and wheels are made from rubber) whilst others vary from country to country (for example if we drive onrepparttar 132039 left orrepparttar 132040 right). The practical upshot of these standards is that a car designed and built for use in one country can be safely used in another (possibly with a little bit of inconvenience).

The aftermath Attacks on your information can be carried out for as varied reasons as an arsonist burns things, a robber steals things or kids spray-paint walls. An electronic attack could leave you with no data (imagine losing your accountsrepparttar 132041 day before your filing date), data that has been altered in subtle ways (imagine your accounts with 10% taken off each figure), a website that is 'owned' by a teenager in another country or an office full of computers that no longer dorepparttar 132042 job for which they were intended.

Protecting your HTML and PHP Source Code

Written by Vince Edwards


There are many reasons now as a web designer, software programmer or website owner that you may want to start consideringrepparttar safety of your HTML or PHP source code. Some related reasons are:

1. Email Address theft – Have you ever wondered how you get SPAM mail even though you’ve been super cautious NOT to subscribe to anything, yet it still comes your way? One ofrepparttar 132017 reasons could be that you have your EMAIL link on a website. With email harvesting software available (even for free trials) anyone can harvest your email address right off your website automatically. 2. Picture Theft – Most average users are aware that you can right-click pictures on a website and download them to their own computer. It is common knowledge for most internet users and webmasters. 3. Return URLs – For some credit card processing companies (such as PAYPAL and EGOLD) it is possible to viewrepparttar 132018 source of web pages and look atrepparttar 132019 return (thanks for purchasing) page, where you can directly go torepparttar 132020 URL, click onrepparttar 132021 link to downloadrepparttar 132022 software without paying for it 4. Website Layout - If a Webmaster likes your site, they can save outrepparttar 132023 page (and structure) and edit it in their own HTML editor software and claimrepparttar 132024 design layout for themselves 5. PHP Scripts - If you have a clever script (i.e. written in PHP) and you need to send it to someone, they could easily have a look at your PHP script to see how you did it. They can then copyrepparttar 132025 code or re-write it slightly and call it their own Or use it for their own PHP software and scripts.

These are just some ofrepparttar 132026 reasons why you need to consider encrypting your web pages or source code. Encryption of web pages and source code is becoming more and more popular and inrepparttar 132027 future will become an absolute necessity. We can now see a huge market (onrepparttar 132028 web) of HTML encryption software that enables you to protect your source code from prying eyes. Although HTML encryption is not 100% foolproof, it is effective enough to keep out MOST users and acts as a good deterrent, since not everyone hasrepparttar 132029 time to decipher encrypted HTML source just forrepparttar 132030 fun of it.

Cont'd on page 2 ==>
 
ImproveHomeLife.com © 2005
Terms of Use