Lesson nineteen: Relationship Between Security Threats And Security Measures Security threats may come in many forms. For example, when someone is invading our account information from a trusted bank, this act is considered as a security threat. Security measures can be used to prevent this invaders from getting the getting the account information. For example, the bank can use a firewall to prevent unauthorized access to its database. A.) Security threats 1. Security threats causes data loss, computer damage and the misuse of content. These threats include malicious code, hacking, natural disaster and theft. 2. People need to apply some security measures to overcome these threats. The examples of security measures include data backup, cryptography, Antivirus, Anti-Spyware, firewall and human aspects. B.) Malicious code threats VS Antivirus and Anti-Spyware 1. Malicious code is a rogue program that threats computer assets by causing undesired effects in the programmer part. These threats include virus, Trojan horse, logic bomb, worm, trapdoor and back door. 2. Antivirus and Anti-Spyware can be used as security measure to protect the computer from those threats. 3. These security measures provide protection to the computer by a) limiting connectivity b) allowing only authorized media for loading data and software c) enforcing mandatory access controls d) blocking the virus from the computer program C.) Hacking VS Firewall 1. Hacking is an unauthorized access to the computer system done by a hacker. We can use firewall or cryptography to prevent the hacker from accessing our computers. 2. A firewall permits limited access to unauthorized users or any activities from the network environment. 3. Cryptography is a process of hiding information by changing the actual information into different representation, for example, an APA can be written as 7&*. D.) Natural disaster VS data backup 1. The natural and environmental disaster may include flood, fire, earthquakes, storms and tornados. 2. Natural disaster may threaten a computer’s hardware and software easily. Computers are also sensitive to their operating environment such as excessive heat or the inadequacy of power supply. 3. The backup system is needed to backup all data and applications in the computer. With the backup system, data can be recovered in case of an emergency. E.) Theft VS human aspects 1. Computer theft can be of 2 kinds: a) can be used to steal money, goods, information and computer resources. b) the actual stealing of computers, especially notebooks and PDAs. 2. These threats can be handled based on the human aspects. 3. There are 3 approaches that can be taken by individuals or organizations to prevent theft which are a) prevent access by using locks, smart card or password b) prevent portability by restricting the hardware from being moved c) detect and guard all exits and record any hardware transported. F.) Be suspicious of all results 1. There are many instances where non-programmers develop applications which are not build with proper understanding of software engineering practices. 2. Data produced by such applications may not be correct and may risk corrupting data received from other sources that are not compatible with the application. Summary 1. The relationship between the security threats and the security measures. 2. The appropriate security measures to use to protect the computer from computer threats.