Tuesday, October 21, 2014

Summary and Conclusion

In summary from our elite team called logic security team we can conclude this way that : 

Internet security is generally becoming a top priority for users,businesses and governments. Good Internet security protects financial details and much more of what is handled by a business or agency’s servers and network hardware,protects individual data and informations and well secured Government information on-line.
Insufficient Internet security can threaten to collapse an e-commerce business or any other operation where data gets routed over the Web,so as prospective internet users we need to apply necessary precaution when using the internet.Use anti-virus software ,firewall,have a good platform security system on-line to protect our information from malicious attackers on-line whom have dedicated their entire life to wreck havoc and cause major damage to us ...

Thursday, October 16, 2014

Tuesday, October 14, 2014



Possibly solutions 

1. filter unnecessary websites
2. Install genuine antivirus
3. Avoid downloading tempting popups
4. Clear the cache after regularly
5 . Backup your important files
6 . Use a Strong password
7.  Recognize phishing attempts

Fortunately, there are plenty of ways to protect your business from internet security threats.

Change your thinking. 
Internet security should be a fundamental part of your business survival/continuity plan. Think of it this way: Many small businesses have grown reliant on the internet for communicating with customers and partners; selling or marketing their products or services; and more. How will your business continue to perform those functions if your computers are affected by a devastating virus?

Assess your needs.
 Do you have a full understanding of the security you need vs. what you currently have? If you're a harried small-business owner, chances are the answer's "no." The good news is, you may have more protection than you realize. For instance, most home office and small-business local area network (LAN) routers include a built-in firewall--technology that blocks intruders from accessing the computers on the network.

Cover the basics. 
At a minimum, all your business computers should be protected by a hardware or software firewall and antivirus and anti-spyware programs. Some internet security suite solutions geared toward small businesses combine all three protections, as well as offer safeguards against identity theft, spam, phishing scams and more.

Get help.
 Does computer security seem like a big task for you to handle? If so, hire a consultant to perform a security audit of your business systems and network and make recommendations. Your network equipment reseller or technology vendor can also help you determine the security solutions you need. Another option is to outsource the job. A managed service provider can design, implement and maintain your network security solution for a flat monthly fee.

Good security plan 
Put it in writing a detailed, written security plan that includes policies and procedures as well as technology requirements is particularly important for businesses with employees. If your security procedures aren't set down in writing, they're easy for an employee to dispute or disregard.

Keep your security updated.
 New internet threats are emerging daily. Your security solutions won't be effective against new viruses, worms or spyware if they're not regularly updated. Fortunately, most antivirus software and other security solutions can be updated automatically.

Give wireless networks extra protection.
On a wireless network, data is transmitted over radio waves, which can be easily intercepted. This means a wireless network is inherently less secure than a wired one. If you or your employees use a wireless connection to access company databases or files, consider taking additional security measures. For instance, a virtual private network (VPN) connection provides a secure way for mobile workers to remotely  tap into a company's network.

Don't go overboard.
 A house without any windows or doors would be extremely secure--but who would want to live there? By the same token, the more secure your computer or network is, the more difficult it can be to use. Find the right balance between security and usability, and stick with it.
Prepare for the future. A secure network provides businesses with benefits beyond protection from internet threats. Inherently, a secure network is a robust network. And a robust network is an excellent foundation that can support new technologies, such as VoIP, that can greatly increase productivity and reduce operating costs.

The Basic Components
Confidentiality is the concealment of information or resources.E.g., only sender, intended receiver should “understand” message contents. Authenticity is the identification and assurance of the origin of information.
Integrity refers to the trustworthiness of data or resources in terms of preventing improper and unauthorized changes.Availability refers to the ability to use the information or resource desired.

The Security Life Cycle
The iterations of
1. Threats
2. Policy
3. Specification
4. Design
5. Implementation
6. Operation and maintenance

Security Mechanisms 
Specific security mechanisms:
Encipherment,Digital signatures,Access controls,Data integrity,Authentication exchange,Traffic padding,Routing control,Notarization
Pervasive security mechanisms:
Trusted functionality,Security labels,Event,detection,Security audit trails,Security recovery


Get help from our Support Team
If you’re in trouble on-line with anything whatsoever and you have security issues on-line, it’s about time you got in touch with the logic security support team and also send us an email to  logicteam007@gmail.com for any assistance 







Thursday, October 9, 2014

MALAYSIA PC FAIR 2014
This pictures and video below will also give you some insight on how to protect your data on-line,one of the key videos here is talking about using the latest version of anti-virus KASPERSKY to protect out information and computer from any unwarranted attack ,we also put pictorial evidence for you to be apprised with the situation and know that our information on-line can be vulnerable if we don't take necessary action right now.


2.

3.

4.

References:
https://plus.google.com/102061252002454640104/posts/79DQtQv2tk8

IT fair,(September 2014) .'New innovation in IT'. Available at : Mid-valley,Malaysia 

Tuesday, October 7, 2014

Common Internet threats to business on-line

Technology has become an inevitable part of our lives. And while Internet offers a mass amount of useful information, makes communication easier and faster than ever, it presents some threats too along the way.

                          Virus 
Virus is a program designed to copy itself and propagate, usually attaching itself to applications. It can be spread by downloading files, exchanging CD/DVDs and USB sticks, copying files from servers, or by opening infected email attachments.


                       Worms   
A worm can be injected into a network by any types of means, like an USB stick or an email attachment. Email worm tends to send itself to all email addresses it finds on the infected PC. The email then appears to originate from the infected user, who may be on your trusted senders’ list, and catch you off guard.


                     Trojan     

It might appear harmless and even useful at first, but it leaves your PC unprotected, enabling hackers to steal sensitive information.


                    Spyware  

Spyware is often secretly installed without users consent when a file is downloaded or a commercial pop-up is clicked. Spyware can reset your auto signature, monitor your keystrokes, scan, read and delete your files, access your applications and even reformat your hard drive. It constantly streams information back to the person that controls spyware.


                    Adware 

This malware launches advertisements, mostly in the form of pop-ups. These are customized to you as a user, based on your behaviour on the Internet, which maybe monitored by spyware.

                            Spam  

Spam may be defined as unwanted emails. Most users are exposed to scam, which is more than 50% of all Internet emails. Though spam is not a direct threat, it can be used to send different kinds of malware.

                    Phishing 

This is the fraudulent acquiring of sensitive personal information such as passwords and credit card details. This is accomplished by sending official-looking emails impersonating a trustworthy sender. Users of on-line banking and auction sites are most likely to become a target.


                  Pharming 

A more sophisticated form of phishing. By exploiting the DNS system, pharmers can create a fake website that looks like a real one for instance web bank page, and then collect the information users think they are giving to their real bank.


                 Keyloggers



Designed to record the user’s keystrokes. Key-logging allows criminals to look for particular bits of information that can be used for identity or intellectual property theft.

Rogue security software 

A special type of threat is software that claims to be security software. It tricks users that have installed it to pay a sum of money to be really protected (which they will not be). Most often it pretends to be antivirus and anti-spyware programs.

Why is internet Security really needed??

One can actually give a million and one reasons why we need internet security but the truth is that our data needs to be safe and without internet security a lot of damages would have been done .

A list below will show us why we need internet security:
  •  we need internet security to keep information and systems safe from malicious software and individuals.
  •  Internet security is needed to protect any sensitive and confidential information 
  •  Business need internet security to protect their information
  • Hackers are everywhere we need some certain security to protect what we have on-line like our person details and information too
  • Everyone is on-line and a lot of people go trough a lot of process trying to get access to our private lives and a lot on-line we need maximum security to protect malicious attack on us and person data on-line
  • To prevent virus attacks : Viruses are the most common types of computer threats. They have the ability to replicate themselves and corrupt or delete the information stored in a computer without the user’s consent and when this happens problem occur that might be damaging to someone or a business.
  • To prevent bots: Bots are designed to steal data. Such data could be in the form of your email addresses and passwords, your banking and social security information, even any original material that you may have compiled or stored on your computer for usage .We need to take such threats seriously and take necessary precautions 
  • You can also find some URLs you can go to to get more information on why we need internet security such as : 

http://www.bullguard.com/bullguard-security-center/internet-security/internet-threats/internet-security-software-to-protect-your-data.aspx

http://www.forbes.com/sites/josephsteinberg/2014/04/10/massive-internet-security-vulnerability-you-are-at-risk-what-you-need-to-do/



DEFINITION OF INTERNET SECURITY
Internet security may be a catch-all term for a awfully broad issue covering security for transactions remodelled the net. Generally speaking internet security encompasses browser security, the safety of knowledge entered through an online type, and overall authentication and protection of knowledge sent via net Protocol.

Internet security depends on specific resources and standards for safe guarding knowledge that gets sent through the net. This includes varied styles of secret writing like Pretty smart Privacy (PGP). different aspects of a secure net set-up includes firewalls, that block unwanted traffic, and anti-malware, anti-spyware and anti-virus programs that employment from specific networks or devices to observe net traffic for dangerous attachments in other to protect companies data online

Internet security is mostly turning into a prime priority for each businesses and governments,because business cant survive if there are security lapses and one need to take necessary measure to comb this threats . Smart web security protects monetary details and day to day transactions of most business or agency’s servers and network on-line