Tuesday, October 14, 2014



Possibly solutions 

1. filter unnecessary websites
2. Install genuine antivirus
3. Avoid downloading tempting popups
4. Clear the cache after regularly
5 . Backup your important files
6 . Use a Strong password
7.  Recognize phishing attempts

Fortunately, there are plenty of ways to protect your business from internet security threats.

Change your thinking. 
Internet security should be a fundamental part of your business survival/continuity plan. Think of it this way: Many small businesses have grown reliant on the internet for communicating with customers and partners; selling or marketing their products or services; and more. How will your business continue to perform those functions if your computers are affected by a devastating virus?

Assess your needs.
 Do you have a full understanding of the security you need vs. what you currently have? If you're a harried small-business owner, chances are the answer's "no." The good news is, you may have more protection than you realize. For instance, most home office and small-business local area network (LAN) routers include a built-in firewall--technology that blocks intruders from accessing the computers on the network.

Cover the basics. 
At a minimum, all your business computers should be protected by a hardware or software firewall and antivirus and anti-spyware programs. Some internet security suite solutions geared toward small businesses combine all three protections, as well as offer safeguards against identity theft, spam, phishing scams and more.

Get help.
 Does computer security seem like a big task for you to handle? If so, hire a consultant to perform a security audit of your business systems and network and make recommendations. Your network equipment reseller or technology vendor can also help you determine the security solutions you need. Another option is to outsource the job. A managed service provider can design, implement and maintain your network security solution for a flat monthly fee.

Good security plan 
Put it in writing a detailed, written security plan that includes policies and procedures as well as technology requirements is particularly important for businesses with employees. If your security procedures aren't set down in writing, they're easy for an employee to dispute or disregard.

Keep your security updated.
 New internet threats are emerging daily. Your security solutions won't be effective against new viruses, worms or spyware if they're not regularly updated. Fortunately, most antivirus software and other security solutions can be updated automatically.

Give wireless networks extra protection.
On a wireless network, data is transmitted over radio waves, which can be easily intercepted. This means a wireless network is inherently less secure than a wired one. If you or your employees use a wireless connection to access company databases or files, consider taking additional security measures. For instance, a virtual private network (VPN) connection provides a secure way for mobile workers to remotely  tap into a company's network.

Don't go overboard.
 A house without any windows or doors would be extremely secure--but who would want to live there? By the same token, the more secure your computer or network is, the more difficult it can be to use. Find the right balance between security and usability, and stick with it.
Prepare for the future. A secure network provides businesses with benefits beyond protection from internet threats. Inherently, a secure network is a robust network. And a robust network is an excellent foundation that can support new technologies, such as VoIP, that can greatly increase productivity and reduce operating costs.

The Basic Components
Confidentiality is the concealment of information or resources.E.g., only sender, intended receiver should “understand” message contents. Authenticity is the identification and assurance of the origin of information.
Integrity refers to the trustworthiness of data or resources in terms of preventing improper and unauthorized changes.Availability refers to the ability to use the information or resource desired.

The Security Life Cycle
The iterations of
1. Threats
2. Policy
3. Specification
4. Design
5. Implementation
6. Operation and maintenance

Security Mechanisms 
Specific security mechanisms:
Encipherment,Digital signatures,Access controls,Data integrity,Authentication exchange,Traffic padding,Routing control,Notarization
Pervasive security mechanisms:
Trusted functionality,Security labels,Event,detection,Security audit trails,Security recovery


Get help from our Support Team
If you’re in trouble on-line with anything whatsoever and you have security issues on-line, it’s about time you got in touch with the logic security support team and also send us an email to  logicteam007@gmail.com for any assistance 







3 comments:

  1. thanks mate for making this project a success

    ReplyDelete
  2. Great information & I agree about this.

    ReplyDelete
  3. The contents here are pretty much factual and very detailed. Great job guys. I look forward to what more u guys v to say.

    ReplyDelete