Thursday, January 28, 2010

SOME TYPES OF COMPUTER SECURITY ATTACKS:



*Computer Viruses

A computer virus is a small software program that spreads from one computer to another computer and that interferes with computer operation. A computer virus may corrupt or delete data on a computer, use an e-mail program to spread the virus to other computers, or even delete everything on the hard disk.

Computer viruses are most easily spread by attachments in e-mail messages or by instant messaging messages. Therefore, you must never open an e-mail attachment unless you know who sent the message or unless you are expecting the e-mail attachment. Computer viruses can be disguised as attachments of funny images, greeting cards, or audio and video files. Computer viruses also spread by using downloads on the Internet. Computer viruses can be hidden in pirated software or in other files or programs that you may download.

Source: http://support.microsoft.com/kb/129972


Types of Virus:

Boot viruses: These viruses infect floppy disk boot records or master boot records in hard disks. They replace the boot record program (which is responsible for loading the operating system in memory) copying it elsewhere on the disk or overwriting it. Boot viruses load into memory if the computer tries to read the disk while it is booting.
Examples: Form, Disk Killer, Michelangelo, and Stone virus

Program viruses: These infect executable program files, such as those with extensions like .BIN, .COM, .EXE, .OVL, .DRV (driver) and .SYS (device driver). These programs are loaded in memory during execution, taking the virus with them. The virus becomes active in memory, making copies of itself and infecting files on disk.
Examples: Sunday, Cascade

Multipartite viruses: A hybrid of Boot and Program viruses. They infect program files and when the infected program is executed, these viruses infect the boot record. When you boot the computer next time the virus from the boot record loads in memory and then starts infecting other program files on disk.
Examples: Invader, Flip, and Tequila

Stealth viruses: These viruses use certain techniques to avoid detection. They may either redirect the disk head to read another sector instead of the one in which they reside or they may alter the reading of the infected file’s size shown in the directory listing. For instance, the Whale virus adds 9216 bytes to an infected file; then the virus subtracts the same number of bytes (9216) from the size given in the directory.
Examples: Frodo, Joshi, Whale

Polymorphic viruses: A virus that can encrypt its code in different ways so that it appears differently in each infection. These viruses are more difficult to detect.
Examples: Involuntary, Stimulate, Cascade, Phoenix, Evil, Proud, Virus 101

Macro Viruses: A macro virus is a new type of computer virus that infects the macros within a document or template. When you open a word processing or spreadsheet document, the macro virus is activated and it infects the Normal template (Normal.dot)-a general purpose file that stores default document formatting settings. Every document you open refers to the Normal template, and hence gets infected with the macro virus. Since this virus attaches itself to documents, the infection can spread if such documents are opened on other computers.
Examples: DMV, Nuclear, Word Concept.

Source:
– Mayur Kamat
July 29, 2001
http://www.boloji.com/computing/security/015.htm


*Computer Worms

A computer worm is a software program that is designed to copy itself from one computer to another, without human interaction. Unlike a computer virus, a worm can copy itself automatically.

Worms can replicate in great volume. For example, a worm can send out copies of itself to every contact in your e-mail address book, and then it can send itself to all of the contacts your contact's e-mail address books.

Some worms spread very quickly. They clog networks and can cause long waits for you (and everyone else) to view Web pages on the Internet.

You might have heard of specific computer worms, including the Sasser worm, the Blaster worm, and the Conficker worm.

Source: http://www.microsoft.com/security/worms/whatis.aspx


*TROJAN HORSE

A computer program that appears to be useful but that actually does damage.

Trojan horses spread when people are lured into opening a program because they think it comes from a legitimate source.

Trojan horses can also be included in software that you download for free. Never download software from a source that you don't trust.

10 HOT IT CERTIFICATIONS:



1. COMPTIA CERTIFICATE +
For network and system admins; shows knowledge and access and controls cryptography and organizational security.

2. GIAC SECURITY ESSENTIAL CERTIFICATE
For hands-on administrator; program run in conwert with courses taught by the well-regarded SANs institute.

3. BROCADE CERTIFIED SAN DESIGNER
This storage network certificate requires participant to understand Data Center Fabric design and implementation principles.

4. CERTIFIED ETHICAL HACKER
Bestows a mantle of trust on white hat hackers; shows proficiency in penetration testing and the ethics around such probes.

5. EMC PROVEN PROFESSIONAL TECHNOLOGY ARCHITECH
Focuses on EMC's product platforms; requires between two and four exams.

6. CISCO IP TELEPHONY DESIGN SPECIALIST
Requires three exams in unified communications architechture and design, lifecycle services and inplementation.

7. MICROSOFT CERTIFIED SOLUTION DEVELOPER
Highest possible certification for .NET developers; suggest two years of experience before a series of five exams.

8. MICROSOFT CERTIFIED TRAINER
Stringent program requires high profeciency in the material to be taught and good instructional skills; reqiures annual renewal.

9. REDHAT CERTIFIED TECHNICIAN
Requires three hours hands-on exam to show the competency in administering and troubleshooting live Linux systems.

10. PLANET3 CERTIFIED WIRELESS NETWORKADMINISTRATOR
Wireless LAN certification shows profeciency in fundamentals necessary to run an enterprise WLAN.

Source: http://www.baselinemag.com/c/a/Careers/10-Hot-IT-Certifications/

Monday, January 4, 2010

IT Profesional



The ACCC has adopted the definition proposed by the Australian Council of Professions which defines a
profession as:

"A disciplined group of individuals who adhere to high ethical standards and uphold themselves to, and are accepted by, the public as possessing special knowledge and skills in a widely recognised, organised body of learning derived from education and training at a high level, and who are prepared to exercise this knowledge and these skills in the interest of others. "
Source: http://www.accc.gov.au/content/index.phtml/itemId/277772


IT professionals perform a variety of duties that range from installing applications to designing complex computer networks and information databases. A few of the duties that IT professionals perform may include data management, networking, engineering computer hardware, database and software design, as well as the management and administration of entire systems. (http://en.wikipedia.org/wiki/IT_professional)

You can also say that you are an IT Professional if you do have a wide set of background, education and personal experience in any of the IT fields which can make you handle and make a solutions to different problems through IT.

After graduating my course BSIT, I can consider myself as an IT professional. I'm saying it so because as what the definition says '
performing variety of duties related to IT', well, I believe that I can handle that one even though not all of the said fields of technologies I have really known deeply but I also believe that it can be learn as long as you have the basic knowledge about that. But of course, to go deeper in the fields of IT, i want to learn more or going to study again or to pursue and attain master degree.