Hardware Reference
In-Depth Information
Much of this chapter is devoted to helping you understand how hackers target a system
and how you can defend yourself. Some of the ways that hackers gain access to a system
that we'll explore in this chapter include the following:
Booting the System from a Disk that Contains a Utility that can Read the Files
from the Hard Disk Without Going Through the Existing Operating System
(and its security)
If hackers can gain access to certain system files, for example, they may be able to retrieve
the Administrator password for the system. To prevent this type of attack, you might use
BIOS-level security to prevent a PC from booting from a disk other than the hard disk.
Connecting to Wireless Networks and Looking for Computers or Data that
isn't Protected
To prevent this type of attack, you can employ some of the wireless networking security
techniques discussed in Chapter 3, “Peripherals and Networking,” and also later in this
chapter, such as not broadcasting the service set identifier (SSID) and using Wi-Fi Protected
Access (WPA) encryption on the network connection.
Taking Advantage of Open Network Ports to Access a Computer Remotely
To help prevent this type of attack, you can use a firewall, which blocks unauthorized
network traffic.
Introducing Software on a PC that Causes it to be Harmed, or Causes its
Security to be Breached
There are many forms of such programs. You'll learn about their details later in the
chapter. To prevent infection, you can use antivirus and antimalware utilities.
Physical Security
Organizations lose millions of dollars of equipment every year through thefts and multiple
millions of dollars through the data that goes along with them. Therefore, it's important to
secure your computer hardware physically in whatever environment you place it.
Preventing Hardware Theft
The risk of hardware theft varies with the environment, of course. Leaving a laptop
unattended at an airport is a very different matter from leaving it unattended in your own
offi ce when you go to lunch.
When travelling with a notebook PC or other portable technology device, the emphasis
should be placed on the physical security of the individual device. Here are some pointers:
Know where the device is at all times—preferably within your sight.
Don't leave the device unattended, even for a minute.
Carry the device in an unconventional bag, rather than an expensive-looking laptop bag.
Search WWH ::




Custom Search