Destruction of the Internet
Donald G. Perrin
“I cannot send in my class work - my computer is virus infected
“The network is down!” “
This past year has seen numerous instances of interruption to internet service due to hackers, spam, spyware, virus, worms, Trojans, and malicious code causing the failure of computers, servers, and networks. For distance learning it raises a question, are our computer systems and networks vulnerable? Do we need to accommodate service interruptions? Or can we prevent them?
The editor researched this topic when the web hosting company for this Journal suffered a massive virus attack. Service was not restored in a timely manner and the URL was subsequently moved to another hosting service.
Are our computer systems and networks vulnerable?
Protecting your home is a useful analogy to explain how to protect your computer. Consider the following questions:
Here are the parallels for your computer:
Neighborhood is the Internet. Your best protection is to have several lines of defense against intruders such as locks, alarms, and security systems.
Perimeter defense is a secure network with firewall and encryption. Alarms warn you when unauthorized users attempt to gain access, or malicious programs, spyware and viruses infect your email and Internet resources. Configure your computer to apply critical updates as soon as they are available. These include patches for operating system and applications, antivirus pattern files, and filters for spam and spyware.
Doors and windows include physical locks on your computer or keyboard, strong passwords, and limited permissions. Permissions determine which files and folders are shared, who can access them, and level of access for each user (read-only or read and write). There are also ways to “harden” software to reduce vulnerabilities.
Communication ports used for email and internet are like windows into your computer. Protect them with antivirus and filters for spyware and spam.
Valuables that require special protection include personal, business and financial data. Protected against intruders (hackers) and unauthorized users by strong passwords and encryption. Internet Protocol Security (IPSec) and encryption are advised whenever data is transmitted across a network.
Strangers include emails from unknown sources and visits to URLs without certificates. (Certificates are credentials that identify trustworthy websites.)
Security services include antivirus, spyware detectors, and spam filters to eliminate unwanted email.
Vigilance and commonsense. Use the following procedures to guard against infection:
Yes, you can protect your computer and your data.
Follow these steps and it is unlikely that your computer, or your distance learning courses, will be compromised.
|May 2004 Index|