1楼 hzshelby
 等级:小学生 发帖数:10 回帖数:25
| 发帖时间 - 2006/1/18 16:40:20 | HOW TO PROTECT your data Nobody’s data is completely safe. But everybody’s computer can still be well guarded against would-be attackers Here’s your arsenal: Password protection At minimum, each time they log on, all PC users should be required to type in a passwords that only they and the network administrator know. PC users should. Avoid picking words, phrases, or numbers that anyone can guess easily, such as a birth date, a child’s name, or initials; instead they should use cryptic phrases combine uppercase and lowercase letters, such as “the moon also RISES.” In addition, the system should require all users to change passwords every month or so and should lock out prospective users if they fail to enter the correct password three times in a row. Virus checkers Viruses generally infect local area networks through workstations, so antivirus software packages that work only on the server aren’t enough to prevent infection; ideally, all terminals on the network—personal computers as well as dumb workstations—should be protected individually. Fire wall These are gatekeepers made of hardware and software that protect a computer network by shutting out unauthorized people and letting others go only to the areas they have privileges to use. Firewalls should be installed at every point where the computer system comes in contact with other networks—including the internet, a separate local area network at a customer’s site, or a telephone company switch. Encryption Even if intruders manage to break through a firewall, the data on a network can be made safe if it’s encrypted. Many software packages and network programs—Microsoft Windows NT, Novell Net-Ware, and Lotus Notes, among others—offer add-on encryption schemes that encode all data sent on the network. In addition, companies can buy stand-alone encryption packages to work with individual applications. Almost every encryption package is based on an approach known as public-private key. Almost all firewalls, encryption program, and password schemes include an auditing function that records activities on the network. This log—which, ironically, is turned off by many network administrators who don’t appreciate its importance—is an excellent way of recording what occurred during an attack by hackers.
------------------ ...
| |