{"id":327,"date":"2015-10-05T17:42:51","date_gmt":"2015-10-05T17:42:51","guid":{"rendered":"https:\/\/courses.candelalearning.com\/informationliteracyxmaster\/?post_type=chapter&#038;p=327"},"modified":"2016-04-14T18:11:44","modified_gmt":"2016-04-14T18:11:44","slug":"computer-security","status":"publish","type":"chapter","link":"https:\/\/courses.lumenlearning.com\/suny-buffstate-informationliteracy\/chapter\/computer-security\/","title":{"raw":"Computer Security","rendered":"Computer Security"},"content":{"raw":"<b>Computer security<\/b> is a branch of information technology known as information security which is intended to protect computers. Computer security has three main goals:\r\n<ul>\r\n\t<li>Confidentiality: Making sure people cannot acquire information they should not (<i>keeping secrets<\/i>)<\/li>\r\n\t<li>Integrity: Making sure people cannot change information they should not (<i>protecting data<\/i>)<\/li>\r\n\t<li>Availability: Making sure people cannot stop the computer from doing its job.<\/li>\r\n<\/ul>\r\nComputer security involves telling computers what they are <i>not to do<\/i>. This makes computer security unique because most programming makes computers <i>do<\/i> things. Security takes much of a computers power.\r\n\r\nBasic computer security methods (in approximate order of strength) can be:\r\n<ul>\r\n\t<li>Limit access to computers to \"safe\" users.<\/li>\r\n\t<li>Peripherals which block any \"unsafe\" activity.<\/li>\r\n\t<li>Firewall and antivirus software.<\/li>\r\n<\/ul>\r\nAn example of complexity and pervasiveness of the\u00a0issue\u00a0is vending machines, per <a class=\"external text\" href=\"http:\/\/www.nytimes.com\/2014\/04\/08\/technology\/the-spy-in-the-soda-machine.html\" rel=\"nofollow\"><i>Hackers Lurking in Vents and Soda Machines<\/i><\/a> April 7, 2014 New York Times.\r\n<h2>Malware<\/h2>\r\n[caption id=\"attachment_328\" align=\"alignright\" width=\"250\"]<img class=\"wp-image-328\" src=\"https:\/\/s3-us-west-2.amazonaws.com\/courses-images-archive-read-only\/wp-content\/uploads\/sites\/939\/2015\/10\/26001833\/Malware_logo.svg_.png\" alt=\"Illustration of a computer with a skull and crossbones displayed on the monitor.\" width=\"250\" height=\"258\" \/> Malware takes over computers without a user knowing.[\/caption]\r\n\r\n<b>Malware<\/b>, short for <b>malicious software<\/b>, is a kind of software that can be installed on a computer without approval from the computer's owner. There are different kinds of malware that can hurt computers, such as viruses and spyware. These programs can steal passwords, delete files, collect personal information, or even stop a computer from working at all. Computer security or anti-malware software is usually good at stopping malware from installing itself. When security software isn't installed, malware can get into the computer. Getting rid of malware can be difficult, even when using programs designed to remove it.\r\n<h3>History<\/h3>\r\nPeople first started writing malware in the 1970s and early 1980s. Computers were very simple then. They did not have any interesting information for malware to take. Instead, people wrote malware for fun[footnote]Leyden, John. <a class=\"external text\" href=\"http:\/\/www.theregister.co.uk\/2012\/12\/14\/first_virus_elk_cloner_creator_interviewed\/\" rel=\"nofollow\">\"The 30-year-old prank that became the first computer virus\"<\/a>. The Register<span class=\"reference-accessdate\">. Retrieved 1 November 2014<\/span>.[\/footnote]\u00a0or just to show that they could.[footnote]Dalakov, Georgi. <a class=\"external text\" href=\"http:\/\/history-computer.com\/Internet\/Maturing\/Thomas.html\" rel=\"nofollow\">\"First computer virus of Bob Thomas\"<\/a><span class=\"reference-accessdate\">. Retrieved 1 November 2014<\/span>.[\/footnote]\u00a0Even the most common piece of malware from this time did not do damage to people's computers.[footnote]Lee, Timothy. <a class=\"external text\" href=\"http:\/\/www.washingtonpost.com\/blogs\/the-switch\/wp\/2013\/11\/01\/how-a-grad-student-trying-to-build-the-first-botnet-brought-the-internet-to-its-knees\/\" rel=\"nofollow\">\"How a grad student trying to build the first botnet brought the Internet to its knees\"<\/a>. Washington Post Company<span class=\"reference-accessdate\">. Retrieved 1 November 2014<\/span>.[\/footnote]\u00a0In fact, malware was so rare that the word \"malware\" was not\u00a0coined until 1990.[footnote]Messmer, Ellen. <a class=\"external text\" href=\"http:\/\/www.pcworld.com\/article\/147698\/tech.html\" rel=\"nofollow\">\"Tech Talk: Where'd it Come From, Anyway?\"<\/a>. IDG Consumer &amp; SMB<span class=\"reference-accessdate\">. Retrieved 11 November 2014<\/span>.[\/footnote]\r\n\r\nMore people started using the computers in the late 1990s and early 2000s. Computers were getting more complex just as fast.[footnote]File, Thom. <a class=\"external text\" href=\"http:\/\/www.census.gov\/prod\/2013pubs\/p20-569.pdf\" rel=\"nofollow\">\"Computer and Internet Use in the United States\"<\/a>. U.S. Census Bureau<span class=\"reference-accessdate\">. Retrieved 11 November 2014<\/span>.[\/footnote]\u00a0People saw that they could use malware to get useful information now, like passwords and credit card information. So, more programmers started writing malware. The number of malware programs on the Internet has grown very quickly ever since then the late 1990s and is still growing today.[footnote]<a class=\"external text\" href=\"http:\/\/www.microsoft.com\/security\/sir\/story\/#!10year\" rel=\"nofollow\">\"The Evolution of Malware and the Threat Landscape \u2013 a 10-Year review\"<\/a>. Microsoft Incorporated<span class=\"reference-accessdate\">. Retrieved 11 November 2014<\/span>.[\/footnote]\u00a0Experts think that 31.5% of the world's computers have some type of malware installed.[footnote]<a class=\"external text\" href=\"http:\/\/mediacenter.pandasecurity.com\/mediacenter\/wp-content\/uploads\/2014\/07\/Annual-Report-PandaLabs-2013.pdf\" rel=\"nofollow\">\"Annual Report PandaLabs 2013 Summary\"<\/a>. Panda Security<span class=\"reference-accessdate\">. Retrieved 15 November 2014<\/span>.[\/footnote]\r\n<h3>Purposes<\/h3>\r\nThe main reason people write malware is to hurt others and make money, usually by stealing or deleting important information. The Cryptolocker computer virus, for example, makes it so a person cannot use their own computer until they pay the malware writers for a software key to unlock it.[footnote] Cannell, Joshua. <a class=\"external text\" href=\"https:\/\/blog.malwarebytes.org\/intelligence\/2013\/10\/cryptolocker-ransomware-what-you-need-to-know\/\" rel=\"nofollow\">\"Cryptolocker Ransomware: What You Need To Know\"<\/a>. Malwarebytes Corporation<span class=\"reference-accessdate\">. Retrieved 1 November 2014<\/span>.[\/footnote]\u00a0Another virus, CIH, tries to make it so the victim can never use their files or turn on their computer again.[footnote]<a class=\"external text\" href=\"http:\/\/www.f-secure.com\/v-descs\/cih.shtml\" rel=\"nofollow\">\"Virus: DOS\/CIH\"<\/a>. F-Secure Corporation<span class=\"reference-accessdate\">. Retrieved 1 November 2014<\/span>.[\/footnote]<span style=\"font-size: 13.3333px; line-height: 20px;\">\u00a0<\/span>Malicious keystroke logging software remembers everything a user types in and gives it to the malware author to read.[footnote]Grebennikov, Nikolay. <a class=\"external text\" href=\"http:\/\/securelist.com\/analysis\/publications\/36138\/keyloggers-how-they-work-and-how-to-detect-them-part-1\/\" rel=\"nofollow\">\"Keyloggers: How they work and how to detect them (Part 1)\"<\/a>. Kaspersky Labs<span class=\"reference-accessdate\">. Retrieved 11 November 2014<\/span>.[\/footnote]\r\n\r\nWorld governments have written malware to hurt their enemies. Experts think that the United States government made a virus named Stuxnet to stop an important place in Iran from working.[footnote]Kushner, David. <a class=\"external text\" href=\"http:\/\/spectrum.ieee.org\/telecom\/security\/the-real-story-of-stuxnet\" rel=\"nofollow\">\"The Real Story of Stuxnet\"<\/a>. IEEE<span class=\"reference-accessdate\">. Retrieved 1 November 2014<\/span>.[\/footnote]\u00a0The\u00a0Chinese government probably used a virus to stop people from protesting its decisions.[footnote]Greenberg, Andy. <a class=\"external text\" href=\"http:\/\/www.forbes.com\/sites\/andygreenberg\/2013\/04\/01\/evidence-mounts-that-chinese-government-hackers-spread-android-malware\/\" rel=\"nofollow\">\"Evidence Mounts That Chinese Government Hackers Spread Android Malware\"<\/a>. Forbes Media<span class=\"reference-accessdate\">. Retrieved 1 November 2014<\/span>.[\/footnote]\r\n<h3>How Malware Gets Installed<\/h3>\r\nThere are a lot of ways malware can get onto someone's computer. One common way is through email attachments. These attachments are usually sent from other computers that already have malware on them.[footnote]<a class=\"external text\" href=\"http:\/\/www.combofix.org\/how-malware-attacks-and-spreads-in-your-computer.php\" rel=\"nofollow\">\"How Malware Attacks And Spreads In Your Computer\"<\/a>. Combofix<span class=\"reference-accessdate\">. Retrieved 2 November 2014<\/span>.[\/footnote]\u00a0When someone downloads and opens the attachment, the virus installs and uses their computer to send itself to even more people.\r\n\r\nAnother way malware installs itself is when a victim gets malware just by going to a website with the malware hidden on it. This is called drive-by downloading. A user does not have to click anything for their computer to get infected from a drive-by download.[footnote]Siciliano, Robert. <a class=\"external text\" href=\"http:\/\/blogs.mcafee.com\/consumer\/drive-by-download\" rel=\"nofollow\">\"What is a \u201cDrive-By\u201d Download?\"<\/a>. McAfee Incorporated<span class=\"reference-accessdate\">. Retrieved 2 November 2014<\/span>.[\/footnote]\u00a0This kind of malware attack is usually found on websites that are not used a lot or whose security methods are very old. However, even current websites that people use all the time can host drive-by downloads when someone hacks the site.\r\n\r\nPeople who write malware also get their programs onto computers by attaching them to real programs that people want. This is most common with pirated programs. This is because the downloader was doing something illegal and cannot complain to the authorities without getting in trouble themselves.[footnote]\"How Malware Attacks And Spreads In Your Computer.\"[\/footnote]\u00a0However, some non-piracy websites also put malware (or other unwanted programs that are almost as bad as malware) in a download with real, legal software in a process known as bundling.\u00a0Computer security experts complain about websites that bundle real software with malware. Their complaints do not always stop the websites from bundling.[footnote]Lemos, Robert. <a class=\"external text\" href=\"http:\/\/www.infoworld.com\/article\/2618688\/antimalware\/security-pros-slam-cnet-download-com-s-bundling.html\" rel=\"nofollow\">\"Security pros slam Cnet Download.com's bundling\"<\/a>. InfoWorld Incorporated<span class=\"reference-accessdate\">. Retrieved 2 November 2014<\/span>.[\/footnote]\r\n<h3>Kinds of Malware<\/h3>\r\nThere are many different kinds of malware. Each acts a different way.\r\n<ul>\r\n\t<li>Viruses are a kind of malware that need a user-run program to work.[footnote]<a class=\"external text\" href=\"http:\/\/www.cisco.com\/web\/about\/security\/intelligence\/virus-worm-diffs.html\" rel=\"nofollow\">\"What Is the Difference: Viruses, Worms, Trojans, and Bots?\"<\/a>. Cisco Systems, Incorporated<span class=\"reference-accessdate\">. Retrieved 3 November 2014<\/span>.[\/footnote]\u00a0They cannot copy themselves or move from one computer to another without a program to host it. Viruses are very common in pirated programs.[footnote]\"How Malware Attacks And Spreads In Your Computer.\"[\/footnote]\u00a0They can harm computers in many different ways, like deleting files and stealing passwords.[footnote]\"What Is the Difference: Viruses, Worms, Trojans, and Bots?\"[\/footnote]<\/li>\r\n\t<li>Worms are a lot like viruses and can cause the same kinds of damage. However, they're able to move through the internet and copy themselves onto computers without help from a host program. This makes them more dangerous than a virus.[footnote]\"What Is the Difference: Viruses, Worms, Trojans, and Bots?\"[\/footnote]\u00a0Worms are usually found in emails and drive-by downloads.[footnote]Siciliano, Robert.[\/footnote]<\/li>\r\n\t<li>Trojan horses are like a much more dangerous version of a virus. They need a user to agree to run a program to work and cannot copy themselves from one computer to another.\u00a0However, trojan horses can make the same problems a normal virus can make. They can also allow the malware writer to control the victim's computer, install more malware, steal bank data, and more.[footnote]<a class=\"external text\" href=\"http:\/\/www.kaspersky.com\/internet-security-center\/threats\/trojans\" rel=\"nofollow\">\"What is a Trojan Virus?\"<\/a>. Kaspersky Lab<span class=\"reference-accessdate\">. Retrieved 3 November 2014<\/span>.[\/footnote]\u00a0For example, ransomware is a type of trojan horse that stops a victim from using their files until they pay the person who wrote the malware.[footnote]Cannell, Joshua.[\/footnote]\u00a0Experts think that trojan horses are the most common type of malware in existence.[footnote]\"Annual Report PandaLabs 2013 Summary.\"[\/footnote]<\/li>\r\n\t<li>Adware is a type of malware that earns the program authors money with advertising. These programs show users ads and force them to use websites that make money for the malware writers. Adware will also find personal information about the victim (such as their age, race, and job). This is so the malware authors can sell the information to other people.[footnote]<a class=\"external text\" href=\"http:\/\/www.kaspersky.com\/internet-security-center\/threats\/adware\" rel=\"nofollow\">\"What is Adware?\"<\/a>. Kaspersky Labs<span class=\"reference-accessdate\">. Retrieved 3 November 2014<\/span>.[\/footnote]\u00a0A user can usually uninstall adware easier than most malware. However, this is still difficult to do without a specially-designed program.[footnote]<a class=\"external text\" href=\"http:\/\/www.bleepingcomputer.com\/virus-removal\/adware\" rel=\"nofollow\">\"Adware\"<\/a>. Bleeping Computer LLC<span class=\"reference-accessdate\">. Retrieved 3 November 2014<\/span>.[\/footnote]<\/li>\r\n\t<li>Spyware is a more dangerous kind of adware that steals more information from a user. Spyware can steal someone's Internet traffic, account passwords, and anything they have typed into their computers. Spyware is also much harder to uninstall than adware is.[footnote]Beal, Vangie. <a class=\"external text\" href=\"http:\/\/www.webopedia.com\/DidYouKnow\/Internet\/spyware.asp\" rel=\"nofollow\">\"The Difference Between Adware &amp; Spyware\"<\/a>. Quinstreet Incorporated<span class=\"reference-accessdate\">. Retrieved 3 November 2014<\/span>.[\/footnote]<\/li>\r\n<\/ul>\r\n<h3>Why Computers get Malware<\/h3>\r\nThere are a few reasons why computers get programs a user didn't mean to install. One common reason is because of regular programs that have software bugs. Malware can use bugs, such as a buffer overflow, to make a program do something it was not designed to do.[footnote]Schwarz, Thomas. <a class=\"external text\" href=\"http:\/\/www.cse.scu.edu\/~tschwarz\/coen152_05\/Lectures\/BufferOverflow.html\" rel=\"nofollow\">\"Buffer Overflow Attack\"<\/a>. COEN, SCU<span class=\"reference-accessdate\">. Retrieved 6 November 2014<\/span>.[\/footnote]\u00a0Malware can also get onto a computer if it tricks a user into putting it there themselves. This can happen when a user plugs in a\u00a0USB flash drive that has a virus on it already.[footnote]Mills, Elinor. <a class=\"external text\" href=\"http:\/\/www.cnet.com\/uk\/news\/usb-devices-spreading-viruses\/\" rel=\"nofollow\">\"USB devices spreading viruses\"<\/a>. CBS Interactive Incorporated<span class=\"reference-accessdate\">. Retrieved 6 November 2014<\/span>.[\/footnote]\u00a0Malware also commonly uses social engineering to get users to run it, like pretending to be an important email attachment for work. Some malware even pretends to be an anti-malware program to get people to run it.[footnote]<a class=\"external text\" href=\"http:\/\/usa.kaspersky.com\/internet-security-center\/threats\/malware-social-engineering\" rel=\"nofollow\">\"Social Engineering\"<\/a>. Kaspersky Labs<span class=\"reference-accessdate\">. Retrieved 6 November 2014<\/span>.[\/footnote]\r\n<h3>How Malware is Stopped<\/h3>\r\nSince malware is such a big problem, many companies make programs to try to stop it. These anti-malware programs have a lot of different ways to find malware. One is static analysis, which looks at the\u00a0source code of a program before it is run. Then, if the program is similar to malware the static analysis program has seen before, the anti-malware program will stop the code from running.\u00a0Another way of finding malware is dynamic analysis. Dynamic analysis runs only part of a program it is checking. If this part of the program tries to do anything that could be bad or harmful, the anti-malware program will not let the program run.[footnote]<a class=\"external text\" href=\"http:\/\/support.kaspersky.com\/6324\" rel=\"nofollow\">\"Heuristic analysis in Kaspersky Internet Security 2012\"<\/a>. Kaspersky Lab<span class=\"reference-accessdate\">. Retrieved 4 November 2014<\/span>.[\/footnote]\r\n\r\nMalware can also be stopped without a program. This can be done by not letting a computer connect to the Internet or other computers, called creating an air gap.[footnote]<a class=\"external text\" href=\"http:\/\/www.techopedia.com\/definition\/17037\/air-gap\" rel=\"nofollow\">\"Air Gap\"<\/a>. Janalta Interactive Incorporated<span class=\"reference-accessdate\">. Retrieved 6 November 2014<\/span>.[\/footnote]\u00a0However, these computers can still get malware if someone puts it there another way. One example is when someone plugs in a USB drive that was already plugged into a computer with a virus.[footnote]Mills, Elinor.[\/footnote]\r\n<h2>HTTP cookie<\/h2>\r\nAn <b>HTTP cookie<\/b> (usually just called a <b>cookie<\/b>) is a simple computer file made of text. The information stored in cookies can be used to personalise the experience when using a website. A website can use cookies to find out if someone has visited a website before and record information (data) about what they did.\r\n\r\nWhen someone is using a computer to browse a website, a personalised cookie file can be sent from the website\u2019s server to the person\u2019s computer. The cookie is stored in the web browser on the person\u2019s computer. At some time in the future, the person may browse that website again. The website can send a message to the person\u2019s browser, asking if a cookie from the website is already stored in the browser. If a cookie is found, then the data that was stored in the cookie before can be used by the website to tell the website about the person\u2019s previous activity. Some examples where cookies are used include shopping carts, automatic login and remembering which advertisements have already been shown.\r\n\r\nCookies have been a problem for Internet privacy. This is because they can be used to track browsing behavior. Because of this, laws have been made in some countries to protect people's privacy. There are many other options than cookies, but each option has its own problems.\r\n\r\nCookies have often been mistaken for computer programs. But cookies cannot do much on their own. They are simply a piece of data. They are often called spyware or viruses, but they are not either of these.\r\n\r\nMost web browsers allow users to choose whether to accept cookies. If the user does not allow cookies, some websites will become unusable. For example, shopping baskets which use cookies do not work if the user does not allow cookies.\r\n<h2>Protocols<\/h2>\r\n<h3>Hypertext Transfer Protocol<\/h3>\r\n<b>Hypertext Transfer Protocol<\/b> (often abbreviated to <b>HTTP<\/b>) is a communications protocol. It is used to send and receive webpages and files on the internet. It was developed by Tim Berners-Lee and is now coordinated by the W3C. HTTP version 1.1 is the most common used version today. It is defined in RFC 2616.\r\n\r\nHTTP works by using a <strong>user agent<\/strong> to connect to a server. The user agent could be a web browser or spider. The server must be located using a URL or URI. This always contains <tt>http:\/\/<\/tt> at the start. It normally connects to port 80 on a computer.\r\n\r\nA more secure version of HTTP is called <i>HTTPS<\/i>. This contains <tt>https:\/\/<\/tt> at the beginning of the URL. It encrypts all the information that is sent and received. This can stop malicious users such as hackers from stealing the information. HTTPS is often used on payment websites.\r\n<h4>Request Message<\/h4>\r\nThe request message contains the following:\r\n<ul>\r\n\t<li>Request line, such as <tt>GET \/images\/logo.gif HTTP\/1.1<\/tt>, which requests the file <tt>logo.gif<\/tt> from the <tt>\/images<\/tt> directory<\/li>\r\n\t<li>Headers, such as <tt>Accept-Language: en<\/tt><\/li>\r\n\t<li>An empty line<\/li>\r\n\t<li>An optional message body<\/li>\r\n<\/ul>\r\nThe request line and headers must all end with two characters: a carriage return followed by a line feed, often written &lt;CR&gt;&lt;LF&gt;. The empty line must consist of only &lt;CR&gt;&lt;LF&gt; and no other whitespace. In the HTTP\/1.1 protocol, all headers except Host are optional.\r\n\r\nA request line containing only the path name is accepted by servers to maintain compatibility with HTTP clients before the HTTP\/1.0 standard. Even this site has a HTTP at its beginning.\r\n<h3>Wired Equivalent Privacy<\/h3>\r\n<b>Wired Equivalent Privacy<\/b> (also known as <b>WEP<\/b>) is a standard to use encryption in Wireless LANs. It was introduced in 1999.\r\n\r\nIn 2001, mathematicians showed that WEP is not very strong. A WEP connection could be decoded, with software that can be easily found, within minutes.[footnote]Nikita Borisov, Ian Goldberg, David Wagner. \"<i><a class=\"external text\" href=\"http:\/\/www.isaac.cs.berkeley.edu\/isaac\/mobicom.pdf\" rel=\"nofollow\">Intercepting Mobile Communications: The Insecurity of 802.11<\/a><\/i>\". Retrieved on 12 September 2006.[\/footnote]\u00a0Because of this finding, IEEE created a new\u00a0802.11i group to fix the problems. By 2003, the Wi-Fi Alliance announced that Wi-Fi Protected Access (WPA) would replace WEP, which was a subset of then upcoming 802.11i amendment. Finally in 2004, they made it official and said that it would go ahead. It was part of the full 802.11i standard (also known as WPA2), the IEEE declared that both WEP-40 and WEP-104 are not recommended because they are not secure enough.[footnote]<a class=\"external text\" href=\"http:\/\/lirent.net\/wifi\/what-is-a-wep-key.html\" rel=\"nofollow\">\"What is a WEP key?\"<\/a>. lirent.net<span class=\"reference-accessdate\">. Retrieved on 11 March 2008<\/span>.[\/footnote]\r\n\r\nEven though it only offers low security, WEP is still widely in use.[footnote]<a class=\"external text\" href=\"http:\/\/www.rsa.com\/press_release.aspx?id=8451\" rel=\"nofollow\">\"Wireless Adoption Leaps Ahead, Advanced Encryption Gains Ground in the Post-WEP Era\"<\/a>. RSA.com<span class=\"reference-accessdate\">. Retrieved on 11 March 2008<\/span>.[\/footnote]\u00a0WEP is often the first security choice presented to users by router configuration tools even. Today, WEP provides a level of security that deters only accidental use. As a result, people can invade and enter the network.[footnote]Andrea Bittau, Mark Handley, Joshua Lackey. \"<i><a class=\"external text\" href=\"http:\/\/www.cs.ucl.ac.uk\/staff\/M.Handley\/papers\/fragmentation.pdf\" rel=\"nofollow\">The Final Nail in WEP's Coffin<\/a><\/i>\". Retrieved on 16 March 2008.[\/footnote]\r\n\r\nPeople sometimes call it <i>Wireless Encryption Protocol<\/i>, which is wrong.\r\n<h3>Wi-Fi Protected Access<\/h3>\r\n<b>Wi-Fi Protected Access<\/b> (also known as <b>WPA<\/b> and <b>WPA2<\/b>) is the name for a number of standards to use encryption on a Wireless LAN. The standards were created because researchers had found several weaknesses in Wired Equivalent Privacy. Wired Equivalent Privacy, or <i>WEP<\/i> was the standard that came before it. The protocol <i>WPA2<\/i> implements most of the standard IEEE 802.11i.\r\n\r\nProducts that have the label <i>WPA<\/i> were designed to work with most cards, even those that came out before there was WPA. This is not true for access points though.\r\n\r\nProducts with the <i>WPA2<\/i> implement all of the standard. This is more secure, but it may not work with some older cards.\r\n<h2>Protection<\/h2>\r\n<h3>Encryption<\/h3>\r\n<b>Encryption<\/b> is a method which allows information (for example, a secret message) to be hidden so that it cannot be read without special knowledge (such as a password). Once this is done, using a secret\u00a0code or cypher, the information is <b>encrypted<\/b>. <b>Decryption<\/b> is a way to change an encrypted piece of information back into unencrypted form. This is called the <b>decrypted<\/b> form. The study of encryption is called cryptography.\r\n<h4>Examples<\/h4>\r\nA simple kind of encryption for words is ROT13. In ROT13, letters of the alphabet are changed with each other using a simple pattern. For example, <i>A<\/i> changes to <i>N<\/i>, <i>B<\/i> changes to <i>O<\/i>, <i>C<\/i> changes to <i>P<\/i>, and so on. Each letter is \"rotated\" by 13 spaces. Using the ROT13 cipher, the words <i>Simple English Wikipedia<\/i> becomes <i>Fvzcyr Ratyvfu Jvxvcrqvn<\/i>. The ROT13 cipher is very easy to decrypt. Because there are 26 letters in the English alphabet, if a letter is rotated two times by 13 letters each time, the original letter will be obtained. So applying the ROT13 cipher a second time brings back the original text. When he communicated with his army, Julius Caesar sometimes used what is known as Caesar cipher today. This cipher works by shifting the position of letters: each letter is rotated by 3 positions.\r\n\r\nMost kinds of encryption are more complex. Some are made only for text. Others are made for binary computer files like pictures and music. Today, the asymmetric encryption system used the most is\u00a0RSA. Any computer file can be encrypted with RSA. AES is a common symmetric algorithm.\r\n<h4>One-Time Pad<\/h4>\r\nMost types of encryption can theoretically be cracked: an enemy might be able to decrypt a message without knowing the password, if he has clever mathematicians, powerful computers and lots of time. The one-time pad is special because, if it is used correctly, it is impossible to crack. There are three rules that must be followed:\r\n<ul>\r\n\t<li>The secret key (password) must be longer than the secret message: if the message has 20 letters then the key must also have at least 20 letters.<\/li>\r\n\t<li>The secret key must be a random list of letters (e.g. KQBWLDA...)<\/li>\r\n\t<li>The secret key must only be used once. To send more than one message, a different key must be used for each one.<\/li>\r\n<\/ul>\r\nIf these three rules are obeyed, then it is impossible to read the secret message without knowing the secret key. For this reason, during the Cold War, embassies and large military units often used one-time pads to communicate secretly with their governments. They had little books (\"pads\") filled with random letters or random numbers. Each page from the pad could only be used once: this is why it is called a \"one-time pad\".\r\n<h4>Encryption on the Internet<\/h4>\r\nEncryption is often used on the Internet, as many web sites use it to protect private information. On the Internet, several encryption protocols are used, such as Secure Sockets Layer (SSL), IPsec, andSSH. They use the RSA encryption system and others. The protocol for protected web browsing is called HTTPS. Mostly URL encryption contain MD5 Algorithm. Various algorithms are used in the internet market depending upon the need.\r\n<h3>Antivirus Software<\/h3>\r\n<b>Antivirus software<\/b>, if properly installed on a computer system, can prevent access to computer systems by unwanted computer programs. Viruses, worms or Trojan Horses can be used by criminals or mischievous people (called Crackers). They can be used to steal information or damage computer systems. If no antivirus software is installed, hackers may be able to access the information in the computer.\r\n\r\nMost tests and experts claim that antivirus software is unable to prevent all attacks.[footnote]Shaw, Gordon. <a href=\"https:\/\/www.virusbtn.com\/blog\/2008\/09_02\" target=\"_blank\">\"AV-Test release latest results.\"<\/a> <em>Virus Bulletin<\/em>. Retrieved 8 March 2009.[\/footnote]\u00a0There are many different types of antivirus software. Many Antivirus programs can be downloaded for free. These versions usually have some features missing. The missing features are only available to those who buy the \"full\" version.\r\n\r\nAntivirus software uses many ways to protect the computer. They often search for signs of viruses in every website that is visited. Most also do a regular scan of all the data and files on the computer's hard disk.\r\n\r\nInstalling more than one antivirus is not a good idea. The 2 different antivirus software can interfere with each other.\r\n<h4>Problems with Antivirus Software<\/h4>\r\nAntivirus software can not always detect all viruses on a computer.\r\n\r\nSometimes antivirus software sees viruses in files that do not really have viruses. This is called a false positive.[footnote]<a href=\"http:\/\/www.offlinetalk.com\/index.php\/topic,106.msg169.html\">http:\/\/www.offlinetalk.com\/index.php\/topic,106.msg169.html<\/a>[\/footnote]\u00a0The antivirus software will sometimes remove files from the computer that should not be removed. This may cause other programs to not work properly.\r\n<h3>Firewall (Networking)<\/h3>\r\n[caption id=\"attachment_329\" align=\"alignright\" width=\"300\"]<img class=\"wp-image-329\" src=\"https:\/\/s3-us-west-2.amazonaws.com\/courses-images-archive-read-only\/wp-content\/uploads\/sites\/939\/2015\/10\/26001834\/800px-Gateway_firewall.svg_.png\" alt=\"Gateway firewall is located between the local area network (LAN) and the WAN. The LAN should be protected from attacks.\" width=\"300\" height=\"210\" \/> A Firewall protects a number of computers on a LAN against unauthorised access.[\/caption]\r\n\r\nOriginally, a <i>firewall<\/i> was a wall that was built to stop (or slow down) the spread of a fire. In terms of computer security, a <b>firewall<\/b> is a piece of software. This software monitors the network traffic. A firewall has a set of rules which are applied to each packet. The rules decide if a packet can pass, or whether it is discarded. Usually a firewall is placed between a network that is trusted, and one that is less trusted. When a large network needs to be protected, the firewall software often runs on a dedicated hardware, which does nothing else.\r\n\r\nA firewall protects one part of the network against unauthorized access.\r\n<h4>Different Kinds of Firewalls<\/h4>\r\n<ul>\r\n\t<li><strong><span id=\"Packet_filtering\" class=\"mw-headline\">Packet filtering.\u00a0<\/span><\/strong>Data travels on the internet in small pieces; these are called packets. Each packet has certain metadata attached, like where it is coming from, and where it should be sent to. The easiest thing to do is to look at the metadata. Based on rules, certain packets are then dropped or rejected. All firewalls can do this.it is known as network layer<\/li>\r\n\t<li><strong><span id=\"Stateful_packet_inspection\" class=\"mw-headline\">Stateful packet inspection.\u00a0<\/span><\/strong>In addition to the simple packet filtering (above) this kind of firewall also keeps track of connections. A packet can be the start of a new connection, or it can be part of an existing connection. If it is neither of the two, it is probably useless and can be dropped.<\/li>\r\n\t<li><strong><span id=\"Application-layer_firewalls\" class=\"mw-headline\">Application-layer firewalls.\u00a0<\/span><\/strong>Application-layer firewalls do not just look at the metadata; they also look at the actual data transported. They know how certain protocols work, for example FTP or HTTP. They can then look if the data that is in the packet is valid (for that protocol). If it is not, it can be dropped.<\/li>\r\n<\/ul>\r\n<h4>Other Things Firewalls Are Used For<\/h4>\r\nFirewalls can provide a secure connection between two networks. This is called <i>tunnelling<\/i>. The data may be encrypted. It is unencrypted at the other end. Since the firewalls are doing this, the rest of the network is unaware of it. An alternative is to provide a secure access (to the corporate network).\r\n<h4>Network Address Translation<\/h4>\r\nVery often, firewalls can translate IP addresses. That way, many computers can share a few public IP addresses. The firewall translates between the public and the private IP addresses.\r\n<h4>Types of Firewalls<\/h4>\r\nIn general, there are two types of firewalls:\r\n<ul>\r\n\t<li>Software-based firewalls: these are often run as additional programs on computers that are used for other things. They are often known as <i>personal firewalls<\/i> which can be updates on personal computers.<\/li>\r\n<\/ul>\r\n<ul>\r\n\t<li>Hardware-based firewalls: Hardware based firewalls run on a dedicated computer (or appliance). Often, these offer a better performance than software firewalls, but they are also more expensive.<\/li>\r\n<\/ul>\r\n<h4>What Firewalls Cannot Protect Against<\/h4>\r\nFirewalls can protect against some problems (viruses and attacks) that come from the internet. They cannot protect against viruses, that come from infected media (like an infected office document on an\u00a0USB flash drive).\r\n<h2>Backup<\/h2>\r\n[caption id=\"attachment_330\" align=\"alignright\" width=\"300\"]<img class=\"wp-image-330\" src=\"https:\/\/s3-us-west-2.amazonaws.com\/courses-images-archive-read-only\/wp-content\/uploads\/sites\/939\/2015\/10\/26001836\/622px-Backup_Backup_Backup_-_And_Test_Restores.jpg\" alt=\"A computer server that was destroyed in the Choteau fire in NE Oklahoma. There\u2019s a completely melted and nearly unrecognizable telephone on top.\" width=\"300\" height=\"289\" \/> This computer was used to store files, before the fire hit[\/caption]\r\n\r\nA\u00a0<b>backup<\/b> is a copy of some data. This copy can be used when the original data is changed, or lost. Losing data is common: A 2008 survey found that two thirds of respondents had lost files on their home PC.[footnote]<a class=\"external text\" href=\"http:\/\/www.kabooza.com\/globalsurvey.html\" rel=\"nofollow\">Global Backup Survey<\/a>. Retrieved on 15 February 2009[\/footnote]\u00a0Another purpose of backing up data is to have a copy that represents an earlier state of the data, before it was changed. Organisations may have rules which state how long data should be kept, and what kinds of data these rules apply to. In many countries there are rules that specify that certain kinds of data need to be kept for a given time. An example of this is the data used for\u00a0accounting.\r\n\r\nBackups are a simple form of disaster recovery. Even though they are commonly seen as disaster recovery, they should be part of a disaster recovery plan. A disaster recovery plan is a documented set of procedures and tasks to perform to protect the consistency and integrity of a corporate IT system.\r\n<h3>Different Backup Media<\/h3>\r\nThere are different types of backup systems that use different kinds of media. Common backup media includes:\r\n<ul>\r\n\t<li>Different kinds of tapes, for example Digital Audio Tape, or LTO<\/li>\r\n\t<li>Hard disks<\/li>\r\n\t<li>Optical disks like CDs and DVDs<\/li>\r\n\t<li>Magneto-Optical Discs<\/li>\r\n\t<li>Emails<\/li>\r\n<\/ul>\r\n[caption id=\"attachment_331\" align=\"alignright\" width=\"300\"]<img class=\"wp-image-331\" src=\"https:\/\/s3-us-west-2.amazonaws.com\/courses-images-archive-read-only\/wp-content\/uploads\/sites\/939\/2015\/10\/26001837\/767px-Buffalo_LinkStation_Mini_and_a_PP3_battery.jpg\" alt=\"The Buffalo LinkStation Mini with a PP3 battery on the left side. This shows the small size of the NAS with its two 2.5 inch hard disks.\" width=\"300\" height=\"235\" \/> A portable hard drive[\/caption]\r\n\r\nSome of the backup media are portable, and can easily be stored in a safe location. The problem with storing tapes in a bank safe, for example is that they are only available during the opening hours of the bank.\r\n\r\nAnother issue has commonly been the speed of the backup. Media such as digital tapes can store a lot of data, but accessing them is realtively slow. Tapes can only be read or written in sequence, while media such as hard disks or optical drives are basically random access. When data is backed up, its encoding is often changed. This makes it possible to use codes such as Cyclic redundancy checks, which can detect, and sometimes repair an error.\r\n<h3>Reasons for Doing a Backup<\/h3>\r\nBackups are usually done for one of the following reasons:\r\n<ul>\r\n\t<li>Prevent data loss if there is a disaster (like a fire or hardware failure, or an intentional or unintentional deletion)<\/li>\r\n\t<li>Computer viruses or other programs make data unusable<\/li>\r\n\t<li>There is a logical error in the data<\/li>\r\n\t<li>Sudden computer shutdown which can be caused by power shortage.<\/li>\r\n<\/ul>\r\n<h3>Different Types of Backup<\/h3>\r\n<ul>\r\n\t<li>A <b>full backup<\/b> copies all of the data. This means that if the main copy of the data is lost, we can bring it all back simply by copying the data back from the backup.<\/li>\r\n\t<li>A <b>differential backup<\/b> only copies the data that has changed since the last full backup. The reason we do this is that sometimes only a small amount of data has changed since the last full backup; this means we can do a differential backup much more quickly.\u00a0If someone loses their data, and needs to get it back from a differential backup, they need to use the last full backup, to bring back all of their data. They then need to use the last differential backup to bring back everything that was changed between the full backup and the differential backup.<\/li>\r\n\t<li>An <b>incremental backup<\/b> only copies the data that has changed since the last incremental backup. This makes each backup quicker, because we are only copying what has changed since the last backup. To bring the data back, if the main copy of the data is lost, we need the last full backup, as well as all of the incremental backups that have been done since then. This means that bringing data back from an incremental backup is slower and more risky than differential or full backups.<\/li>\r\n<\/ul>\r\n<h3>How Long to Keep a Backup<\/h3>\r\nThe <b>Grandfather-father-son<\/b> system means that we keep different types of backup for different amounts of time. For example, we might do a backup every day, and keep a week's worth of backups. We might then keep one backup for each week for a month, and one backup from each month for a year. This means that we have a backup of our data from a year ago, so that if we realise we need some data from a long time ago, we have that data available. We also have several copies of our recent data, in case one of them doesn't work.","rendered":"<p><b>Computer security<\/b> is a branch of information technology known as information security which is intended to protect computers. Computer security has three main goals:<\/p>\n<ul>\n<li>Confidentiality: Making sure people cannot acquire information they should not (<i>keeping secrets<\/i>)<\/li>\n<li>Integrity: Making sure people cannot change information they should not (<i>protecting data<\/i>)<\/li>\n<li>Availability: Making sure people cannot stop the computer from doing its job.<\/li>\n<\/ul>\n<p>Computer security involves telling computers what they are <i>not to do<\/i>. This makes computer security unique because most programming makes computers <i>do<\/i> things. Security takes much of a computers power.<\/p>\n<p>Basic computer security methods (in approximate order of strength) can be:<\/p>\n<ul>\n<li>Limit access to computers to &#8220;safe&#8221; users.<\/li>\n<li>Peripherals which block any &#8220;unsafe&#8221; activity.<\/li>\n<li>Firewall and antivirus software.<\/li>\n<\/ul>\n<p>An example of complexity and pervasiveness of the\u00a0issue\u00a0is vending machines, per <a class=\"external text\" href=\"http:\/\/www.nytimes.com\/2014\/04\/08\/technology\/the-spy-in-the-soda-machine.html\" rel=\"nofollow\"><i>Hackers Lurking in Vents and Soda Machines<\/i><\/a> April 7, 2014 New York Times.<\/p>\n<h2>Malware<\/h2>\n<div id=\"attachment_328\" style=\"width: 260px\" class=\"wp-caption alignright\"><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-328\" class=\"wp-image-328\" src=\"https:\/\/s3-us-west-2.amazonaws.com\/courses-images-archive-read-only\/wp-content\/uploads\/sites\/939\/2015\/10\/26001833\/Malware_logo.svg_.png\" alt=\"Illustration of a computer with a skull and crossbones displayed on the monitor.\" width=\"250\" height=\"258\" \/><\/p>\n<p id=\"caption-attachment-328\" class=\"wp-caption-text\">Malware takes over computers without a user knowing.<\/p>\n<\/div>\n<p><b>Malware<\/b>, short for <b>malicious software<\/b>, is a kind of software that can be installed on a computer without approval from the computer&#8217;s owner. There are different kinds of malware that can hurt computers, such as viruses and spyware. These programs can steal passwords, delete files, collect personal information, or even stop a computer from working at all. Computer security or anti-malware software is usually good at stopping malware from installing itself. When security software isn&#8217;t installed, malware can get into the computer. Getting rid of malware can be difficult, even when using programs designed to remove it.<\/p>\n<h3>History<\/h3>\n<p>People first started writing malware in the 1970s and early 1980s. Computers were very simple then. They did not have any interesting information for malware to take. Instead, people wrote malware for fun<a class=\"footnote\" title=\"Leyden, John. &quot;The 30-year-old prank that became the first computer virus&quot;. The Register. Retrieved 1 November 2014.\" id=\"return-footnote-327-1\" href=\"#footnote-327-1\" aria-label=\"Footnote 1\"><sup class=\"footnote\">[1]<\/sup><\/a>\u00a0or just to show that they could.<a class=\"footnote\" title=\"Dalakov, Georgi. &quot;First computer virus of Bob Thomas&quot;. Retrieved 1 November 2014.\" id=\"return-footnote-327-2\" href=\"#footnote-327-2\" aria-label=\"Footnote 2\"><sup class=\"footnote\">[2]<\/sup><\/a>\u00a0Even the most common piece of malware from this time did not do damage to people&#8217;s computers.<a class=\"footnote\" title=\"Lee, Timothy. &quot;How a grad student trying to build the first botnet brought the Internet to its knees&quot;. Washington Post Company. Retrieved 1 November 2014.\" id=\"return-footnote-327-3\" href=\"#footnote-327-3\" aria-label=\"Footnote 3\"><sup class=\"footnote\">[3]<\/sup><\/a>\u00a0In fact, malware was so rare that the word &#8220;malware&#8221; was not\u00a0coined until 1990.<a class=\"footnote\" title=\"Messmer, Ellen. &quot;Tech Talk: Where'd it Come From, Anyway?&quot;. IDG Consumer &amp; SMB. Retrieved 11 November 2014.\" id=\"return-footnote-327-4\" href=\"#footnote-327-4\" aria-label=\"Footnote 4\"><sup class=\"footnote\">[4]<\/sup><\/a><\/p>\n<p>More people started using the computers in the late 1990s and early 2000s. Computers were getting more complex just as fast.<a class=\"footnote\" title=\"File, Thom. &quot;Computer and Internet Use in the United States&quot;. U.S. Census Bureau. Retrieved 11 November 2014.\" id=\"return-footnote-327-5\" href=\"#footnote-327-5\" aria-label=\"Footnote 5\"><sup class=\"footnote\">[5]<\/sup><\/a>\u00a0People saw that they could use malware to get useful information now, like passwords and credit card information. So, more programmers started writing malware. The number of malware programs on the Internet has grown very quickly ever since then the late 1990s and is still growing today.<a class=\"footnote\" title=\"&quot;The Evolution of Malware and the Threat Landscape \u2013 a 10-Year review&quot;. Microsoft Incorporated. Retrieved 11 November 2014.\" id=\"return-footnote-327-6\" href=\"#footnote-327-6\" aria-label=\"Footnote 6\"><sup class=\"footnote\">[6]<\/sup><\/a>\u00a0Experts think that 31.5% of the world&#8217;s computers have some type of malware installed.<a class=\"footnote\" title=\"&quot;Annual Report PandaLabs 2013 Summary&quot;. Panda Security. Retrieved 15 November 2014.\" id=\"return-footnote-327-7\" href=\"#footnote-327-7\" aria-label=\"Footnote 7\"><sup class=\"footnote\">[7]<\/sup><\/a><\/p>\n<h3>Purposes<\/h3>\n<p>The main reason people write malware is to hurt others and make money, usually by stealing or deleting important information. The Cryptolocker computer virus, for example, makes it so a person cannot use their own computer until they pay the malware writers for a software key to unlock it.<a class=\"footnote\" title=\"Cannell, Joshua. &quot;Cryptolocker Ransomware: What You Need To Know&quot;. Malwarebytes Corporation. Retrieved 1 November 2014.\" id=\"return-footnote-327-8\" href=\"#footnote-327-8\" aria-label=\"Footnote 8\"><sup class=\"footnote\">[8]<\/sup><\/a>\u00a0Another virus, CIH, tries to make it so the victim can never use their files or turn on their computer again.<a class=\"footnote\" title=\"&quot;Virus: DOS\/CIH&quot;. F-Secure Corporation. Retrieved 1 November 2014.\" id=\"return-footnote-327-9\" href=\"#footnote-327-9\" aria-label=\"Footnote 9\"><sup class=\"footnote\">[9]<\/sup><\/a><span style=\"font-size: 13.3333px; line-height: 20px;\">\u00a0<\/span>Malicious keystroke logging software remembers everything a user types in and gives it to the malware author to read.<a class=\"footnote\" title=\"Grebennikov, Nikolay. &quot;Keyloggers: How they work and how to detect them (Part 1)&quot;. Kaspersky Labs. Retrieved 11 November 2014.\" id=\"return-footnote-327-10\" href=\"#footnote-327-10\" aria-label=\"Footnote 10\"><sup class=\"footnote\">[10]<\/sup><\/a><\/p>\n<p>World governments have written malware to hurt their enemies. Experts think that the United States government made a virus named Stuxnet to stop an important place in Iran from working.<a class=\"footnote\" title=\"Kushner, David. &quot;The Real Story of Stuxnet&quot;. IEEE. Retrieved 1 November 2014.\" id=\"return-footnote-327-11\" href=\"#footnote-327-11\" aria-label=\"Footnote 11\"><sup class=\"footnote\">[11]<\/sup><\/a>\u00a0The\u00a0Chinese government probably used a virus to stop people from protesting its decisions.<a class=\"footnote\" title=\"Greenberg, Andy. &quot;Evidence Mounts That Chinese Government Hackers Spread Android Malware&quot;. Forbes Media. Retrieved 1 November 2014.\" id=\"return-footnote-327-12\" href=\"#footnote-327-12\" aria-label=\"Footnote 12\"><sup class=\"footnote\">[12]<\/sup><\/a><\/p>\n<h3>How Malware Gets Installed<\/h3>\n<p>There are a lot of ways malware can get onto someone&#8217;s computer. One common way is through email attachments. These attachments are usually sent from other computers that already have malware on them.<a class=\"footnote\" title=\"&quot;How Malware Attacks And Spreads In Your Computer&quot;. Combofix. Retrieved 2 November 2014.\" id=\"return-footnote-327-13\" href=\"#footnote-327-13\" aria-label=\"Footnote 13\"><sup class=\"footnote\">[13]<\/sup><\/a>\u00a0When someone downloads and opens the attachment, the virus installs and uses their computer to send itself to even more people.<\/p>\n<p>Another way malware installs itself is when a victim gets malware just by going to a website with the malware hidden on it. This is called drive-by downloading. A user does not have to click anything for their computer to get infected from a drive-by download.<a class=\"footnote\" title=\"Siciliano, Robert. &quot;What is a \u201cDrive-By\u201d Download?&quot;. McAfee Incorporated. Retrieved 2 November 2014.\" id=\"return-footnote-327-14\" href=\"#footnote-327-14\" aria-label=\"Footnote 14\"><sup class=\"footnote\">[14]<\/sup><\/a>\u00a0This kind of malware attack is usually found on websites that are not used a lot or whose security methods are very old. However, even current websites that people use all the time can host drive-by downloads when someone hacks the site.<\/p>\n<p>People who write malware also get their programs onto computers by attaching them to real programs that people want. This is most common with pirated programs. This is because the downloader was doing something illegal and cannot complain to the authorities without getting in trouble themselves.<a class=\"footnote\" title=\"&quot;How Malware Attacks And Spreads In Your Computer.&quot;\" id=\"return-footnote-327-15\" href=\"#footnote-327-15\" aria-label=\"Footnote 15\"><sup class=\"footnote\">[15]<\/sup><\/a>\u00a0However, some non-piracy websites also put malware (or other unwanted programs that are almost as bad as malware) in a download with real, legal software in a process known as bundling.\u00a0Computer security experts complain about websites that bundle real software with malware. Their complaints do not always stop the websites from bundling.<a class=\"footnote\" title=\"Lemos, Robert. &quot;Security pros slam Cnet Download.com's bundling&quot;. InfoWorld Incorporated. Retrieved 2 November 2014.\" id=\"return-footnote-327-16\" href=\"#footnote-327-16\" aria-label=\"Footnote 16\"><sup class=\"footnote\">[16]<\/sup><\/a><\/p>\n<h3>Kinds of Malware<\/h3>\n<p>There are many different kinds of malware. Each acts a different way.<\/p>\n<ul>\n<li>Viruses are a kind of malware that need a user-run program to work.<a class=\"footnote\" title=\"&quot;What Is the Difference: Viruses, Worms, Trojans, and Bots?&quot;. Cisco Systems, Incorporated. Retrieved 3 November 2014.\" id=\"return-footnote-327-17\" href=\"#footnote-327-17\" aria-label=\"Footnote 17\"><sup class=\"footnote\">[17]<\/sup><\/a>\u00a0They cannot copy themselves or move from one computer to another without a program to host it. Viruses are very common in pirated programs.<a class=\"footnote\" title=\"&quot;How Malware Attacks And Spreads In Your Computer.&quot;\" id=\"return-footnote-327-18\" href=\"#footnote-327-18\" aria-label=\"Footnote 18\"><sup class=\"footnote\">[18]<\/sup><\/a>\u00a0They can harm computers in many different ways, like deleting files and stealing passwords.<a class=\"footnote\" title=\"&quot;What Is the Difference: Viruses, Worms, Trojans, and Bots?&quot;\" id=\"return-footnote-327-19\" href=\"#footnote-327-19\" aria-label=\"Footnote 19\"><sup class=\"footnote\">[19]<\/sup><\/a><\/li>\n<li>Worms are a lot like viruses and can cause the same kinds of damage. However, they&#8217;re able to move through the internet and copy themselves onto computers without help from a host program. This makes them more dangerous than a virus.<a class=\"footnote\" title=\"&quot;What Is the Difference: Viruses, Worms, Trojans, and Bots?&quot;\" id=\"return-footnote-327-20\" href=\"#footnote-327-20\" aria-label=\"Footnote 20\"><sup class=\"footnote\">[20]<\/sup><\/a>\u00a0Worms are usually found in emails and drive-by downloads.<a class=\"footnote\" title=\"Siciliano, Robert.\" id=\"return-footnote-327-21\" href=\"#footnote-327-21\" aria-label=\"Footnote 21\"><sup class=\"footnote\">[21]<\/sup><\/a><\/li>\n<li>Trojan horses are like a much more dangerous version of a virus. They need a user to agree to run a program to work and cannot copy themselves from one computer to another.\u00a0However, trojan horses can make the same problems a normal virus can make. They can also allow the malware writer to control the victim&#8217;s computer, install more malware, steal bank data, and more.<a class=\"footnote\" title=\"&quot;What is a Trojan Virus?&quot;. Kaspersky Lab. Retrieved 3 November 2014.\" id=\"return-footnote-327-22\" href=\"#footnote-327-22\" aria-label=\"Footnote 22\"><sup class=\"footnote\">[22]<\/sup><\/a>\u00a0For example, ransomware is a type of trojan horse that stops a victim from using their files until they pay the person who wrote the malware.<a class=\"footnote\" title=\"Cannell, Joshua.\" id=\"return-footnote-327-23\" href=\"#footnote-327-23\" aria-label=\"Footnote 23\"><sup class=\"footnote\">[23]<\/sup><\/a>\u00a0Experts think that trojan horses are the most common type of malware in existence.<a class=\"footnote\" title=\"&quot;Annual Report PandaLabs 2013 Summary.&quot;\" id=\"return-footnote-327-24\" href=\"#footnote-327-24\" aria-label=\"Footnote 24\"><sup class=\"footnote\">[24]<\/sup><\/a><\/li>\n<li>Adware is a type of malware that earns the program authors money with advertising. These programs show users ads and force them to use websites that make money for the malware writers. Adware will also find personal information about the victim (such as their age, race, and job). This is so the malware authors can sell the information to other people.<a class=\"footnote\" title=\"&quot;What is Adware?&quot;. Kaspersky Labs. Retrieved 3 November 2014.\" id=\"return-footnote-327-25\" href=\"#footnote-327-25\" aria-label=\"Footnote 25\"><sup class=\"footnote\">[25]<\/sup><\/a>\u00a0A user can usually uninstall adware easier than most malware. However, this is still difficult to do without a specially-designed program.<a class=\"footnote\" title=\"&quot;Adware&quot;. Bleeping Computer LLC. Retrieved 3 November 2014.\" id=\"return-footnote-327-26\" href=\"#footnote-327-26\" aria-label=\"Footnote 26\"><sup class=\"footnote\">[26]<\/sup><\/a><\/li>\n<li>Spyware is a more dangerous kind of adware that steals more information from a user. Spyware can steal someone&#8217;s Internet traffic, account passwords, and anything they have typed into their computers. Spyware is also much harder to uninstall than adware is.<a class=\"footnote\" title=\"Beal, Vangie. &quot;The Difference Between Adware &amp; Spyware&quot;. Quinstreet Incorporated. Retrieved 3 November 2014.\" id=\"return-footnote-327-27\" href=\"#footnote-327-27\" aria-label=\"Footnote 27\"><sup class=\"footnote\">[27]<\/sup><\/a><\/li>\n<\/ul>\n<h3>Why Computers get Malware<\/h3>\n<p>There are a few reasons why computers get programs a user didn&#8217;t mean to install. One common reason is because of regular programs that have software bugs. Malware can use bugs, such as a buffer overflow, to make a program do something it was not designed to do.<a class=\"footnote\" title=\"Schwarz, Thomas. &quot;Buffer Overflow Attack&quot;. COEN, SCU. Retrieved 6 November 2014.\" id=\"return-footnote-327-28\" href=\"#footnote-327-28\" aria-label=\"Footnote 28\"><sup class=\"footnote\">[28]<\/sup><\/a>\u00a0Malware can also get onto a computer if it tricks a user into putting it there themselves. This can happen when a user plugs in a\u00a0USB flash drive that has a virus on it already.<a class=\"footnote\" title=\"Mills, Elinor. &quot;USB devices spreading viruses&quot;. CBS Interactive Incorporated. Retrieved 6 November 2014.\" id=\"return-footnote-327-29\" href=\"#footnote-327-29\" aria-label=\"Footnote 29\"><sup class=\"footnote\">[29]<\/sup><\/a>\u00a0Malware also commonly uses social engineering to get users to run it, like pretending to be an important email attachment for work. Some malware even pretends to be an anti-malware program to get people to run it.<a class=\"footnote\" title=\"&quot;Social Engineering&quot;. Kaspersky Labs. Retrieved 6 November 2014.\" id=\"return-footnote-327-30\" href=\"#footnote-327-30\" aria-label=\"Footnote 30\"><sup class=\"footnote\">[30]<\/sup><\/a><\/p>\n<h3>How Malware is Stopped<\/h3>\n<p>Since malware is such a big problem, many companies make programs to try to stop it. These anti-malware programs have a lot of different ways to find malware. One is static analysis, which looks at the\u00a0source code of a program before it is run. Then, if the program is similar to malware the static analysis program has seen before, the anti-malware program will stop the code from running.\u00a0Another way of finding malware is dynamic analysis. Dynamic analysis runs only part of a program it is checking. If this part of the program tries to do anything that could be bad or harmful, the anti-malware program will not let the program run.<a class=\"footnote\" title=\"&quot;Heuristic analysis in Kaspersky Internet Security 2012&quot;. Kaspersky Lab. Retrieved 4 November 2014.\" id=\"return-footnote-327-31\" href=\"#footnote-327-31\" aria-label=\"Footnote 31\"><sup class=\"footnote\">[31]<\/sup><\/a><\/p>\n<p>Malware can also be stopped without a program. This can be done by not letting a computer connect to the Internet or other computers, called creating an air gap.<a class=\"footnote\" title=\"&quot;Air Gap&quot;. Janalta Interactive Incorporated. Retrieved 6 November 2014.\" id=\"return-footnote-327-32\" href=\"#footnote-327-32\" aria-label=\"Footnote 32\"><sup class=\"footnote\">[32]<\/sup><\/a>\u00a0However, these computers can still get malware if someone puts it there another way. One example is when someone plugs in a USB drive that was already plugged into a computer with a virus.<a class=\"footnote\" title=\"Mills, Elinor.\" id=\"return-footnote-327-33\" href=\"#footnote-327-33\" aria-label=\"Footnote 33\"><sup class=\"footnote\">[33]<\/sup><\/a><\/p>\n<h2>HTTP cookie<\/h2>\n<p>An <b>HTTP cookie<\/b> (usually just called a <b>cookie<\/b>) is a simple computer file made of text. The information stored in cookies can be used to personalise the experience when using a website. A website can use cookies to find out if someone has visited a website before and record information (data) about what they did.<\/p>\n<p>When someone is using a computer to browse a website, a personalised cookie file can be sent from the website\u2019s server to the person\u2019s computer. The cookie is stored in the web browser on the person\u2019s computer. At some time in the future, the person may browse that website again. The website can send a message to the person\u2019s browser, asking if a cookie from the website is already stored in the browser. If a cookie is found, then the data that was stored in the cookie before can be used by the website to tell the website about the person\u2019s previous activity. Some examples where cookies are used include shopping carts, automatic login and remembering which advertisements have already been shown.<\/p>\n<p>Cookies have been a problem for Internet privacy. This is because they can be used to track browsing behavior. Because of this, laws have been made in some countries to protect people&#8217;s privacy. There are many other options than cookies, but each option has its own problems.<\/p>\n<p>Cookies have often been mistaken for computer programs. But cookies cannot do much on their own. They are simply a piece of data. They are often called spyware or viruses, but they are not either of these.<\/p>\n<p>Most web browsers allow users to choose whether to accept cookies. If the user does not allow cookies, some websites will become unusable. For example, shopping baskets which use cookies do not work if the user does not allow cookies.<\/p>\n<h2>Protocols<\/h2>\n<h3>Hypertext Transfer Protocol<\/h3>\n<p><b>Hypertext Transfer Protocol<\/b> (often abbreviated to <b>HTTP<\/b>) is a communications protocol. It is used to send and receive webpages and files on the internet. It was developed by Tim Berners-Lee and is now coordinated by the W3C. HTTP version 1.1 is the most common used version today. It is defined in RFC 2616.<\/p>\n<p>HTTP works by using a <strong>user agent<\/strong> to connect to a server. The user agent could be a web browser or spider. The server must be located using a URL or URI. This always contains <code>http:\/\/<\/code> at the start. It normally connects to port 80 on a computer.<\/p>\n<p>A more secure version of HTTP is called <i>HTTPS<\/i>. This contains <code>https:\/\/<\/code> at the beginning of the URL. It encrypts all the information that is sent and received. This can stop malicious users such as hackers from stealing the information. HTTPS is often used on payment websites.<\/p>\n<h4>Request Message<\/h4>\n<p>The request message contains the following:<\/p>\n<ul>\n<li>Request line, such as <code>GET \/images\/logo.gif HTTP\/1.1<\/code>, which requests the file <code>logo.gif<\/code> from the <code>\/images<\/code> directory<\/li>\n<li>Headers, such as <code>Accept-Language: en<\/code><\/li>\n<li>An empty line<\/li>\n<li>An optional message body<\/li>\n<\/ul>\n<p>The request line and headers must all end with two characters: a carriage return followed by a line feed, often written &lt;CR&gt;&lt;LF&gt;. The empty line must consist of only &lt;CR&gt;&lt;LF&gt; and no other whitespace. In the HTTP\/1.1 protocol, all headers except Host are optional.<\/p>\n<p>A request line containing only the path name is accepted by servers to maintain compatibility with HTTP clients before the HTTP\/1.0 standard. Even this site has a HTTP at its beginning.<\/p>\n<h3>Wired Equivalent Privacy<\/h3>\n<p><b>Wired Equivalent Privacy<\/b> (also known as <b>WEP<\/b>) is a standard to use encryption in Wireless LANs. It was introduced in 1999.<\/p>\n<p>In 2001, mathematicians showed that WEP is not very strong. A WEP connection could be decoded, with software that can be easily found, within minutes.<a class=\"footnote\" title=\"Nikita Borisov, Ian Goldberg, David Wagner. &quot;Intercepting Mobile Communications: The Insecurity of 802.11&quot;. Retrieved on 12 September 2006.\" id=\"return-footnote-327-34\" href=\"#footnote-327-34\" aria-label=\"Footnote 34\"><sup class=\"footnote\">[34]<\/sup><\/a>\u00a0Because of this finding, IEEE created a new\u00a0802.11i group to fix the problems. By 2003, the Wi-Fi Alliance announced that Wi-Fi Protected Access (WPA) would replace WEP, which was a subset of then upcoming 802.11i amendment. Finally in 2004, they made it official and said that it would go ahead. It was part of the full 802.11i standard (also known as WPA2), the IEEE declared that both WEP-40 and WEP-104 are not recommended because they are not secure enough.<a class=\"footnote\" title=\"&quot;What is a WEP key?&quot;. lirent.net. Retrieved on 11 March 2008.\" id=\"return-footnote-327-35\" href=\"#footnote-327-35\" aria-label=\"Footnote 35\"><sup class=\"footnote\">[35]<\/sup><\/a><\/p>\n<p>Even though it only offers low security, WEP is still widely in use.<a class=\"footnote\" title=\"&quot;Wireless Adoption Leaps Ahead, Advanced Encryption Gains Ground in the Post-WEP Era&quot;. RSA.com. Retrieved on 11 March 2008.\" id=\"return-footnote-327-36\" href=\"#footnote-327-36\" aria-label=\"Footnote 36\"><sup class=\"footnote\">[36]<\/sup><\/a>\u00a0WEP is often the first security choice presented to users by router configuration tools even. Today, WEP provides a level of security that deters only accidental use. As a result, people can invade and enter the network.<a class=\"footnote\" title=\"Andrea Bittau, Mark Handley, Joshua Lackey. &quot;The Final Nail in WEP's Coffin&quot;. Retrieved on 16 March 2008.\" id=\"return-footnote-327-37\" href=\"#footnote-327-37\" aria-label=\"Footnote 37\"><sup class=\"footnote\">[37]<\/sup><\/a><\/p>\n<p>People sometimes call it <i>Wireless Encryption Protocol<\/i>, which is wrong.<\/p>\n<h3>Wi-Fi Protected Access<\/h3>\n<p><b>Wi-Fi Protected Access<\/b> (also known as <b>WPA<\/b> and <b>WPA2<\/b>) is the name for a number of standards to use encryption on a Wireless LAN. The standards were created because researchers had found several weaknesses in Wired Equivalent Privacy. Wired Equivalent Privacy, or <i>WEP<\/i> was the standard that came before it. The protocol <i>WPA2<\/i> implements most of the standard IEEE 802.11i.<\/p>\n<p>Products that have the label <i>WPA<\/i> were designed to work with most cards, even those that came out before there was WPA. This is not true for access points though.<\/p>\n<p>Products with the <i>WPA2<\/i> implement all of the standard. This is more secure, but it may not work with some older cards.<\/p>\n<h2>Protection<\/h2>\n<h3>Encryption<\/h3>\n<p><b>Encryption<\/b> is a method which allows information (for example, a secret message) to be hidden so that it cannot be read without special knowledge (such as a password). Once this is done, using a secret\u00a0code or cypher, the information is <b>encrypted<\/b>. <b>Decryption<\/b> is a way to change an encrypted piece of information back into unencrypted form. This is called the <b>decrypted<\/b> form. The study of encryption is called cryptography.<\/p>\n<h4>Examples<\/h4>\n<p>A simple kind of encryption for words is ROT13. In ROT13, letters of the alphabet are changed with each other using a simple pattern. For example, <i>A<\/i> changes to <i>N<\/i>, <i>B<\/i> changes to <i>O<\/i>, <i>C<\/i> changes to <i>P<\/i>, and so on. Each letter is &#8220;rotated&#8221; by 13 spaces. Using the ROT13 cipher, the words <i>Simple English Wikipedia<\/i> becomes <i>Fvzcyr Ratyvfu Jvxvcrqvn<\/i>. The ROT13 cipher is very easy to decrypt. Because there are 26 letters in the English alphabet, if a letter is rotated two times by 13 letters each time, the original letter will be obtained. So applying the ROT13 cipher a second time brings back the original text. When he communicated with his army, Julius Caesar sometimes used what is known as Caesar cipher today. This cipher works by shifting the position of letters: each letter is rotated by 3 positions.<\/p>\n<p>Most kinds of encryption are more complex. Some are made only for text. Others are made for binary computer files like pictures and music. Today, the asymmetric encryption system used the most is\u00a0RSA. Any computer file can be encrypted with RSA. AES is a common symmetric algorithm.<\/p>\n<h4>One-Time Pad<\/h4>\n<p>Most types of encryption can theoretically be cracked: an enemy might be able to decrypt a message without knowing the password, if he has clever mathematicians, powerful computers and lots of time. The one-time pad is special because, if it is used correctly, it is impossible to crack. There are three rules that must be followed:<\/p>\n<ul>\n<li>The secret key (password) must be longer than the secret message: if the message has 20 letters then the key must also have at least 20 letters.<\/li>\n<li>The secret key must be a random list of letters (e.g. KQBWLDA&#8230;)<\/li>\n<li>The secret key must only be used once. To send more than one message, a different key must be used for each one.<\/li>\n<\/ul>\n<p>If these three rules are obeyed, then it is impossible to read the secret message without knowing the secret key. For this reason, during the Cold War, embassies and large military units often used one-time pads to communicate secretly with their governments. They had little books (&#8220;pads&#8221;) filled with random letters or random numbers. Each page from the pad could only be used once: this is why it is called a &#8220;one-time pad&#8221;.<\/p>\n<h4>Encryption on the Internet<\/h4>\n<p>Encryption is often used on the Internet, as many web sites use it to protect private information. On the Internet, several encryption protocols are used, such as Secure Sockets Layer (SSL), IPsec, andSSH. They use the RSA encryption system and others. The protocol for protected web browsing is called HTTPS. Mostly URL encryption contain MD5 Algorithm. Various algorithms are used in the internet market depending upon the need.<\/p>\n<h3>Antivirus Software<\/h3>\n<p><b>Antivirus software<\/b>, if properly installed on a computer system, can prevent access to computer systems by unwanted computer programs. Viruses, worms or Trojan Horses can be used by criminals or mischievous people (called Crackers). They can be used to steal information or damage computer systems. If no antivirus software is installed, hackers may be able to access the information in the computer.<\/p>\n<p>Most tests and experts claim that antivirus software is unable to prevent all attacks.<a class=\"footnote\" title=\"Shaw, Gordon. &quot;AV-Test release latest results.&quot; Virus Bulletin. Retrieved 8 March 2009.\" id=\"return-footnote-327-38\" href=\"#footnote-327-38\" aria-label=\"Footnote 38\"><sup class=\"footnote\">[38]<\/sup><\/a>\u00a0There are many different types of antivirus software. Many Antivirus programs can be downloaded for free. These versions usually have some features missing. The missing features are only available to those who buy the &#8220;full&#8221; version.<\/p>\n<p>Antivirus software uses many ways to protect the computer. They often search for signs of viruses in every website that is visited. Most also do a regular scan of all the data and files on the computer&#8217;s hard disk.<\/p>\n<p>Installing more than one antivirus is not a good idea. The 2 different antivirus software can interfere with each other.<\/p>\n<h4>Problems with Antivirus Software<\/h4>\n<p>Antivirus software can not always detect all viruses on a computer.<\/p>\n<p>Sometimes antivirus software sees viruses in files that do not really have viruses. This is called a false positive.<a class=\"footnote\" title=\"http:\/\/www.offlinetalk.com\/index.php\/topic,106.msg169.html\" id=\"return-footnote-327-39\" href=\"#footnote-327-39\" aria-label=\"Footnote 39\"><sup class=\"footnote\">[39]<\/sup><\/a>\u00a0The antivirus software will sometimes remove files from the computer that should not be removed. This may cause other programs to not work properly.<\/p>\n<h3>Firewall (Networking)<\/h3>\n<div id=\"attachment_329\" style=\"width: 310px\" class=\"wp-caption alignright\"><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-329\" class=\"wp-image-329\" src=\"https:\/\/s3-us-west-2.amazonaws.com\/courses-images-archive-read-only\/wp-content\/uploads\/sites\/939\/2015\/10\/26001834\/800px-Gateway_firewall.svg_.png\" alt=\"Gateway firewall is located between the local area network (LAN) and the WAN. The LAN should be protected from attacks.\" width=\"300\" height=\"210\" \/><\/p>\n<p id=\"caption-attachment-329\" class=\"wp-caption-text\">A Firewall protects a number of computers on a LAN against unauthorised access.<\/p>\n<\/div>\n<p>Originally, a <i>firewall<\/i> was a wall that was built to stop (or slow down) the spread of a fire. In terms of computer security, a <b>firewall<\/b> is a piece of software. This software monitors the network traffic. A firewall has a set of rules which are applied to each packet. The rules decide if a packet can pass, or whether it is discarded. Usually a firewall is placed between a network that is trusted, and one that is less trusted. When a large network needs to be protected, the firewall software often runs on a dedicated hardware, which does nothing else.<\/p>\n<p>A firewall protects one part of the network against unauthorized access.<\/p>\n<h4>Different Kinds of Firewalls<\/h4>\n<ul>\n<li><strong><span id=\"Packet_filtering\" class=\"mw-headline\">Packet filtering.\u00a0<\/span><\/strong>Data travels on the internet in small pieces; these are called packets. Each packet has certain metadata attached, like where it is coming from, and where it should be sent to. The easiest thing to do is to look at the metadata. Based on rules, certain packets are then dropped or rejected. All firewalls can do this.it is known as network layer<\/li>\n<li><strong><span id=\"Stateful_packet_inspection\" class=\"mw-headline\">Stateful packet inspection.\u00a0<\/span><\/strong>In addition to the simple packet filtering (above) this kind of firewall also keeps track of connections. A packet can be the start of a new connection, or it can be part of an existing connection. If it is neither of the two, it is probably useless and can be dropped.<\/li>\n<li><strong><span id=\"Application-layer_firewalls\" class=\"mw-headline\">Application-layer firewalls.\u00a0<\/span><\/strong>Application-layer firewalls do not just look at the metadata; they also look at the actual data transported. They know how certain protocols work, for example FTP or HTTP. They can then look if the data that is in the packet is valid (for that protocol). If it is not, it can be dropped.<\/li>\n<\/ul>\n<h4>Other Things Firewalls Are Used For<\/h4>\n<p>Firewalls can provide a secure connection between two networks. This is called <i>tunnelling<\/i>. The data may be encrypted. It is unencrypted at the other end. Since the firewalls are doing this, the rest of the network is unaware of it. An alternative is to provide a secure access (to the corporate network).<\/p>\n<h4>Network Address Translation<\/h4>\n<p>Very often, firewalls can translate IP addresses. That way, many computers can share a few public IP addresses. The firewall translates between the public and the private IP addresses.<\/p>\n<h4>Types of Firewalls<\/h4>\n<p>In general, there are two types of firewalls:<\/p>\n<ul>\n<li>Software-based firewalls: these are often run as additional programs on computers that are used for other things. They are often known as <i>personal firewalls<\/i> which can be updates on personal computers.<\/li>\n<\/ul>\n<ul>\n<li>Hardware-based firewalls: Hardware based firewalls run on a dedicated computer (or appliance). Often, these offer a better performance than software firewalls, but they are also more expensive.<\/li>\n<\/ul>\n<h4>What Firewalls Cannot Protect Against<\/h4>\n<p>Firewalls can protect against some problems (viruses and attacks) that come from the internet. They cannot protect against viruses, that come from infected media (like an infected office document on an\u00a0USB flash drive).<\/p>\n<h2>Backup<\/h2>\n<div id=\"attachment_330\" style=\"width: 310px\" class=\"wp-caption alignright\"><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-330\" class=\"wp-image-330\" src=\"https:\/\/s3-us-west-2.amazonaws.com\/courses-images-archive-read-only\/wp-content\/uploads\/sites\/939\/2015\/10\/26001836\/622px-Backup_Backup_Backup_-_And_Test_Restores.jpg\" alt=\"A computer server that was destroyed in the Choteau fire in NE Oklahoma. There\u2019s a completely melted and nearly unrecognizable telephone on top.\" width=\"300\" height=\"289\" \/><\/p>\n<p id=\"caption-attachment-330\" class=\"wp-caption-text\">This computer was used to store files, before the fire hit<\/p>\n<\/div>\n<p>A\u00a0<b>backup<\/b> is a copy of some data. This copy can be used when the original data is changed, or lost. Losing data is common: A 2008 survey found that two thirds of respondents had lost files on their home PC.<a class=\"footnote\" title=\"Global Backup Survey. Retrieved on 15 February 2009\" id=\"return-footnote-327-40\" href=\"#footnote-327-40\" aria-label=\"Footnote 40\"><sup class=\"footnote\">[40]<\/sup><\/a>\u00a0Another purpose of backing up data is to have a copy that represents an earlier state of the data, before it was changed. Organisations may have rules which state how long data should be kept, and what kinds of data these rules apply to. In many countries there are rules that specify that certain kinds of data need to be kept for a given time. An example of this is the data used for\u00a0accounting.<\/p>\n<p>Backups are a simple form of disaster recovery. Even though they are commonly seen as disaster recovery, they should be part of a disaster recovery plan. A disaster recovery plan is a documented set of procedures and tasks to perform to protect the consistency and integrity of a corporate IT system.<\/p>\n<h3>Different Backup Media<\/h3>\n<p>There are different types of backup systems that use different kinds of media. Common backup media includes:<\/p>\n<ul>\n<li>Different kinds of tapes, for example Digital Audio Tape, or LTO<\/li>\n<li>Hard disks<\/li>\n<li>Optical disks like CDs and DVDs<\/li>\n<li>Magneto-Optical Discs<\/li>\n<li>Emails<\/li>\n<\/ul>\n<div id=\"attachment_331\" style=\"width: 310px\" class=\"wp-caption alignright\"><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-331\" class=\"wp-image-331\" src=\"https:\/\/s3-us-west-2.amazonaws.com\/courses-images-archive-read-only\/wp-content\/uploads\/sites\/939\/2015\/10\/26001837\/767px-Buffalo_LinkStation_Mini_and_a_PP3_battery.jpg\" alt=\"The Buffalo LinkStation Mini with a PP3 battery on the left side. This shows the small size of the NAS with its two 2.5 inch hard disks.\" width=\"300\" height=\"235\" \/><\/p>\n<p id=\"caption-attachment-331\" class=\"wp-caption-text\">A portable hard drive<\/p>\n<\/div>\n<p>Some of the backup media are portable, and can easily be stored in a safe location. The problem with storing tapes in a bank safe, for example is that they are only available during the opening hours of the bank.<\/p>\n<p>Another issue has commonly been the speed of the backup. Media such as digital tapes can store a lot of data, but accessing them is realtively slow. Tapes can only be read or written in sequence, while media such as hard disks or optical drives are basically random access. When data is backed up, its encoding is often changed. This makes it possible to use codes such as Cyclic redundancy checks, which can detect, and sometimes repair an error.<\/p>\n<h3>Reasons for Doing a Backup<\/h3>\n<p>Backups are usually done for one of the following reasons:<\/p>\n<ul>\n<li>Prevent data loss if there is a disaster (like a fire or hardware failure, or an intentional or unintentional deletion)<\/li>\n<li>Computer viruses or other programs make data unusable<\/li>\n<li>There is a logical error in the data<\/li>\n<li>Sudden computer shutdown which can be caused by power shortage.<\/li>\n<\/ul>\n<h3>Different Types of Backup<\/h3>\n<ul>\n<li>A <b>full backup<\/b> copies all of the data. This means that if the main copy of the data is lost, we can bring it all back simply by copying the data back from the backup.<\/li>\n<li>A <b>differential backup<\/b> only copies the data that has changed since the last full backup. The reason we do this is that sometimes only a small amount of data has changed since the last full backup; this means we can do a differential backup much more quickly.\u00a0If someone loses their data, and needs to get it back from a differential backup, they need to use the last full backup, to bring back all of their data. They then need to use the last differential backup to bring back everything that was changed between the full backup and the differential backup.<\/li>\n<li>An <b>incremental backup<\/b> only copies the data that has changed since the last incremental backup. This makes each backup quicker, because we are only copying what has changed since the last backup. To bring the data back, if the main copy of the data is lost, we need the last full backup, as well as all of the incremental backups that have been done since then. This means that bringing data back from an incremental backup is slower and more risky than differential or full backups.<\/li>\n<\/ul>\n<h3>How Long to Keep a Backup<\/h3>\n<p>The <b>Grandfather-father-son<\/b> system means that we keep different types of backup for different amounts of time. For example, we might do a backup every day, and keep a week&#8217;s worth of backups. We might then keep one backup for each week for a month, and one backup from each month for a year. This means that we have a backup of our data from a year ago, so that if we realise we need some data from a long time ago, we have that data available. We also have several copies of our recent data, in case one of them doesn&#8217;t work.<\/p>\n\n\t\t\t <section class=\"citations-section\" role=\"contentinfo\">\n\t\t\t <h3>Candela Citations<\/h3>\n\t\t\t\t\t <div>\n\t\t\t\t\t\t <div id=\"citation-list-327\">\n\t\t\t\t\t\t\t <div class=\"licensing\"><div class=\"license-attribution-dropdown-subheading\">CC licensed content, Shared previously<\/div><ul class=\"citation-list\"><li>Computer security. <strong>Provided by<\/strong>: Wikipedia. <strong>Located at<\/strong>: <a target=\"_blank\" href=\"https:\/\/simple.wikipedia.org\/wiki\/Computer%2520security?oldid=5031991\">https:\/\/simple.wikipedia.org\/wiki\/Computer%2520security?oldid=5031991<\/a>. <strong>License<\/strong>: <em><a target=\"_blank\" rel=\"license\" href=\"https:\/\/creativecommons.org\/licenses\/by-sa\/4.0\/\">CC BY-SA: Attribution-ShareAlike<\/a><\/em><\/li><li>Malware. <strong>Provided by<\/strong>: Wikipedia. <strong>Located at<\/strong>: <a target=\"_blank\" href=\"https:\/\/simple.wikipedia.org\/wiki\/Malware?oldid=4948052\">https:\/\/simple.wikipedia.org\/wiki\/Malware?oldid=4948052<\/a>. <strong>License<\/strong>: <em><a target=\"_blank\" rel=\"license\" href=\"https:\/\/creativecommons.org\/licenses\/by-sa\/4.0\/\">CC BY-SA: Attribution-ShareAlike<\/a><\/em><\/li><li>HTTP Cookie. <strong>Provided by<\/strong>: Wikipedia. <strong>Located at<\/strong>: <a target=\"_blank\" href=\"https:\/\/simple.wikipedia.org\/wiki\/HTTP%2520cookie?oldid=5031056\">https:\/\/simple.wikipedia.org\/wiki\/HTTP%2520cookie?oldid=5031056<\/a>. <strong>License<\/strong>: <em><a target=\"_blank\" rel=\"license\" href=\"https:\/\/creativecommons.org\/licenses\/by-sa\/4.0\/\">CC BY-SA: Attribution-ShareAlike<\/a><\/em><\/li><li>Hypertext Transfer Protocol. <strong>Provided by<\/strong>: Wikipedia. <strong>Located at<\/strong>: <a target=\"_blank\" href=\"https:\/\/simple.wikipedia.org\/wiki\/Hypertext%2520Transfer%2520Protocol?oldid=4118562\">https:\/\/simple.wikipedia.org\/wiki\/Hypertext%2520Transfer%2520Protocol?oldid=4118562<\/a>. <strong>License<\/strong>: <em><a target=\"_blank\" rel=\"license\" href=\"https:\/\/creativecommons.org\/licenses\/by-sa\/4.0\/\">CC BY-SA: Attribution-ShareAlike<\/a><\/em><\/li><li>Wired Equivalent Privacy. <strong>Provided by<\/strong>: Wikipedia. <strong>Located at<\/strong>: <a target=\"_blank\" href=\"https:\/\/simple.wikipedia.org\/wiki\/Wired%2520Equivalent%2520Privacy?oldid=4598792\">https:\/\/simple.wikipedia.org\/wiki\/Wired%2520Equivalent%2520Privacy?oldid=4598792<\/a>. <strong>License<\/strong>: <em><a target=\"_blank\" rel=\"license\" href=\"https:\/\/creativecommons.org\/licenses\/by-sa\/4.0\/\">CC BY-SA: Attribution-ShareAlike<\/a><\/em><\/li><li>Wi-Fi Protected Access. <strong>Provided by<\/strong>: Wikipedia. <strong>Located at<\/strong>: <a target=\"_blank\" href=\"https:\/\/simple.wikipedia.org\/wiki\/Wi-Fi%2520Protected%2520Access?oldid=4559244\">https:\/\/simple.wikipedia.org\/wiki\/Wi-Fi%2520Protected%2520Access?oldid=4559244<\/a>. <strong>License<\/strong>: <em><a target=\"_blank\" rel=\"license\" href=\"https:\/\/creativecommons.org\/licenses\/by-sa\/4.0\/\">CC BY-SA: Attribution-ShareAlike<\/a><\/em><\/li><li>Encryption. <strong>Provided by<\/strong>: Wikipedia. <strong>Located at<\/strong>: <a target=\"_blank\" href=\"https:\/\/simple.wikipedia.org\/wiki\/Encryption?oldid=4964670\">https:\/\/simple.wikipedia.org\/wiki\/Encryption?oldid=4964670<\/a>. <strong>License<\/strong>: <em><a target=\"_blank\" rel=\"license\" href=\"https:\/\/creativecommons.org\/licenses\/by-sa\/4.0\/\">CC BY-SA: Attribution-ShareAlike<\/a><\/em><\/li><li>Antivirus Software. <strong>Provided by<\/strong>: Wikipedia. <strong>Located at<\/strong>: <a target=\"_blank\" href=\"https:\/\/simple.wikipedia.org\/wiki\/Antivirus%2520software?oldid=4923125\">https:\/\/simple.wikipedia.org\/wiki\/Antivirus%2520software?oldid=4923125<\/a>. <strong>License<\/strong>: <em><a target=\"_blank\" rel=\"license\" href=\"https:\/\/creativecommons.org\/licenses\/by-sa\/4.0\/\">CC BY-SA: Attribution-ShareAlike<\/a><\/em><\/li><li>Firewall (networking). <strong>Provided by<\/strong>: Wikipedia. <strong>Located at<\/strong>: <a target=\"_blank\" href=\"https:\/\/simple.wikipedia.org\/wiki\/Firewall%2520(networking)?oldid=5035455\">https:\/\/simple.wikipedia.org\/wiki\/Firewall%2520(networking)?oldid=5035455<\/a>. <strong>License<\/strong>: <em><a target=\"_blank\" rel=\"license\" href=\"https:\/\/creativecommons.org\/licenses\/by-sa\/4.0\/\">CC BY-SA: Attribution-ShareAlike<\/a><\/em><\/li><li>Backup. <strong>Provided by<\/strong>: Wikipedia. <strong>Located at<\/strong>: <a target=\"_blank\" href=\"https:\/\/simple.wikipedia.org\/wiki\/Backup?oldid=4918638\">https:\/\/simple.wikipedia.org\/wiki\/Backup?oldid=4918638<\/a>. <strong>License<\/strong>: <em><a target=\"_blank\" rel=\"license\" href=\"https:\/\/creativecommons.org\/licenses\/by-sa\/4.0\/\">CC BY-SA: Attribution-ShareAlike<\/a><\/em><\/li><\/ul><\/div>\n\t\t\t\t\t\t <\/div>\n\t\t\t\t\t <\/div>\n\t\t\t <\/section><hr class=\"before-footnotes clear\" \/><div class=\"footnotes\"><ol><li id=\"footnote-327-1\">Leyden, John. <a class=\"external text\" href=\"http:\/\/www.theregister.co.uk\/2012\/12\/14\/first_virus_elk_cloner_creator_interviewed\/\" rel=\"nofollow\">\"The 30-year-old prank that became the first computer virus\"<\/a>. The Register<span class=\"reference-accessdate\">. Retrieved 1 November 2014<\/span>. <a href=\"#return-footnote-327-1\" class=\"return-footnote\" aria-label=\"Return to footnote 1\">&crarr;<\/a><\/li><li id=\"footnote-327-2\">Dalakov, Georgi. <a class=\"external text\" href=\"http:\/\/history-computer.com\/Internet\/Maturing\/Thomas.html\" rel=\"nofollow\">\"First computer virus of Bob Thomas\"<\/a><span class=\"reference-accessdate\">. Retrieved 1 November 2014<\/span>. <a href=\"#return-footnote-327-2\" class=\"return-footnote\" aria-label=\"Return to footnote 2\">&crarr;<\/a><\/li><li id=\"footnote-327-3\">Lee, Timothy. <a class=\"external text\" href=\"http:\/\/www.washingtonpost.com\/blogs\/the-switch\/wp\/2013\/11\/01\/how-a-grad-student-trying-to-build-the-first-botnet-brought-the-internet-to-its-knees\/\" rel=\"nofollow\">\"How a grad student trying to build the first botnet brought the Internet to its knees\"<\/a>. Washington Post Company<span class=\"reference-accessdate\">. Retrieved 1 November 2014<\/span>. <a href=\"#return-footnote-327-3\" class=\"return-footnote\" aria-label=\"Return to footnote 3\">&crarr;<\/a><\/li><li id=\"footnote-327-4\">Messmer, Ellen. <a class=\"external text\" href=\"http:\/\/www.pcworld.com\/article\/147698\/tech.html\" rel=\"nofollow\">\"Tech Talk: Where'd it Come From, Anyway?\"<\/a>. IDG Consumer &amp; SMB<span class=\"reference-accessdate\">. Retrieved 11 November 2014<\/span>. <a href=\"#return-footnote-327-4\" class=\"return-footnote\" aria-label=\"Return to footnote 4\">&crarr;<\/a><\/li><li id=\"footnote-327-5\">File, Thom. <a class=\"external text\" href=\"http:\/\/www.census.gov\/prod\/2013pubs\/p20-569.pdf\" rel=\"nofollow\">\"Computer and Internet Use in the United States\"<\/a>. U.S. Census Bureau<span class=\"reference-accessdate\">. Retrieved 11 November 2014<\/span>. <a href=\"#return-footnote-327-5\" class=\"return-footnote\" aria-label=\"Return to footnote 5\">&crarr;<\/a><\/li><li id=\"footnote-327-6\"><a class=\"external text\" href=\"http:\/\/www.microsoft.com\/security\/sir\/story\/#!10year\" rel=\"nofollow\">\"The Evolution of Malware and the Threat Landscape \u2013 a 10-Year review\"<\/a>. Microsoft Incorporated<span class=\"reference-accessdate\">. Retrieved 11 November 2014<\/span>. <a href=\"#return-footnote-327-6\" class=\"return-footnote\" aria-label=\"Return to footnote 6\">&crarr;<\/a><\/li><li id=\"footnote-327-7\"><a class=\"external text\" href=\"http:\/\/mediacenter.pandasecurity.com\/mediacenter\/wp-content\/uploads\/2014\/07\/Annual-Report-PandaLabs-2013.pdf\" rel=\"nofollow\">\"Annual Report PandaLabs 2013 Summary\"<\/a>. Panda Security<span class=\"reference-accessdate\">. Retrieved 15 November 2014<\/span>. <a href=\"#return-footnote-327-7\" class=\"return-footnote\" aria-label=\"Return to footnote 7\">&crarr;<\/a><\/li><li id=\"footnote-327-8\"> Cannell, Joshua. <a class=\"external text\" href=\"https:\/\/blog.malwarebytes.org\/intelligence\/2013\/10\/cryptolocker-ransomware-what-you-need-to-know\/\" rel=\"nofollow\">\"Cryptolocker Ransomware: What You Need To Know\"<\/a>. Malwarebytes Corporation<span class=\"reference-accessdate\">. Retrieved 1 November 2014<\/span>. <a href=\"#return-footnote-327-8\" class=\"return-footnote\" aria-label=\"Return to footnote 8\">&crarr;<\/a><\/li><li id=\"footnote-327-9\"><a class=\"external text\" href=\"http:\/\/www.f-secure.com\/v-descs\/cih.shtml\" rel=\"nofollow\">\"Virus: DOS\/CIH\"<\/a>. F-Secure Corporation<span class=\"reference-accessdate\">. Retrieved 1 November 2014<\/span>. <a href=\"#return-footnote-327-9\" class=\"return-footnote\" aria-label=\"Return to footnote 9\">&crarr;<\/a><\/li><li id=\"footnote-327-10\">Grebennikov, Nikolay. <a class=\"external text\" href=\"http:\/\/securelist.com\/analysis\/publications\/36138\/keyloggers-how-they-work-and-how-to-detect-them-part-1\/\" rel=\"nofollow\">\"Keyloggers: How they work and how to detect them (Part 1)\"<\/a>. Kaspersky Labs<span class=\"reference-accessdate\">. Retrieved 11 November 2014<\/span>. <a href=\"#return-footnote-327-10\" class=\"return-footnote\" aria-label=\"Return to footnote 10\">&crarr;<\/a><\/li><li id=\"footnote-327-11\">Kushner, David. <a class=\"external text\" href=\"http:\/\/spectrum.ieee.org\/telecom\/security\/the-real-story-of-stuxnet\" rel=\"nofollow\">\"The Real Story of Stuxnet\"<\/a>. IEEE<span class=\"reference-accessdate\">. Retrieved 1 November 2014<\/span>. <a href=\"#return-footnote-327-11\" class=\"return-footnote\" aria-label=\"Return to footnote 11\">&crarr;<\/a><\/li><li id=\"footnote-327-12\">Greenberg, Andy. <a class=\"external text\" href=\"http:\/\/www.forbes.com\/sites\/andygreenberg\/2013\/04\/01\/evidence-mounts-that-chinese-government-hackers-spread-android-malware\/\" rel=\"nofollow\">\"Evidence Mounts That Chinese Government Hackers Spread Android Malware\"<\/a>. Forbes Media<span class=\"reference-accessdate\">. Retrieved 1 November 2014<\/span>. <a href=\"#return-footnote-327-12\" class=\"return-footnote\" aria-label=\"Return to footnote 12\">&crarr;<\/a><\/li><li id=\"footnote-327-13\"><a class=\"external text\" href=\"http:\/\/www.combofix.org\/how-malware-attacks-and-spreads-in-your-computer.php\" rel=\"nofollow\">\"How Malware Attacks And Spreads In Your Computer\"<\/a>. Combofix<span class=\"reference-accessdate\">. Retrieved 2 November 2014<\/span>. <a href=\"#return-footnote-327-13\" class=\"return-footnote\" aria-label=\"Return to footnote 13\">&crarr;<\/a><\/li><li id=\"footnote-327-14\">Siciliano, Robert. <a class=\"external text\" href=\"http:\/\/blogs.mcafee.com\/consumer\/drive-by-download\" rel=\"nofollow\">\"What is a \u201cDrive-By\u201d Download?\"<\/a>. McAfee Incorporated<span class=\"reference-accessdate\">. Retrieved 2 November 2014<\/span>. <a href=\"#return-footnote-327-14\" class=\"return-footnote\" aria-label=\"Return to footnote 14\">&crarr;<\/a><\/li><li id=\"footnote-327-15\">\"How Malware Attacks And Spreads In Your Computer.\" <a href=\"#return-footnote-327-15\" class=\"return-footnote\" aria-label=\"Return to footnote 15\">&crarr;<\/a><\/li><li id=\"footnote-327-16\">Lemos, Robert. <a class=\"external text\" href=\"http:\/\/www.infoworld.com\/article\/2618688\/antimalware\/security-pros-slam-cnet-download-com-s-bundling.html\" rel=\"nofollow\">\"Security pros slam Cnet Download.com's bundling\"<\/a>. InfoWorld Incorporated<span class=\"reference-accessdate\">. Retrieved 2 November 2014<\/span>. <a href=\"#return-footnote-327-16\" class=\"return-footnote\" aria-label=\"Return to footnote 16\">&crarr;<\/a><\/li><li id=\"footnote-327-17\"><a class=\"external text\" href=\"http:\/\/www.cisco.com\/web\/about\/security\/intelligence\/virus-worm-diffs.html\" rel=\"nofollow\">\"What Is the Difference: Viruses, Worms, Trojans, and Bots?\"<\/a>. Cisco Systems, Incorporated<span class=\"reference-accessdate\">. Retrieved 3 November 2014<\/span>. <a href=\"#return-footnote-327-17\" class=\"return-footnote\" aria-label=\"Return to footnote 17\">&crarr;<\/a><\/li><li id=\"footnote-327-18\">\"How Malware Attacks And Spreads In Your Computer.\" <a href=\"#return-footnote-327-18\" class=\"return-footnote\" aria-label=\"Return to footnote 18\">&crarr;<\/a><\/li><li id=\"footnote-327-19\">\"What Is the Difference: Viruses, Worms, Trojans, and Bots?\" <a href=\"#return-footnote-327-19\" class=\"return-footnote\" aria-label=\"Return to footnote 19\">&crarr;<\/a><\/li><li id=\"footnote-327-20\">\"What Is the Difference: Viruses, Worms, Trojans, and Bots?\" <a href=\"#return-footnote-327-20\" class=\"return-footnote\" aria-label=\"Return to footnote 20\">&crarr;<\/a><\/li><li id=\"footnote-327-21\">Siciliano, Robert. <a href=\"#return-footnote-327-21\" class=\"return-footnote\" aria-label=\"Return to footnote 21\">&crarr;<\/a><\/li><li id=\"footnote-327-22\"><a class=\"external text\" href=\"http:\/\/www.kaspersky.com\/internet-security-center\/threats\/trojans\" rel=\"nofollow\">\"What is a Trojan Virus?\"<\/a>. Kaspersky Lab<span class=\"reference-accessdate\">. Retrieved 3 November 2014<\/span>. <a href=\"#return-footnote-327-22\" class=\"return-footnote\" aria-label=\"Return to footnote 22\">&crarr;<\/a><\/li><li id=\"footnote-327-23\">Cannell, Joshua. <a href=\"#return-footnote-327-23\" class=\"return-footnote\" aria-label=\"Return to footnote 23\">&crarr;<\/a><\/li><li id=\"footnote-327-24\">\"Annual Report PandaLabs 2013 Summary.\" <a href=\"#return-footnote-327-24\" class=\"return-footnote\" aria-label=\"Return to footnote 24\">&crarr;<\/a><\/li><li id=\"footnote-327-25\"><a class=\"external text\" href=\"http:\/\/www.kaspersky.com\/internet-security-center\/threats\/adware\" rel=\"nofollow\">\"What is Adware?\"<\/a>. Kaspersky Labs<span class=\"reference-accessdate\">. Retrieved 3 November 2014<\/span>. <a href=\"#return-footnote-327-25\" class=\"return-footnote\" aria-label=\"Return to footnote 25\">&crarr;<\/a><\/li><li id=\"footnote-327-26\"><a class=\"external text\" href=\"http:\/\/www.bleepingcomputer.com\/virus-removal\/adware\" rel=\"nofollow\">\"Adware\"<\/a>. Bleeping Computer LLC<span class=\"reference-accessdate\">. Retrieved 3 November 2014<\/span>. <a href=\"#return-footnote-327-26\" class=\"return-footnote\" aria-label=\"Return to footnote 26\">&crarr;<\/a><\/li><li id=\"footnote-327-27\">Beal, Vangie. <a class=\"external text\" href=\"http:\/\/www.webopedia.com\/DidYouKnow\/Internet\/spyware.asp\" rel=\"nofollow\">\"The Difference Between Adware &amp; Spyware\"<\/a>. Quinstreet Incorporated<span class=\"reference-accessdate\">. Retrieved 3 November 2014<\/span>. <a href=\"#return-footnote-327-27\" class=\"return-footnote\" aria-label=\"Return to footnote 27\">&crarr;<\/a><\/li><li id=\"footnote-327-28\">Schwarz, Thomas. <a class=\"external text\" href=\"http:\/\/www.cse.scu.edu\/~tschwarz\/coen152_05\/Lectures\/BufferOverflow.html\" rel=\"nofollow\">\"Buffer Overflow Attack\"<\/a>. COEN, SCU<span class=\"reference-accessdate\">. Retrieved 6 November 2014<\/span>. <a href=\"#return-footnote-327-28\" class=\"return-footnote\" aria-label=\"Return to footnote 28\">&crarr;<\/a><\/li><li id=\"footnote-327-29\">Mills, Elinor. <a class=\"external text\" href=\"http:\/\/www.cnet.com\/uk\/news\/usb-devices-spreading-viruses\/\" rel=\"nofollow\">\"USB devices spreading viruses\"<\/a>. CBS Interactive Incorporated<span class=\"reference-accessdate\">. Retrieved 6 November 2014<\/span>. <a href=\"#return-footnote-327-29\" class=\"return-footnote\" aria-label=\"Return to footnote 29\">&crarr;<\/a><\/li><li id=\"footnote-327-30\"><a class=\"external text\" href=\"http:\/\/usa.kaspersky.com\/internet-security-center\/threats\/malware-social-engineering\" rel=\"nofollow\">\"Social Engineering\"<\/a>. Kaspersky Labs<span class=\"reference-accessdate\">. Retrieved 6 November 2014<\/span>. <a href=\"#return-footnote-327-30\" class=\"return-footnote\" aria-label=\"Return to footnote 30\">&crarr;<\/a><\/li><li id=\"footnote-327-31\"><a class=\"external text\" href=\"http:\/\/support.kaspersky.com\/6324\" rel=\"nofollow\">\"Heuristic analysis in Kaspersky Internet Security 2012\"<\/a>. Kaspersky Lab<span class=\"reference-accessdate\">. Retrieved 4 November 2014<\/span>. <a href=\"#return-footnote-327-31\" class=\"return-footnote\" aria-label=\"Return to footnote 31\">&crarr;<\/a><\/li><li id=\"footnote-327-32\"><a class=\"external text\" href=\"http:\/\/www.techopedia.com\/definition\/17037\/air-gap\" rel=\"nofollow\">\"Air Gap\"<\/a>. Janalta Interactive Incorporated<span class=\"reference-accessdate\">. Retrieved 6 November 2014<\/span>. <a href=\"#return-footnote-327-32\" class=\"return-footnote\" aria-label=\"Return to footnote 32\">&crarr;<\/a><\/li><li id=\"footnote-327-33\">Mills, Elinor. <a href=\"#return-footnote-327-33\" class=\"return-footnote\" aria-label=\"Return to footnote 33\">&crarr;<\/a><\/li><li id=\"footnote-327-34\">Nikita Borisov, Ian Goldberg, David Wagner. \"<i><a class=\"external text\" href=\"http:\/\/www.isaac.cs.berkeley.edu\/isaac\/mobicom.pdf\" rel=\"nofollow\">Intercepting Mobile Communications: The Insecurity of 802.11<\/a><\/i>\". Retrieved on 12 September 2006. <a href=\"#return-footnote-327-34\" class=\"return-footnote\" aria-label=\"Return to footnote 34\">&crarr;<\/a><\/li><li id=\"footnote-327-35\"><a class=\"external text\" href=\"http:\/\/lirent.net\/wifi\/what-is-a-wep-key.html\" rel=\"nofollow\">\"What is a WEP key?\"<\/a>. lirent.net<span class=\"reference-accessdate\">. Retrieved on 11 March 2008<\/span>. <a href=\"#return-footnote-327-35\" class=\"return-footnote\" aria-label=\"Return to footnote 35\">&crarr;<\/a><\/li><li id=\"footnote-327-36\"><a class=\"external text\" href=\"http:\/\/www.rsa.com\/press_release.aspx?id=8451\" rel=\"nofollow\">\"Wireless Adoption Leaps Ahead, Advanced Encryption Gains Ground in the Post-WEP Era\"<\/a>. RSA.com<span class=\"reference-accessdate\">. Retrieved on 11 March 2008<\/span>. <a href=\"#return-footnote-327-36\" class=\"return-footnote\" aria-label=\"Return to footnote 36\">&crarr;<\/a><\/li><li id=\"footnote-327-37\">Andrea Bittau, Mark Handley, Joshua Lackey. \"<i><a class=\"external text\" href=\"http:\/\/www.cs.ucl.ac.uk\/staff\/M.Handley\/papers\/fragmentation.pdf\" rel=\"nofollow\">The Final Nail in WEP's Coffin<\/a><\/i>\". Retrieved on 16 March 2008. <a href=\"#return-footnote-327-37\" class=\"return-footnote\" aria-label=\"Return to footnote 37\">&crarr;<\/a><\/li><li id=\"footnote-327-38\">Shaw, Gordon. <a href=\"https:\/\/www.virusbtn.com\/blog\/2008\/09_02\" target=\"_blank\">\"AV-Test release latest results.\"<\/a> <em>Virus Bulletin<\/em>. Retrieved 8 March 2009. <a href=\"#return-footnote-327-38\" class=\"return-footnote\" aria-label=\"Return to footnote 38\">&crarr;<\/a><\/li><li id=\"footnote-327-39\"><a href=\"http:\/\/www.offlinetalk.com\/index.php\/topic,106.msg169.html\">http:\/\/www.offlinetalk.com\/index.php\/topic,106.msg169.html<\/a> <a href=\"#return-footnote-327-39\" class=\"return-footnote\" aria-label=\"Return to footnote 39\">&crarr;<\/a><\/li><li id=\"footnote-327-40\"><a class=\"external text\" href=\"http:\/\/www.kabooza.com\/globalsurvey.html\" rel=\"nofollow\">Global Backup Survey<\/a>. Retrieved on 15 February 2009 <a href=\"#return-footnote-327-40\" class=\"return-footnote\" aria-label=\"Return to footnote 40\">&crarr;<\/a><\/li><\/ol><\/div>","protected":false},"author":78,"menu_order":2,"template":"","meta":{"_candela_citation":"[{\"type\":\"cc\",\"description\":\"Computer security\",\"author\":\"\",\"organization\":\"Wikipedia\",\"url\":\"https:\/\/simple.wikipedia.org\/wiki\/Computer%2520security?oldid=5031991\",\"project\":\"\",\"license\":\"cc-by-sa\",\"license_terms\":\"\"},{\"type\":\"cc\",\"description\":\"Malware\",\"author\":\"\",\"organization\":\"Wikipedia\",\"url\":\"https:\/\/simple.wikipedia.org\/wiki\/Malware?oldid=4948052\",\"project\":\"\",\"license\":\"cc-by-sa\",\"license_terms\":\"\"},{\"type\":\"cc\",\"description\":\"HTTP Cookie\",\"author\":\"\",\"organization\":\"Wikipedia\",\"url\":\"https:\/\/simple.wikipedia.org\/wiki\/HTTP%2520cookie?oldid=5031056\",\"project\":\"\",\"license\":\"cc-by-sa\",\"license_terms\":\"\"},{\"type\":\"cc\",\"description\":\"Hypertext Transfer Protocol\",\"author\":\"\",\"organization\":\"Wikipedia\",\"url\":\"https:\/\/simple.wikipedia.org\/wiki\/Hypertext%2520Transfer%2520Protocol?oldid=4118562\",\"project\":\"\",\"license\":\"cc-by-sa\",\"license_terms\":\"\"},{\"type\":\"cc\",\"description\":\"Wired Equivalent Privacy\",\"author\":\"\",\"organization\":\"Wikipedia\",\"url\":\"https:\/\/simple.wikipedia.org\/wiki\/Wired%2520Equivalent%2520Privacy?oldid=4598792\",\"project\":\"\",\"license\":\"cc-by-sa\",\"license_terms\":\"\"},{\"type\":\"cc\",\"description\":\"Wi-Fi Protected Access\",\"author\":\"\",\"organization\":\"Wikipedia\",\"url\":\"https:\/\/simple.wikipedia.org\/wiki\/Wi-Fi%2520Protected%2520Access?oldid=4559244\",\"project\":\"\",\"license\":\"cc-by-sa\",\"license_terms\":\"\"},{\"type\":\"cc\",\"description\":\"Encryption\",\"author\":\"\",\"organization\":\"Wikipedia\",\"url\":\"https:\/\/simple.wikipedia.org\/wiki\/Encryption?oldid=4964670\",\"project\":\"\",\"license\":\"cc-by-sa\",\"license_terms\":\"\"},{\"type\":\"cc\",\"description\":\"Antivirus Software\",\"author\":\"\",\"organization\":\"Wikipedia\",\"url\":\"https:\/\/simple.wikipedia.org\/wiki\/Antivirus%2520software?oldid=4923125\",\"project\":\"\",\"license\":\"cc-by-sa\",\"license_terms\":\"\"},{\"type\":\"cc\",\"description\":\"Firewall (networking)\",\"author\":\"\",\"organization\":\"Wikipedia\",\"url\":\"https:\/\/simple.wikipedia.org\/wiki\/Firewall%2520(networking)?oldid=5035455\",\"project\":\"\",\"license\":\"cc-by-sa\",\"license_terms\":\"\"},{\"type\":\"cc\",\"description\":\"Backup\",\"author\":\"\",\"organization\":\"Wikipedia\",\"url\":\"https:\/\/simple.wikipedia.org\/wiki\/Backup?oldid=4918638\",\"project\":\"\",\"license\":\"cc-by-sa\",\"license_terms\":\"\"}]","CANDELA_OUTCOMES_GUID":"","pb_show_title":"on","pb_short_title":"","pb_subtitle":"","pb_authors":[],"pb_section_license":""},"chapter-type":[],"contributor":[],"license":[],"class_list":["post-327","chapter","type-chapter","status-publish","hentry"],"part":126,"_links":{"self":[{"href":"https:\/\/courses.lumenlearning.com\/suny-buffstate-informationliteracy\/wp-json\/pressbooks\/v2\/chapters\/327","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/courses.lumenlearning.com\/suny-buffstate-informationliteracy\/wp-json\/pressbooks\/v2\/chapters"}],"about":[{"href":"https:\/\/courses.lumenlearning.com\/suny-buffstate-informationliteracy\/wp-json\/wp\/v2\/types\/chapter"}],"author":[{"embeddable":true,"href":"https:\/\/courses.lumenlearning.com\/suny-buffstate-informationliteracy\/wp-json\/wp\/v2\/users\/78"}],"version-history":[{"count":2,"href":"https:\/\/courses.lumenlearning.com\/suny-buffstate-informationliteracy\/wp-json\/pressbooks\/v2\/chapters\/327\/revisions"}],"predecessor-version":[{"id":333,"href":"https:\/\/courses.lumenlearning.com\/suny-buffstate-informationliteracy\/wp-json\/pressbooks\/v2\/chapters\/327\/revisions\/333"}],"part":[{"href":"https:\/\/courses.lumenlearning.com\/suny-buffstate-informationliteracy\/wp-json\/pressbooks\/v2\/parts\/126"}],"metadata":[{"href":"https:\/\/courses.lumenlearning.com\/suny-buffstate-informationliteracy\/wp-json\/pressbooks\/v2\/chapters\/327\/metadata\/"}],"wp:attachment":[{"href":"https:\/\/courses.lumenlearning.com\/suny-buffstate-informationliteracy\/wp-json\/wp\/v2\/media?parent=327"}],"wp:term":[{"taxonomy":"chapter-type","embeddable":true,"href":"https:\/\/courses.lumenlearning.com\/suny-buffstate-informationliteracy\/wp-json\/pressbooks\/v2\/chapter-type?post=327"},{"taxonomy":"contributor","embeddable":true,"href":"https:\/\/courses.lumenlearning.com\/suny-buffstate-informationliteracy\/wp-json\/wp\/v2\/contributor?post=327"},{"taxonomy":"license","embeddable":true,"href":"https:\/\/courses.lumenlearning.com\/suny-buffstate-informationliteracy\/wp-json\/wp\/v2\/license?post=327"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}