![]() ![]() ![]() Defence mechanismsIn order to avoid computer attacks, or at least limit their consequences, countermeasures must be taken: calculators and networks need protection. The only hacker-proof computer is the one which is switched off, not connected to Internet and locked up in a safe. But that is not enough; it is safe as long as it is switched off, but as soon as you switch it on again it is vulnerable and can be attacked during the installation of any updates to the operating system or while it is downloading details of the "signatures" of new viruses or worms which have appeared on Internet while it was switched off. Although these operations take only a short time, a few minutes at most, the chance of being subjected to intrusion through the network in this lapse of time must be taken seriously, and in some particularly "dirty" networks it is almost a certainty. Absolute safety is not possible, as in any environment, but tools have been developed to limit the risks and allow an appropriate level of security to be maintained.
Above all, it is very important to continuously update both the operating system
and the application programmes by installing special programmes ("updates"),
especially those relating to security. By doing this,
you protect your computer from the weaknesses which are identified and which
will sooner or later be exploited by some attacking mechanism computers must be
cared for properly; the owner must know exactly what he is doing in order to
reduce to the minimum the risk of having "doors" open to possible interference.
You should not use obvious passwords (those which can be easily guessed) and it
is advisable to limit as much as possible the use of any services which a
computer offers its users (e.g.
web server
As far as
viruses are concerned, it is a good idea to use "antivirus" programmes that can
identify and often remove (or at least render inoffensive) the large majority of
viruses circulating on-line. To do this, however, special tables containing the
"digital fingerprints" of the viruses themselves must be updated very
frequently, so they can be identified. Apart from protecting individual computers, you can also protect entire networks
of computers using other more sophisticated instruments based on the control of
the traffic packets entering the local network, such as
"firewall
However, firewalls cannot solve the problem of "insiders", i.e. attacks by those
working within the local network of an organisation. In fact, internal hackers
do not need to cross the "safety-zone" created by the firewall. Intrusion
detection systems are used especially for this purpose, as well as for
identifying attacks from outside. They can be considered to be almost complementary to the firewalls. These systems
(IDS |