Presentation is loading. Please wait.

Presentation is loading. Please wait.

Common Methods Used to Commit Computer Crimes

Similar presentations


Presentation on theme: "Common Methods Used to Commit Computer Crimes"— Presentation transcript:

1 Security, Privacy, and Ethical Issues in Information Systems and the Internet

2 Common Methods Used to Commit Computer Crimes

3 How to Protect Your Corporate Data from Hackers
1. Stay updated. You need to stay up to date with hacking threats. If you have at least a basic knowledge of what is possible then you can protect your website against it. Follow updates at a tech site such as The Hacker News. Use the information you gain to put fresh precautions in place when necessary.

4 2. Toughen up access control.
The admin level of your website is an easy way into everything you do not want a hacker to see. Enforce user names and passwords that can not be guessed. Change the default database prefix from “wp6_” to something random and harder to guess. Limit the number of login attempts within a certain time, even with password resets, because accounts can be hacked as well. Never send login details by , in case an unauthorized user has gained access to the accoun

5 3. Update everything. Updates cost companies money. They only do it when necessary, yet many people who use the software do not install updates immediately. If the reason behind the update is a security vulnerability, delaying an update exposes you to attack in the interim period. Hackers can scan thousands of websites an hour looking for vulnerabilities that will allow them to break in. They network like crazy, so if one hacker knows how to get into a program then hundreds of hackers will know as well.

6 4. Tighten network security.
Computer users in your office may be inadvertently providing an easy access route to your website servers. Ensure that: Logins expire after a short period of inactivity. Passwords are changed frequently. Passwords are strong and NEVER written down. All devices plugged into the network are scanned for malware each time they are attached. Ever since I founded my hosting company, we've had to watch our network security on a minute-by-minute basis not to be hacked.

7 5. Install a web application firewall.
A web application firewall (WAF) can be software or hardware based. It sets between your website server and the data connection and reads every bit of data passing through it.

8 6. Install security applications.
While not as effective as a full blown WAF, there are some free and paid for security applications that you can install that will make life a bit more difficult for hackers. In fact, even some free plugins such as that from Acunetix WP Security can provide an additional level of protection by hiding the identity of your website’s CMS. By doing so this tool makes you more resilient against automated hacking tools that scout the web, looking for WordPress sites with specific build and version, which has one or more known vulnerabilities.

9 7. Hide admin pages. You do not want your admin pages to be indexed by search engines, so you should use the robots_txt file to discourage search engines from listing them. If they are not indexed then they are harder for hackers to find. This tutorial from SEObook.com is all the help you will need.

10 8. Limit file uploads. File uploads are a major concern. No matter how thoroughly the system checks them out, bugs can still get through and allow a hacker unlimited access to your site’s data. The best solution is to prevent direct access to any uploaded files. Store them outside the root directory and use a script to access them when necessary. Your web host will probably help you to set this up.

11 9. Remove form auto-fill. When you leave auto-fill enabled for forms on your website, you leave it vulnerable to attack from any user’s computer or phone that has been stolen. You should never expose your website to attacks that utilize the laziness of a legitimate user.

12 10. Back-up frequently. Just in case the worst happens anyway, keep everything backed-up. Back up on-site, back up off-site, back up everything multiple times a day. Every time a user saves a file it should automatically back up in multiple locations. Backing up once a day means that you lose that day’s data when your hard drive fails. Remember every hard drive will fail.

13 Using Antivirus Programs


Download ppt "Common Methods Used to Commit Computer Crimes"

Similar presentations


Ads by Google