.
.
.
.For most people it is very difficult to understand IT-Security and also the need to apply it…. To me it looks sometimes like that people see a computer as a modern typewriter and/or a game console, but that’s not the case, I will try to explain to you a computer in a visual manner so that you might able to understand better why there is a need to protect your computer and also why a computer is in danger to get a virus, trojan, and other malware infections. But let us start first with a funny video…
.
.
.
.
.
Introduction of Visual IT-Security
.
Try every time to see a computer as a technical machine, which it is, and when connected to Internet it is your vehicle who navigates you trough the Data Highway (Internet). So, vehicles as you know need sometimes maintenance and may also represent (even new ones) technical problems which may effect the security for you and also for the community.
.
===> Nobody is perfect! <===
.
Explaining Updates, vulnerabilities (security holes) and Security Updates visually
Mostly are this parts who represent manufacturing errors and the cars need then as quick as possible to go to the garage for that such parts will get replaced for free.
So, for a computer this is similar. The “Operating System” called also “OS” (Windows, Mac, Linux…) is developed (programmed) by different teams of developers (programmers), for Microsoft’s “Windows 7” e.g. there are estimated around a thousand of developers and it could contain millions of code lines. Some sources (ZDNET) are talking about more than 50 million lines of code for “Windows Vista“. You can imagine that by such mass of code it is inevitable that errors (bugs) occur. By over 50 million lines of code you can imagine that not all bugs are discovered and some bugs even after years!
See also
- How many people make Windows 7?
- Engineering Windows 7
- The danger of complexity: More code, more bugs
- http://www.scoop.it/t/apple-mac-ios4-ipad-iphone-and-in-security in English, French and German
.
When now a bug is discovered, developing teams are working hard on it to resolve it as quick as possible and then they release an “update“. Thus meaning visually: you need to navigate with your computer over the Data High Way (Internet) to that “Software Garage” which exchanges the bad parts (bugs) against new ones (update) for FREE and so fixes the problem (mostly of time). If the bugs are related to security one talks about a “security hole” (vulnerability).
Thus meaning visually: it’s like if the alarm system of a car doesn’t work properly and someone can break into your car and hijack it! Through so called “security holes” (vulnerabilities) the bad guys may break into your computer and hijacking it, taking control over your computer without your knowledge… Once your computer under control of the bad guys they will make illegal actions with your computer (without your knowledge), illegal actions for which you could get made responsible by law!
Once your computer hijacked (it’s called then “PC Zombie“) :
- the bad guys are earning money with your computer. Visually: they are then comparable to stowaways in your home who would rent your flat for the time you are absent! They will also sell illegal stuff through your hijacked computer, thus meaning you will also become a receiver of stolen goods!
- your computer will be also part then of a so called “botnet“, a ring of hijacked computers, this could be even millions of infected and hijacked computers, who will get used to “attack” Government sites and to “deface” these sites and/or to break into the database of their servers and steal the present data, or even to force the server to go offline as there are too many visits and the server breaks down! The data present there might be your own also!!!
..
..
.
Problems with all those technical words? Please check out this Glossary:
.
.
Questions to ask yourselves:
- Would you drive a car with security problems which would bring yourself and community in danger?
- Would you like to have stowaways in your home who would rent your flat for the time you are absent and that they will earn money with it? Other people earning money with MY computer?
- Would you want to be made responsible for an attack against your own Government? Cyber-Security!!!
- Would you like to see your data stolen from servers where you had to stock them? ===> Your own computer might have helped to steal them!!!
.
Virtual world (Internet) | Action to take | Real world | Action to take |
Virus | Antivirus | Flu, virus | Vaccine |
New virus | Antivirus update | New virus | New serum |
Spam | Filter + antispam or HowTo Fight Spam Efficiently | Publicity flyers | Smash it in the bin |
Hacker, trojans, trojan horse | Firewall + antitrojan | Burglars | Alarm system |
- http://www.scoop.it/t/securite-pc-et-internet in English, French and German
- http://www.scoop.it/t/securite-pc-et-internet?tag=Web-sites-hacks in English, French and German
Gust MEES est Formateur andragogique / pédagogique TIC, membre du “Comité Conseil” de “Luxembourg Safer Internet” (LuSI), appelé maintenant BEESECURE, partenaire officiel (consultant) du Ministère de l’éducation au Luxembourg du projet ”MySecureIT“, partenaire officiel du Ministère du Commerce au Luxembourg du projet ”CASES” (Cyberworld Awareness and SecurityEnhancement Structure)…..
The author Gust MEES is ICT Course Instructor, ”Member of the Advisory Board” from “Luxembourg Safer Internet” (LuSI), BEESECURE, Official Partner (Consultant) from the Ministry of Education in Luxembourg, project “MySecureIT“, Official Partner from the Ministry of Commerce in Luxembourg, project “CASES” (Cyberworld Awareness and Security Enhancement Structure). |
.
.
3 responses to “Visual IT-Security”