N ot withstanding the previous page on password security and protection this section covers all the aspects of security, monitoring and allowing password access to limited sections of the entire network of your system.
T o begin with you must fully understand the realm of total security. A system is only as secure as the administrator allows it to be.The more people that have access to the passwords and codes the more likely there is to be a breach in the security. To start off slowly and to just elaborate slightly on the previous page when someone asks us how can we stop someone from accessing for instance their email account. "Someone has gotten ahold of my codes". This reverts back to how secure the "Administrator" allows the security to be.
M ost people think by changing there questions and answers and requesting a new password this will solve the problem. We really hate to say this but it won't. The invasion of privacy is a snowball effect that most people do not realize. They just change what is superficial or on the surface not delving deeper to see any other veins of access. A good and final example of this is the email invasion of privacy. You change your passwords but you forget for example you have a program as Gator that stores passwords and access codes. If an intrusion has been done and the passwords were changed, remember that Gator can be imported or exported from the system. If the import/export process were done prior to the access this is where another security breach can occur.
A lso if you have the yahoo companion bar, this can be accessed from any terminal or computer. All these codes and passwords need also be changed to avoid intrusion in the future. The violation of security or privacy most of the time on personal home type systems is done by people that are associated with the "violated" party. At one point in time the parties involved shared the accounts and now they don't.
N ow the statement of "Hacking" into my system pops up. This word, "Hacking" is used far to frequently by people who really have not been "Hacked". Their privacy may of been violated by someone who inadvertantly is known to the other party. Most personal computers (PC's) are for home use. A "Hacker" in the true sense of the word is not going to be bothered with trying to access a PC. To be quite frank, a home PC is too easy to access for a "Hacker". Their thrill comes from the pride of being able to infiltrate the hugh, powerful inaccessible systems of the corporate world. Their main concern also is to infiltrate the corporate world and gain access to the Publicly traded companies that really have something to lose by the intrusion. Here is where the total realm of security would fall.
D epending on how far you want to go with the total realm of security basically hinges on two factors. The first being how much total security do you really need to protect your interests. Secondly it stems on the monetary cost factor. Both of these actually they go hand in hand. The price of security is never too high if the loss factor would be greater than the cost factor.
T here are too many excellent companies out there to list on the different types and levels of total security. There are security companies out there that will set up total security, third party monitoring , password evaluation and so much more. The security companies can go so far as to privately monitor every access, every click of the mouse, every password that goes on within even the largest of conglomerates.
A
lso on a larger scale in a hugh corporation the "Administrator" may be responsible for lets say 10,000 terminals with Thin Star access. The Administrator would not even have access to all the codes to access the entire system. This is usually left to the top few CEO's of the company. Even his/her entries can be monitored down to the minute. Here again is the limited use of password access. The less people that know means the less chance of a breach in security. We have placed a few links to different security companies for your access and further education on what can and can't be done within the realm of total security.
[ Back To Password Protection ]
[ Security Listings ]
[ Security Listings ]
[ Home PC Monitoring ]
[ Lost Passwords ]
|
Search Our Site By Individual letter
[ A ]
[ B ]
[ C ]
[ D ]
[ E ]
[ F ]
[ G ]
[ H ]
[ I ]
[ J-K ]
[ L ] |
|
Little Tips Directory [ Page 1 ] [ Page 2 ] [ Page 3 ] [ Page 4 ] [ Page 5 ] [ Page 6 ] [ Page 7 ] |
|
[ Index Page 1 ]
[ Index Page 2 ]
[ Index Page 3 ]
[ Index Page 4 ]
[ Index Page 5 ] [ Index Page 6 ] [ Index Page 7 ] [ Index Page 8 ] [ Index Page 9 ] [ Index Page 10 ] [ Index Page 11 ] [ Index Page 12 ] [ Index Page 13 ] [ News Letter Archives ]
[ Navigation Page ]
[ Archives Of Published Material ] |
If you are part of the ever growing number of webmasters who enjoy
sharing your knowledge with others on web design, join The
Consigliere Ltd. web ring to broaden your scope of exposure.
Join Today
This Site Was Built And Is Maintained Exclusively by
The Webmaster @ Consigliere Ltd.
Copyright © Consigliere Ltd., All Rights Reserved. 2001-