Norton Internet Security logo

Network security threats

Dec 14, 2010

0 comments

As you probably know, the main objective of security software is to protect and ensure the safety of information, computer systems or computer networks from theft, vandalism, damage, loss and other potential hazards. Of course, security software is not the only solution to protect a computer system, but in my opinion, namely security software plays a crucial role in securing and maintaining the confidentiality of personal computers.

I think the problem is that unlike the corporate computers, personal computers are not adequately protected against Internet threats, since not all users are good professionals in the field of information security, often ignored the rules of computer security and many other security flaws that are not present in corporate networks. And if, in most instances for corporate computers the main threat are insiders, then for personal computers — Network security threats.

As a rule, to protect personal computer against Network threats helps security software, such as antivirus, anti-spam, firewall, anti-spyware and others — as multi-application security suite or standalone software. And despite the fact that this class of programs provides a malware, spyware, phishing, spam and vulnerability protection, they cannot protect against these threats if the user does not comply with the rules of computer security and ignores the recommendations of experts.

ACL (Access Control List)

Dec 7, 2010

3 comments

ACL — short for Access Control List, a set of data that informs a computer's operating system which permissions, or access rights, that each user or group has to a specific system object, such as a directory or file. Each object has a unique security attribute that identifies which users have access to it, and the ACL is a list of each object and user access privileges such as read, write, or execute.

The information that identifies specific users or groups and their access privileges for a particular file or directory. Each entry in a typical ACL specifies a subject and an operation. For instance, if a file has an access control list that contains (Alice, delete), this would give Alice permission to delete the file.