Case number 7

Ways on how to secure computer system from being compromised 
Protecting your computer is a necessity if you want to stay out of harms way especially on the internet.This is why learning how to secure your computer is a big deal. With the amount of new computer viruses being developed each day, more and more users are having their information compromised due to the fact that there's a flaw in their security system.
the following ways:
1. Make a boot disk on a CD or floppy disk.
In case your computer is damaged or compromised by a malicious program you will at least be able to boot your computer with the boot disk. You will need to make this boot disk before you experience a hostile breach of your system.
2.Turn your computer off and disconnect it from the network when not in use.
  A hacker can not attack your computer when you are not connected to the network or your computer is off.

3.Disable hidden file name extensions.
By default, the Windows operating system is set to “hide file extensions for known file types”. Disable this option so that file extensions will display in the Explorer window. Some file extensions will still remain hidden, but you are more likely to see any unusual file extensions that do not belong.

4.Enable WPA on your router
These days, most of us run a wireless network. But the standard security that's been around for a few years, known as WEP, can now be easily compromised.
As long as enough data is being transmitted, any modern machine will be able to discern the keys being used on a wireless network using WEP within an hour or so. This might not be an issue when you live deep in the Cairngorms of Scotland, but it is if you live in an overpopulated city.
The higher the number of people within range of your access point, the more likely it is that one of them will to try to crack your security. They can do this with almost complete anonymity, and you'll never be able to trace their location.
Even short-term fixes, such as turning off the access point name being broadcast or locking access to MAC addresses, won't help you - a snooper can still derive this information from the data. The only complete protection is to switch encryption methods on your router, so if your router doesn't support anything better than WEP, consider getting a new one.

5. Don't use root for everything
One of the defining characteristics that differentiates Linux from Windows is that standard user accounts can't destroy the integrity of the operating system - you have to be running as the system administrator to do that.
Even though you may routinely use the root account for system administration tasks, it's important that those tasks are kept separate from day-to-day monotony and desktop management.
Some users find the constant stream of password requests that accompany any system administration task annoying, and decide to continually connect as root. This practice is a little like disabling the earth connection in electronic music equipment to stop any ground-loop hum being heard: it will certainly fix the problem, but you could die.
 6. Use parental control from the PC
Talk to your children about the dangers that the Internet poses. Warn them not to give out addresses, birthdays, names, and other private information. Review the website history to determine the places your kids went into. To minimize the online risks, allow your children to only use the computer when you or any responsible adult can monitor and watch them.

7.Take an assessment of your computer 
Do whatever you have to do to secure your computer system. The questions that I've asked above are truly basic in nature and there are much more advanced ways to protect your system. If you don't have the basics in order, how do you expect to take on the more advanced viruses out there? You have to take the necessary measures to protect your computer system. Here's another tip.

8.Cross-company identity management
Closely related to authentication is the dilemma of identity management. Identity management systems tie particular people to particular accounts, names, and attributes. The problem with traditional identity management systems is that they work well within the borders of an organization but not as well with users outside the organization. That’s where cross-organization, or federated, identity management comes in.






9.Shared hard drives

Viruses and network attacks can spread through a network by finding shared hard drives. If you need to share access to files, limit that access to a specific file or folder. Make sure that your sharing options are for a specific person with read-only access, and use a secure password. Never share your operating system folder or any folder that contains programs.
      
10.Rights management
In the borderless network, security problems arise not just in regard to what data can be accessed by whom, but also in regard to what those with legitimate access do with that data once they receive it. Rights management attempts to control what a recipient of an e-mail message or document can do with it.