Huwebes, Agosto 11, 2011

firewall

Advantages use
  1. A feeling of increased security that your PC and contents are being protected.
  2. Relatively inexpensive or free for personal use.
  3. New releases are becoming user friendly.
  4. You can monitor incoming and outgoing security alerts and the firewall company will record and track down an intrusion attempt depending on the severity.
  5. Some firewalls but not all can detect viruses, worms, Trojan horses, or data collectors.
  6. All firewalls can be tested for effectiveness by using products that test for leaks or probe for open ports.


Disadvantages of use


  1. Firewalls evolve due to cracker's ability to circumvent them increases.
  2. "Always on" connections created by Cable and DSL connections create major problems for firewalls. This can be compared to leaving you car running with the keys in it and the doors unlocked which a thief may interpret as an invitation to "Please steal me".
  3. Firewalls cannot protect you from internal sabotage within a network or from allowing other users access to your PC.
  4. Firewalls cannot edit indecent material like pornography, violence, drugs and bad language. This would require you to adjust your browser security options or purchase special software to monitor your children's Internet activity.
  5. Firewalls offer weak defense from viruses so antiviral software and an IDS (intrusion detection system) which protects against Trojans and port scans should also complement your firewall in the layering defense.

access control software

the advantages and disadvantages of access control software:


1. Serial controllers. Controllers are connected to a host PC via a serial RS-485 communication line (or via 20mA current loop in some older systems). External RS-232/485 converters or internal RS-485 cards have to be installed as standard PCs do not have RS-485 communication ports. In larger systems multi-port serial IO boards are used, Digi International being one of most popular options. Advantages:
  • RS-485 standard allows long cable runs, up to 4000 feet (1200 m)
  • Relatively short response time. The maximum number of devices on an RS-485 line is limited to 32, which means that the host can frequently request status updates from each device and display events almost in real time.
  • High reliability and security as the communication line is not shared with any other systems.
Disadvantages:
  • RS-485 does not allow Star-type wiring unless splitters are used
  • RS-485 is not well suited for transferring large amounts of data (i.e. configuration and users). The highest possible throughput is 115.2 kbit/s, but in most system it is downgraded to 56.2 kbit/s or less to increase reliability.
  • RS-485 does not allow host PC to communicate with several controllers connected to the same port simultaneously. Therefore in large systems transfers of configuration and users to controllers may take a very long time and interfere with normal operations.
  • Controllers cannot initiate communication in case of an alarm. The host PC acts as a master on the RS-485 communication line and controllers have to wait till they are polled.
  • Special serial switches are required in order to build a redundant host PC setup.
  • Separate RS-485 lines have to be installed instead of using an already existing network infrastructure.
  • Cable that meets RS-485 standards is significantly more expensive than the regular Category 5 UTP network cable.
  • Operation of the system is highly dependent on the host PC. In case the host PC fails, events from controllers are not retrieved and functions that required interaction between controllers (i.e. anti-passback) stop working.
Access control system using serial main and sub-controllers
2. Serial main and sub-controllers. All door hardware is connected to sub-controllers (a.k.a. door controllers or door interfaces). Sub-controllers usually do not make access decisions, and forward all requests to the main controllers. Main controllers usually support from 16 to 32 sub-controllers. Advantages:
  • Work load on the host PC is significantly reduced, because it only needs to communicate with a few main controllers.
  • The overall cost of the system is lower, as sub-controllers are usually simple and inexpensive devices.
  • All other advantages listed in the first paragraph apply.
Disadvantages:
  • Operation of the system is highly dependent on main controllers. In case one of the main controllers fails, events from its sub-controllers are not retrieved and functions that require interaction between sub controllers (i.e. anti-passback) stop working.
  • Some models of sub-controllers (usually lower cost) have no memory and processing power to make access decisions independently. If the main controller fails, sub-controllers change to degraded mode in which doors are either completely locked or unlocked and no events are recorded. Such sub-controllers should be avoided or used only in areas that do not require high security.
  • Main controllers tend to be expensive, therefore such topology is not very well suited for systems with multiple remote locations that have only a few doors.
  • All other RS-485-related disadvantages listed in the first paragraph apply.
Access control system using serial main controller and intelligent readers
3. Serial main controllers & intelligent readers. All door hardware is connected directly to intelligent or semi-intelligent readers. Readers usually do not make access decisions, and forward all requests to the main controller. Only if the connection to the main controller is unavailable, the readers use their internal database to make access decisions and record events. Semi-intelligent reader that have no database and cannot function without the main controller should be used only in areas that do not require high security. Main controllers usually support from 16 to 64 readers. All advantages and disadvantages are the same as the ones listed in the second paragraph.
Access control systems using serial controllers and terminal servers
4. Serial controllers with terminal servers. In spite of the rapid development and increasing use of computer networks, access control manufacturers remained conservative and did not rush to introduce network-enabled products. When pressed for solutions with network connectivity, many chose the option requiring less efforts: addition of a terminal server, a device that converts serial data for transmission via LAN or WAN. Terminal servers manufactured byLantronix and Tibbo Technology are popular in the security industry. Advantages:
  • Allows utilizing existing network infrastructure for connecting separate segments of the system.
  • Provides convenient solution in cases when installation of an RS-485 line would be difficult or impossible.
Disadvantages:
  • Increases complexity of the system.
  • Creates additional work for installers: usually terminal servers have to be configured independently, not through the interface of the access control software.
  • Serial communication link between the controller and the terminal server acts as a bottleneck: even though the data between the host PC and the terminal server travels at the 10/100/1000Mbit/s network speed it then slows down to the serial speed of 112.5 kbit/s or less. There are also additional delays introduced in the process of conversion between serial and network data.
All RS-485-related advantages and disadvantages also apply.
Access control system using network-enabled main controllers
5. Network-enabled main controllers. The topology is nearly the same as described in the second and third paragraphs. The same advantages and disadvantages apply, but the on-board network interface offers a couple valuable improvements. Transmission of configuration and users to the main controllers is faster and may be done in parallel. This makes the system more responsive and does not interrupt normal operations. No special hardware is required in order to achieve redundant host PC setup: in case the primary host PC fails, the secondary host PC may start polling network controllers. The disadvantages introduced by terminal servers (listed in the fourth paragraph) are also eliminated.
Access control system using IP controllers
6. IP controllers. Controllers are connected to a host PC via Ethernet LAN or WAN. Advantages:
  • An existing network infrastructure is fully utilized, there is no need to install new communication lines.
  • There are no limitations regarding the number of controllers (32 per line in case of RS-485).
  • Special RS-485 installation, termination, grounding and troubleshooting knowledge is not required.
  • Communication with controllers may be done at the full network speed, which is important if transferring a lot of data (databases with thousands of users, possibly including biometric records).
  • In case of an alarm controllers may initiate connection to the host PC. This ability is important in large systems because it allows to reduce network traffic caused by unnecessary polling.
  • Simplifies installation of systems consisting of multiple sites separated by large distances. Basic Internet link is sufficient to establish connections to remote locations.
  • Wide selection of standard network equipment is available to provide connectivity in different situations (fiber, wireless, VPN, dual path, PoE)
Disadvantages:
  • The system becomes susceptible to network related problems, such as delays in case of heavy traffic and network equipment failures.
  • Access controllers and workstations may become accessible to hackers if the network of the organization is not well protected. This threat may be eliminated by physically separating the access control network from the network of the organization. Also it should be noted that most IP controllers utilize either Linux platform or proprietary operating systems, which makes them more difficult to hack. Industry standard data encryption is also used.
  • Maximum distance from a hub or a switch to the controller (if using a copper cable) is 100 meters (330 ft).
  • Operation of the system is dependent on the host PC. In case the host PC fails, events from controllers are not retrieved and functions that required interaction between controllers (i.e. anti-passback) stop working. Some controllers, however, have peer-to-peer communication option in order to reduce dependency on the host PC.
Access control system using IP readers
7. IP readers. Readers are connected to a host PC via Ethernet LAN or WAN. Advantages:
  • Most IP readers are PoE capable. This feature makes it very easy to provide battery backed power to the entire system, including the locks and various types of detectors (if used).
  • IP readers eliminate the need for controller enclosures.
  • There is no wasted capacity when using IP readers (i.e. a 4-door controller would have 25% unused capacity if it was controlling only 3 doors).
  • IP reader systems scale easily: there is no need to install new main or sub-controllers.
  • Failure of one IP reader does not affect any other readers in the system.
Disadvantages:
  • In order to be used in high-security areas IP readers require special input/output modules to eliminate the possibility of intrusion by accessing lock and/or exit button wiring. Not all IP reader manufacturers have such modules available.
  • Being more sophisticated than basic readers IP readers are also more expensive and sensitive, therefore they should not be installed outdoors in areas with harsh weather conditions or high possibility of vandalism, unless specifically designed for exterior installation. A few manufacturers make such models.
  • In the past, the variety of IP readers in terms of identification technologies and read range was much lower than that of the basic readers. However, with the advent of long range multi-technology readers such as those manufactured by Nedap, Sirit, and a few others, this is no longer so.








encryption

advantages of encryption


  • Data security is a more paramount concern than ever before as more and more data is transmitted between two points. Sensitive or confidential information is at serious risk without proper encryption. In both analog and digital systems, a public key encryption system is designed to allow users to transmit information to one another securely, and it has a number of advantages over a stand-alone secret key system.

Locked Messages

  • One of the biggest advantages of a public key system is simply that the users never need to transmit or reveal their private keys to anyone. A public key is used to encrypt the message, locking the information inside. Anyone can use the public key to encrypt a message. Decrypting the message, however, is another matter, and requires the specific decryption key of the intended recipient. This means that any number of people can send a message, but only the intended recipient can open it.

Private Key Retention

  • In a solely secret key system, the secret key that unlocks the message must be transmitted with the message itself. This means that during transit, the secret key is vulnerable to interception. In some cases, this system even requires trust in an outside party, such as a postal worker or other transmission medium, to convey the message and the key. A public key system allows both parties to retain their private key and reduce or even eliminate any risk of discovery.

Personal Responsibility

  • Another advantage of a public key system is that the holders of each private key are responsible for protecting it. In digital secret key systems, such as the Kerberos secret-key authentication system, a central database keeps copies of all the users' secret keys. An attack can compromise this database and allow widespread access to outside parties. The compromise of a single private key in a public key system doesn't endanger others in the system. There is also no way to claim an already authenticated message has been compromised because the shared secret key has been hijacked.

Multi-User Support

  • Many secret key systems are still in place, and in the right environment, more practical than a public key system. However, in systems with large numbers of users or open, public access, a public key system is more effective in handling the workload so many users produce.

Other Security Features

  • Public keys aren't selected by their users or very memorable. This means that deducing someone's public key is considerably more difficult. Also, the digital certificates that hold the public key are designed to be replaced after a designated period of time. This changing key ensures that individuals trying to break into the system are less likely to gain access.

disadvantages of encryption



- If you forget your passphrase and/or keyfile then there is almost no chance of recovering your data.

- Some forms of encryption only offer nominal protection and can be broken easily with the right program e.g an older ZIP archive or Word Document.

- Some encryption programs are too complicated for the everyday user and they may end up using them incorrectly. This could lead to securing data which they did not wish to encrypt or failing to encode data which they did wish to protect.

- The very existence of encryption programs or encrypted files will attract suspicion as to what it is you are trying to protect whereas a non-encrypted system would not attract the same level of interest.

- With reference to the above point, in certain countries such as the UK, Police can use legislation to compel you to reveal passwords to encrypted data. You could face jail time if you failed to comply.

- Certain types of encryption software are banned in some countries. For example, US versions of the program PGP cannot be exported outside the country.

- As Encryption protects your personal data e.g bank details, love letters etc. it also protects drug dealers who make deals from having their messages intercepted, terrorists planning attacks and paedophiles peddling child pornography.

biometric

advantages of biometric



Advantages of Biometrics : 

*  Increase security - Provide a convenient and low-cost additional tier of security.

* Reduce fraud by employing hard-to-forge technologies and materials. For e.g.Minimise the opportunity for ID fraud, buddy     punching.

* Eliminate problems caused by lost IDs or forgotten passwords by using physiological attributes. For e.g. Prevent     unauthorised use of lost, stolen or "borrowed" ID cards.

*  Reduce password administration costs.

*  Replace hard-to-remember passwords which may be shared or observed.

*  Integrate a wide range of biometric solutions and technologies, customer applications and databases into a robust and     scalable control solution for facility and network access

*  Make it possible, automatically, to know WHO did WHAT, WHERE and WHEN!

*  Offer significant cost savings or increasing ROI in areas such as Loss Prevention or Time & Attendance.

*  Unequivocally link an individual to a transaction or event.


disadvantages of biometric

  • The finger print of those people working in Chemical industries are often affected. Therefore these companies should not use the finger print mode of authentication.
  • It is found that with age, the voice of a person differs. Also when the person has flu or throat infection the voice changes or if there there are too much noise in the environment this method maynot authenticate correctly. Therefore this method of verification is not workable all the time
  • For people affected with diabetes, the eyes get affected resulting in differences.
  • Biometrics is an expensive security solution.



Sabado, Hunyo 25, 2011

Computer Technology

The K-12 Computer/Technology Skills Standard Course of Study identifies the essential knowledge and skills that all students need to be active, lifelong learners in a technology intensive environment. Technology is undergoing rapid change, and new and improved technological advances appear almost daily. The curriculum is designed to form the foundation for continuous learning and to be applicable to ever-changing innovations.

The Computer/Technology Skills Standard Course of Study involves the development of skills over time. Computer/Technology Skills proficiency is not an end in itself, but lays a foundation for lifelong learning. These skills become building blocks with which to meet the challenges of personal and professional life. To become technologically proficient, the student must develop the skills over time, through integrated activities in all content areas K-12, rather than through one specific course. These skills are necessary for all students and should be introduced and refined collaboratively by all K-12 teachers as an integral part of the learning process.

Ethics

The field of ethics (or moral philosophy) involves systematizing, defending, and recommending concepts of right and wrong behavior. Philosophers today usually divide ethical theories into three general subject areas: metaethics, normative ethics, and applied ethics. Metaethics investigates where our ethical principles come from, and what they mean. Are they merely social inventions? Do they involve more than expressions of our individual emotions? Metaethical answers to these questions focus on the issues of universal truths, the will of God, the role of reason in ethical judgments, and the meaning of ethical terms themselves. Normative ethics takes on a more practical task, which is to arrive at moral standards that regulate right and wrong conduct. This may involve articulating the good habits that we should acquire, the duties that we should follow, or the consequences of our behavior on others. Finally, applied ethics involves examining specific controversial issues, such as abortion, infanticide, animal rights,environmental concernshomosexualitycapital punishment, or nuclear war.

By using the conceptual tools of metaethics and normative ethics, discussions in applied ethics try to resolve these controversial issues. The lines of distinction between metaethics, normative ethics, and applied ethics are often blurry. For example, the issue of abortion is an applied ethical topic since it involves a specific type of controversial behavior. But it also depends on more general normative principles, such as the right of self-rule and the right to life, which are litmus tests for determining the morality of that procedure. The issue also rests on metaethical issues such as, “where do rights come from?” and “what kind of beings have rights?”


laws


 is a system of rules and guidelines, usually enforced through a set of institutions. It shapes politics, economics and society in numerous ways and serves as a social mediator of relations between people. Contract law regulates everything from buying a bus ticket to trading on derivatives markets. Property law defines rights and obligations related to the transfer and title of personal and real property. Trust lawapplies to assets held for investment and financial security, while tort law allows claims for compensation if a person's rights or property areharmed. If the harm is criminalised in a statute, criminal law offers means by which the state can prosecute the perpetrator. Constitutional lawprovides a framework for the creation of law, the protection of human rights and the election of political representatives. Administrative law is used to review the decisions of government agencies, while international law governs affairs between sovereign states in activities ranging fromtrade to environmental regulation or military action.

Legal systems elaborate rights and responsibilities in a variety of ways. A general distinction can be made between civil law jurisdictions, which codify their laws, and common law systems, where judge made law is not consolidated. In some countries, religion informs the law. Law provides a rich source of scholarly inquiry, into legal history, philosophy, economic analysis or sociology. Law also raises important and complex issues concerning equality, fairness and justice. "In its majestic equality", said the author Anatole France in 1894, "the law forbids rich and poor alike to sleep under bridges, beg in the streets and steal loaves of bread." In a typical democracy, the central institutions for interpreting and creating law are the three main branches of government, namely an impartial judiciary, a democratic legislature, and an accountable executive. To implement and enforce the law and provide services to the public, a government's bureaucracy, the military and police are vital. While all these organs of the state are creatures created and bound by law, an independent legal profession and a vibrant civil societyinform and support their progress.