Computer data security

From computer data security perspective, the computer network system has inherent weaknesses. In fact, there are many inherent weaknesses in both internet and intranet: security risks in router, FTP, telnet, password file/etc/passed, X11, Gopher and so on. The initial construction of internet lacks overall consideration of security, so the internet is full of security risks and inherent security weaknesses. As a result, the computer data security is under threat as long as internet is involved. Since hacker attack is one of the biggest threats to computer data security, we are going to introduce it in detail.
Different kinds of hacker attacks Today, it becomes a commonplace to find hacker attacks on the internet. There are different kinds of hacker attacks on the internet and that explains why hacker attack is one of the biggest threats to computer data security. In general, hackers attack users’ computers by taking advantage of system configuration defects, operating system security vulnerabilities and communication protocol vulnerabilities. Up to now, we have found more than 2000 kinds of hacker attacks. In order to find suitable protection measures, we mainly divide these hacker attacks into the following categories. 1.  Denial of service attack: a denial of service attack is an attempt to make a machine or network resource unavailable to its intended users. Denial of service attack is the most basic hacker attack and it is also one of the most formidable hacker attacks. SYN Flood attack, Ping Flood attack, Land attack and Win Nuke attack are some typical examples of denial of service attack. 2.  Unauthorized access attempts: unauthorized access attempts means attackers’ attempts to read, write or execute protected files. Besides, attackers’ attempts to gain access right to protected files are also included. 3.  Pre-probing attack: attackers usually use this kind of attack to get access to the information within and around network in the process of successive unauthorized access attempts. SATAN scan, port scan and IP halfway scan are three typical examples of pre-probing attack. 4.  Suspicious activity: suspicious activity refers to the activity which doesn’t belong to standard network communication activity. It also refers to the activity which is not expected to appear on the internet, such as IP Unknown Protocol and Duplicate IP Address. 5.  Protocol decode: protocol decode can be used in any of the above undesired methods. Network or security administrators need to do decoding work and get corresponding result. The protocol information after decoding may indicate the desired activity. 6.  System agent attack: this kind of attack is mainly initiated against a single host, rather than the entire network. It can be monitored through the Real Secure System Agent.
After knowing these hacker attacks, users need to find suitable protection measures to ensure computer data security. To help users find suitable protection measures, we offer some effective ones here: data encryption, centralized data storage, double hard drive, regular virus scan and data backup. Users can choose anyone of these protection measures or their combinations to ensure computer data security effectively.