Comm Corner Logo 
Comm Corner 
What are the Aspects of Local Security?  
Computers and Security  
by John Woody

Alamo PC Organization: HOME > PC Alamode Magazine > Columns > Comm Corner 

This month’s column starts a new area for this columnist.  How do computers and security affect computer communications?  What is involved in computer communications security?  What is computer communications security, anyway?  I will attempt in this article to define the aspects of security for a local computer.  In doing so, I will touch on the network environment, both from the LAN (Local Area Network) view and from the Internet view.  These areas will be addressed in detail in future articles. 

Personal computer and business communication security are becoming much closer allied in need.  Computer security affects all users both at their local machines, and in their communications with the outside world.  We have all had security issues from the beginning of our computing.  Security includes keeping the data from getting into the wrong hands, protecting the machine from physical theft, protecting the machine from electrical damage, keeping track of data, and protecting against hardware problems as well as against software virus or hacker intrusions. 

In the past, home users with dial-up accounts had little need other than virus or computer crash considerations to worry about. The home user usually needed to make sure that someone, usually the kids, did not put an infected floppy in the family computer and infect it.  All the home user needed to do was make sure that the computer was physically locked away to keep the thieves from taking the machine.  Well, the home user may also have had some concern about his data and whether it would remain intact from a serious HDD (Hard Disk Drive) crash.  Of course, backing up was not really considered as a security issue.  Data loss due to power outages or system failures was something we all had to live with.  We all never listened to the basic teaching of data security discipline by backing up and power filtering through UPS (Uniterruptible Power Supply) devices. 

Then the lure of broadband connectivity speed caught on at home.  Direct connection high data speed transfer has blurred the old security awareness.  Now the high speed home user has to worry about the Internet and it’s openness to hackers from down the street in addition to all those other worries.  Suddenly, communications security has become real. 

Small business also had little need to be concerned for most of the same reasons.  The three or four users in the beginning, knew each other and knew that the business data would be safe.  These business computers may or may not have been networked.  The main security problem was that of physical security from fire damage or theft of the machine.  Back-up was practiced after a fashion. 

Then the business started to grow and more users were included.  A network may have been added.  And, it became apparent that Windows for Workgroups and Windows 95/98 were not the most secure OS (Operating System) in that network. All one had to do was pick up the newspaper or any other publication and read about how many security holes were in the Windows OS environment.  In fact, Microsoft presentations began to preach that if security was an issue, then the user should switch to Windows NT. 

That business data being generated was a little more valuable, making back-up necessary at some interval, raised the level of security awareness for business users.  As that small business became more Internet dependent, security from outside intrusion has become more real, especially, when with increased use of direct high speed broadband connections.  Intrusion from the outside is very real when the outside computer communication connection is direct (open) all the time. 

Notice, that I have not mentioned the need to consider what to do to protect against Windows OS problems.  All those crashes.  This is a security issue that must be at the top of every user’s personal computer concern.  There are open security issues with the Windows 95/98 OS family as well as security of data due to it’s somewhat unstable operating environment. 

Computer security covers many aspects of computing and communication.  When we think of computer security, we tend to think only about some unauthorized person breaking into our computer to gain access to our data.  This is not the complete case, in that crashes, fire and flood, robbers, and a host of other events can compromise our system applications and data. 

Computer Security Defined 
Security is defined as the means used to protect information.  Put another way, security is a means to protect information no matter where it resides or travels.  This could be on a network, or in the physical machine.  The official definition includes data in storage, in memory, or in transit.  The Microsoft Windows 98 Resource Kit defines it as "Computer security refers to the protection of all components--hardware, software, and stored data--of a computer or a group of computers from damage, theft, or unauthorized use." 

This security definition is broad enough to include the physical machine, the software, and how the data is moved about.  How the machine and it’s components are used are part of the security definition as well.  Especially, how you transmit your data to the outside world is a part of the security equation. 

Physical security includes location, components, electrical power, and data I/O (Input / Output) to the machine.  The basic location of the machine enclosures, i.e., the CPU case, and monitor must be secure from being hit or knocked over.  The I/O cabling should be in some sort of order to keep EMI (ElectroMagnetic Interference) emissions to a minimum and to keep club footed lookers-on from jerking the machine or monitor off the desk.  Make sure that all the connections are secure and screwed into the machine outlets.  All users should take some care in keeping their machine secure from being stolen.  Some care should be taken to keep the coffee out of the keyboard and Zip drive.  Keep a can of compressed air handy to blow the dust our of the machine regularly.  Computers attract dust. 

Security of the data is also making sure that the CPU case has enough air flow in it to keep the heat at an acceptable level.  Most of the components in the CPU case generate heat.  The CPU and HDD are great generators of heat.  Nearly all CPUs now require a cooling fan.  I only use cases which give me the choice to install extra air flow cooling fans.  I keep the power supply fan clean as well.  I have added air flow to my sayings, "There is no such thing as too much air flow" in a computer. 

An electrical surge protector of good quality should be used for all electrical input.  The surge protector should also have  RJ11/RJ45  POTS/network I/O ports for the phone line and/or network cable.  I recommend that an UPS battery supply be added to the local machine equipment list.  This will save the machine from electrical surges and outages, giving enough time to properly shut the machine down and save work.  An UPS is especially necessary if a network server is being used. 

Software media care should be a part of the security equation as well.  Keep the dust off the floppy, ZIP, and CD disks.  Computers attract dust.  The basic security point is to keep the data media and storage devices clean.  That can of compressed air is handy in this case as well. 

Now, we can discuss how to handle the data.  Software and data basic security is knowing exactly where the data is and where it is going.  Know who gave you the floppy disk and take care in using it.  For those on a home network or small business network, another diminution comes into play in the handling of data over the network.  This means that the components (resources in computerize) in our local machine may be SHARED with others, i.e., others have access to our computer.  Shared resources have direct impact for the home or small business user who has a direct broadband connection such as Roadrunner or SW Bell DSL, which makes intruder security real for the home or small business computer system. 

Handling of data may be the center of computer security, it certainly is the center of what is published about computer intrusions.  Data handling security involves both the data going into the computer and the data going out of it.  This I/O path for the data can be by many means, floppy disk, CD-ROM, network, or the Internet by downloads.  As noted above, any data that travels by some means to and from one’s local machine is subject to intrusion or unauthorized access. 

The primary intruder threat for the home user is downloaded virus problems.  The first order of battle against this type of data security intrusion is to have in place the software applications and methodology to combat the virus.  Virus protection on a local machine means having up-to-date ANTI-VIRUS application utilities on the machine and then using the program to check each file or disk or network download including the Internet to check the input data.  The trick in this security event is remembering to run the anti-virus program to check the floppy, download, or other data input.  Most of the commercial anti-virus programs are "automatic".  I do not trust "automatic", so I have to remember (methodology) to check each data input.  This security problem is multiplied by the number of servers and nodes in a network. 

Unauthorized entry in the home machine or node on a network is another real problem in the security matrix.  Not wanting every passer-by to see what one has in his or her personal computer is a valid concern.  This aspect of security is again multiplied by the number of servers and workstations in a network.  The MS-DOS and Windows OS environment exacerbates the intruder problem in that MS-DOS, Windows for Workgroups (WFW), Windows 95/98 are not secure OSs.  Anyone can reboot these OSs from a floppy boot disk and view the contents of the HDD storage and other memory.  The FAT (File Allocation Table) disk drive format for MS-DOS, WFW, and Windows 95/98 is not secure.  In the Microsoft Windows OS environment, the only secure OS is Windows NT, which can be made secure down to the directory and file level.  The Windows NT OS environment uses another file format called NTFS (New Technology File System), which can be made secure as several levels. 

I do not know the level of security available in Linux or the UNIX OS. 

What to Do 
The most basic method of computer data security is to back it up.  Backing up by some media, tape, CD-ROM, floppy disk, ZIP disk, or a mirrored HDD is a real necessity for basic individual or networked computer.  Physical considerations include keeping the machine clean and cool.  Protect the software media from the elements. 

Obtain and learn to use a good anti-virus program.  Develop a personal methodology that insures the downloads will be virus checked before execution or use. 

Unshare the computer connected to any direct communication access such as direct cable or DSL.  Insert a firewall between the connection and your computers.  Firewalls can be software or hardware. 

This area of computer security will be covered in future articles. 

Conclusion 
Computer security is a broad topic.  In defining the aspects of computer security, I have touched on several issues.  Physical security of the machine itself.  Protection against electrical anomalies, heat, and system malfunctions fall into this category.  Then there are the software problems which may jeopardize the program application software and data.  Virus contamination and unauthorized intruders must also be considered.  A methodology of using the computer should be developed and followed that includes backing up, virus checking, and care with data media from an outside source.  More in the future. 


John Woody is a networking communications consultant specializing in small office, home office networks, training setup, and internet connectivity.