Computer Security in Cybercafés

Computer Security in Cybercafés

Oghenevwogaga Benson Adogbeji (Delta State University, Nigeria)
Copyright: © 2008 |Pages: 12
DOI: 10.4018/978-1-59904-903-8.ch002
OnDemand PDF Download:
No Current Special Offers


The purpose of this chapter is to address the security breaches in cybercafés and also suggest measures of securing the unsecured computers. In order that cybercafés operate breach free Internet services, there is need for measures to be put in place to secure their network. This chapter of the book therefore unveils the security situation in cybercafés with the view to address network security, network breaches, and methods of protecting cybercafés’ systems. The chapter reveals some ways through which cybercafés encountered breaches such as Trojan horse programs, back door and remote administration programs, unauthorized access, denial of service, and so forth, and equally suggests measures of protecting the computers or networks such as installation of firewalls, use of antivirus, avoidance of opening unknown attachments, disabling of hidden filename extensions, keeping all applications parched, disconnecting from the net when not in use, regular backup of data, virtual private networks, and so forth.

Complete Chapter List

Search this Book: