Saturday 4 June 2016

Computer security

What is computer security?

  Computer security, also known as cybersecurity or IT security, is the protection of information systems from theft or damage to the hardware, the software, and to the information on them, as well as from disruption or misdirection of the services they provide.

There are 28 types of computer security but the most just several was popular like,

1) Trojan

   One of the most complicated threats among all. Most of the popular banking threats     
   come from the trojan family such as Zeus Spyeye. It has the ability to hide itself from   
   antivirus detection and steal important banking data to compromise your bank account.

2) Virus

   It is malicious program where it replicates itself and aim to destroy a computer. The 
  ultimate goal of virus is to ensure that the victim's computer will never be able to operate 
  properly or even at all.

3) Worms

   One of the most harmless threats where it is program designed to spread. It does not alter 
   your system to cause you to have a nightmare with your computer, but it can spread from 
   one computer to another computer within a network or even the internet.

4) Spyware

   Is a malware which is designed to spy on the victim's computer. If you are intected with it, 
  Probably your daily activities or certain activities will be spied by the spyware and it will    
  find itself  a way to contact the host of this malware.Mostly, the use of this spyware is to 
  know what your daily activity so that the attacked can use your information.

5) Botnet

  Something that is installed by a Botmaster to take control of all the computer bots via the botnet infection. It mostly infect through drive by downloads or even Trojan infection. The result of this threat is the victim's computer, which is the root will be used for a large scale  attack like DDos.


what is computer sabotage?


  Computer sabotage involved deliberate attacks intended to disable computers or network for the purpose of disrupting commerce, education and recreation for personal gain, committing espionage, or facilitating criminal conspiracies, such as drug and human trafficking.


10 step to prevent internet sabotage:


1) Do not put sensitive information on a PC running windows that is always directly     
    connected to the internet through a fiber optic or DSL line.

2) Put a properly configured firewall between your office machines and the internet. A     
    firewall will keep outsider from seeing or poking into your office machines, especially    
    when you're are not around.

3) Keep your own website completely separate from your sensitive business information.

4) Never download and run a program from the web or received as an email attachment     
    unless it come from a reputable source and you have good reason to run it.

5) Don't use internet file transfer protocol "telnet" or "ftp".  These internet procedures send 
    password used to log onto remote servers in clear text over the internet.

6) Regularly use available virus scanner such as Norton antivirus to catch bugs that make it 
     into your system.

7) configure your PC not to boot from a floppy disk or CD, which all too often harbor virus. 
    Always start up directly from the hard drive,

8) Get the system pro to verify your setup is secure.

9) If suppliers are attacked and cut off, be sure you have fall-back arrangements with other 
    suppliers o ensure your business isn't interrupted.

10) Review your business interruption insurance policy and be sure it doesn't explicitly 
      exclude cyber or e-terrorism as causes of loss.



How to secure your computer?

1) Keep your computer up to date.
2)Use a firewall
3) Run antivirus on your computer
4)Use a router to share an internet connection
5) Don't stay logged on as an administrator
6) Use a network security keys





No comments:

Post a Comment