What is computer security?
Computer security, also known as cybersecurity or IT security,
is the protection of information systems from theft or damage to the
hardware, the software, and to the information on them, as well as from
disruption or misdirection of the services they provide.
There are 28 types of computer security but the most just several was popular like,
1) Trojan
One of the most complicated threats among all. Most of the popular banking threats
come from the trojan family such as Zeus Spyeye. It has the ability to hide itself from
antivirus detection and steal important banking data to compromise your bank account.
2) Virus
It is malicious program where it replicates itself and aim to destroy a computer. The
ultimate goal of virus is to ensure that the victim's computer will never be able to operate
properly or even at all.
3) Worms
One of the most harmless threats where it is program designed to spread. It does not alter
your system to cause you to have a nightmare with your computer, but it can spread from
one computer to another computer within a network or even the internet.
4) Spyware
Is a malware which is designed to spy on the victim's computer. If you are intected with it,
Probably your daily activities or certain activities will be spied by the spyware and it will
find itself a way to contact the host of this malware.Mostly, the use of this spyware is to
know what your daily activity so that the attacked can use your information.
5) Botnet
Something that is installed by a Botmaster to take control of all the
computer bots via the botnet infection. It mostly infect through drive
by downloads or even Trojan infection. The result of this threat is the
victim's computer, which is the root will be used for a large scale
attack like DDos.
what is computer sabotage?
Computer sabotage involved deliberate attacks intended to disable
computers or network for the purpose of disrupting commerce, education
and recreation for personal gain, committing espionage, or facilitating
criminal conspiracies, such as drug and human trafficking.
10 step to prevent internet sabotage:
1) Do not put sensitive information on a PC running windows that is always directly
connected to the internet through a fiber optic or DSL line.
2) Put a properly configured firewall between your office machines and the internet. A
firewall will keep outsider from seeing or poking into your office machines, especially
when you're are not around.
3) Keep your own website completely separate from your sensitive business information.
4) Never download and run a program from the web or received as an email attachment
unless it come from a reputable source and you have good reason to run it.
5) Don't use internet file transfer protocol "telnet" or "ftp". These internet procedures send
password used to log onto remote servers in clear text over the internet.
6) Regularly use available virus scanner such as Norton antivirus to catch bugs that make it
into your system.
7) configure your PC not to boot from a floppy disk or CD, which all too often harbor virus.
Always start up directly from the hard drive,
8) Get the system pro to verify your setup is secure.
9) If suppliers are attacked and cut off, be sure you have fall-back arrangements with other
suppliers o ensure your business isn't interrupted.
10) Review your business interruption insurance policy and be sure it doesn't explicitly
exclude cyber or e-terrorism as causes of loss.
How to secure your computer?
1) Keep your computer up to date.
2)Use a firewall
3) Run antivirus on your computer
4)Use a router to share an internet connection
5) Don't stay logged on as an administrator
6) Use a network security keys
No comments:
Post a Comment