- keep your Firewall turned on
- install or update your Antivirus software
- install or update Antispyware technology
- keep your operation system up to date
- be careful what you download
- turn off your computer when not use it
Thursday, 31 October 2013
Tips on how to protect your computer
Basic Computer Security Tips
- Tip #1: Set up user accounts
One computer, many users, is a security disaster waiting to
happen. Your files and data are your personal, private content and should be
protected accordingly. To prevent other users from seeing or accessing your
data, set up user accounts on your PC. A user account shows an individual's specific
data and not what is present on the entire system. It also specifies privileges
on shared data, such as deleting/editing operations and what software can be
installed on the machine.
This feature is especially useful when kids and adults use
the same machine. What if your child accesses your important work files and
deletes them by mistake? With a separate user account, he/she can only view
certain files and cannot modify or delete them. Even if you are the sole user
of the PC, set up a guest account, in case someone else needs to use the
computer.
- Tip #2: Secure your wireless network
With wired Internet access, there's little risk of someone
encroaching on your network. But wireless networks do have holes in their
security, so as the owner of the network, you need to be vigilant. Setting up
password-protected network access is the first step. You need to assign a
network name and password to your Wi-Fi network. Use the latest wireless
encryption methods like WPA or WPA2. Do not reveal your network password to
others.
- Tip #3: Arm your computer with an anti-virus program
The best defense is a good offense. One of the most basic
computer security guidelines is installing an anti-virus software. Installing
security programs like an anti-virus, keeps your computer round-the-clock safe
against viruses, malware, Trojan worms etc. and other malicious programs. For
better protection, try to install complete security suites, that provide
Internet security and firewalls along with anti-virus software.
- Tip #4: Be regular in updates and virus scans
Just installing an anti-virus program will not protect your
PC. You need to keep it up-to-date with regular virus signature and threat
updates. New viruses and malware programs emerge online each day. Another bad
trait of viruses is that they keep trying to find new ways to enter an
unsuspecting computer. The only way to counter such attacks is to update your
security programs on a regular basis. You should also scan your computer
regularly for dangerous programs. Schedule periodic scans, once-a-month scans,
scanning new added devices and automatic full system scans, to ensure your PC
is threat-free.
- Tip #5: Install parental control software for kid-friendly computer usage
Keeping your computer secure definitely involves keeping
your kids safe from cyber enemies. Aside from explicit and adult content, you
need to filter and monitor what your kid is up to online. Social networking
sites in particular, are fun online places to socialize but they are also
preying grounds for the depraved. Parental control software allows you to set
filters and block sites as well as receive warnings when suspicious activity is
taking place online.
- Tip #6: Block unwanted search results
You can even change your web browser's security settings to
block certain sites and filter out objectionable content. Such settings are not
as powerful as parental control software but it helps to be extra secure. You
can find this feature in the Tools option of most browsers. With search engines
like Google, you can fiddle with search preferences settings.
- Tip #7: Download wisely
Whether it is a picture, an MP3 or a game, downloaded files
are an excellent way for malicious software to enter your computer. Once you
download and install or use a file, there's no telling what it will do to your
machine. So be extra careful when it comes to downloading. Download files from
trusted and preferably certified sites. Sites offering free, cracked versions
of software programs are especially dangerous, as some cracks can contain
malware.
When a download begins, you are asked to save the file
before the downloading actually starts. Read the file name and its extension
carefully, to ensure what you want is being downloaded. While installing a
program, read the license agreement and make sure, only the program you want is
being installed. Sometimes spyware and hidden programs are bundled into the
installer program, and are installed secretly along with your software. Scan
your PC for threats after downloading files from the Internet.
- Tip #8: Be careful with emails
Getting and sending emails is easy, going through your inbox
for mail, that is actually relevant, is not. Email inboxes are storehouses of
junk mail, spam, advertisements, forwards, mail and many times, a hidden
threat. You can keep your inbox sorted and clutter-free by using spam blockers
and filters. Threat-wise, try to avoid opening emails from senders or addresses
you don't know.
A key sign of a malicious email is poor language. Weird,
nonsensical text or poor grammar or even bogus-seeming email addresses are some
signs of a harmful email. Be especially wary of email attachments. Check the
file extension. Files with .exe, .pif, .com,.bin or .bat extensions, can be
malicious. If you do not know the sender of the email, do not open or download
such files, just delete the mail. Instead of opening the attachment from the
mail itself, save the file, let it download and scan it, before opening it.
- Tip #9: Secure your data with backups
Sometimes no matter what steps you take, you lose data. Part
of being secure is having a fail-safe or backup to fall back on, in case
something bad happens. So in case a virus has attacked your files or data is
accidentally deleted, your data is never really lost, if you have a backup of
it. Backup your data regularly, either by storing it on physical devices like
CDs or by backing it up on a network. Set a system restore point for your PC,
so in the event of a system crash, you can restore your PC to a particular
working state with your data intact.
- Tip #10: Be smart with your passwords
Passwords are supposed to keep your individual settings and
data safe, so you need to keep their true value or the actual password safe.
This means, do not write down all your passwords on a piece of paper and keep
it lying around. With numerous passwords, it's understandable that remembering
them all is difficult. So you can write them down but the place where you store
this info, should be secure. And once in a while, please change your passwords.
If in case, they are revealed, updating the passwords can render all hacking
attempts as naught. Another safety precaution is the "remember me"
option in most secure sites. If multiple users access the same PC, do not
select this option.
Types of Computer Attacks
Active Types of Computer Attacks
- Virus
Most famous computer attacks are viruses, which have been
around for the longest time. They install themselves onto the computers and
spread to the other files on the system. They often spread through external
hard drives, or through certain internet sites or through email attachments.
Once the viruses are launched, they become independent of the creator and aim
to infect a number of files and other systems.
- Trojan
In the list of computer attacks, Trojan horses rank right
after the viruses. They often disguise themselves in a piece of software, in
screen saver, or in a game, which appears to work normally. However, once they
are copied onto the system, they will infect the system with a virus or root
kit. In other words, they act as carriers of viruses or root kits, to infect
the system.
- Worm
Worms can be called the cousins of viruses. The difference
between viruses and worms is that worms infect the system without any kind of
assistance from the user. The first step that worms take is to scan the
computers and exploit vulnerabilities. Then it copies itself onto the system
infecting the system, and the process is repeated.
- Root Kit
Hackers gain access into the system with the use of root kit
drivers and take full charge of the computer. These are among the most
dangerous computer attacks, as the hacker can gain more control over the
system, than the owner of the system. In some cases, hackers have been able to
also turn on the victim's webcam and watch the activities of the victim,
without the victim knowing about it at all.
Passive Types of Computer Attacks
- Eavesdropping
As the name suggests, hackers will sneakily listen to the
conversation happening between two computers on the network. This can happen in
a closed system as well as over the internet as well. The other names with
which this is referred to is sniffing or snooping. With eavesdropping,
sensitive data can make its way over the network and can be accessible to
others.
- Password Based Attacks
One of the most common types of cyber attacks are password
based attacks. Here the hackers gains access to the computer and the network
resources by gaining password control. It is often seen that the attacker
changes server and network configuration and in some cases may even delete
data. Data can also be passed onto different networks.
- Denial of Service Attack
As the name suggests, hackers will sneakily listen to the
conversation happening between two computers on the network. This can happen in
a closed system as well as over the internet as well. The other names with
which this is referred to is sniffing or snooping. With eavesdropping,
sensitive data can make its way over the network and can be accessible to
others.
- Compromised Key Attack
To store sensitive data, a secret code or number may be
used. Obtaining the key is no doubt a real huge task for the hacker, it is
possible that after intense research the hacker is indeed able to lay his hands
on the key. Once the key is in possession of the hacker, it is known as
compromised key. The hacker will now have access to the sensitive data and can
make changes to the data. However, there are also chances that the hacker will
try different permutations and combinations of the key to gain access to other
sets of sensitive data as well.
- Identity Spoofing
Every computer has an IP address, due to which it is
considered as a valid and independent entity on the network. One of the common
computer attacks is to assume the identity of another computer. Here IP packets
may be sent from valid addresses and gain access to a particular IP. Once
access is gained, the data on the system may be deleted, modified or rerouted.
Alternately, the hacker can make use of this hacked IP and cause attacks on the
other systems within or outside the network.
- Application Layer Attack
The aim of the application layer attack is to cause fault in
the server's operating system. Once a fault is created in the operating system,
the hacker is able to gain access to the server controls. This in turn leads to
the hacker modifying the data in various ways. A virus may be introduced into
the system or may send numerous requests to the server, which can result in its
crash or security controls may be disabled, due to which restoring the server
back can become difficult.
Wednesday, 30 October 2013
What is computer security
Computer security protect your computer and everything associated with it - your building, your terminals and printer, your cabling, and your disks and tapes. Most importantly computer security protects the information you've stored in your system. That's why computer security is often called information security.
How you protect your computer?
Like this?
or like this?
But the question is
"IS IT SAFE?"
Computer threats
Threats / ancaman
Threat is possible danger to the system. The danger might be a person (a system cracker or a spy), a thing (a faulty piece of equipment), or an event (a fire or a flood)that might exploit a vulnerability
Threat is possible danger to the system. The danger might be a person (a system cracker or a spy), a thing (a faulty piece of equipment), or an event (a fire or a flood)that might exploit a vulnerability
Saturday, 26 October 2013
Types Of Computer Crime
- Hacking: The activity of breaking into a computer system to gain an unauthorized access is known as hacking. The act of defeating the security capabilities of a computer system in order to obtain an illegal access to the information stored on the computer system is called hacking. The unauthorized revelation of passwords with intent to gain an unauthorized access to the private communication of an organization of a user is one of the widely known computer crimes. Another highly dangerous computer crime is the hacking of IP addresses in order to transact with a false identity, thus remaining anonymous while carrying out the criminal activities.
- Phishing: Phishing is the act of attempting to acquire sensitive information like usernames, passwords and credit card details by disguising as a trustworthy source. Phishing is carried out through emails or by luring the users to enter personal information through fake websites. Criminals often use websites that have a look and feel of some popular website, which makes the users feel safe to enter their details there.
- Computer Viruses: Computer viruses arecomputer programs that can replicate themselves and harm the computer systems on a network without the knowledge of the system users. Viruses spread to other computers through network file system, through the network, Internet or by the means of removable devices like USB drives and CDs. Computer viruses are after all, forms of malicious codes written with an aim to harm a computer system and destroy information. Writing computer viruses is a criminal activity as virus infections can crash computer systems, thereby destroying great amounts of critical data.
- Cyberstalking: The use of communication technology, mainly the Internet, to torture other individuals is known as cyberstalking. False accusations, transmission of threats and damage to data and equipment fall under the class of cyberstalking activities. Cyberstalkers often target the users by means of chat rooms, online forums and social networking websites to gather user information and harass the users on the basis of the information gathered. Obscene emails, abusive phone calls and other such serious effects of cyberstalking have made it a type of computer crime.
- Identity Theft: This is one of the most serious frauds as it involves stealing money and obtaining other benefits through the use of a false identity. It is the act of pretending to be someone else by using someone else's identity as one's own. Financial identity theft involves the use of a false identity to obtain goods and services and a commercial identity theft is the using of someone else's business name or credit card details for commercial purposes. Identity cloning is the use of another user's information to pose as a false user. Illegal migration, terrorism and blackmail are often made possible by means of identity theft.
-
Pornography: Abuse of children for generation of pornographic content over the web is one of the most disgusting cyber crimes. Also misusing personal photographs of people to generate forged pornographic content is also a malicious activity in the Internet crime world.
What is Computer Crime?
Alternatively
referred to as cyber crime, e-crime, electronic
crime, or hi-tech crime, computer crime is an
act commonly performed by a knowledgeable computer user, sometimes referred to
as a hacker that
illegally browses or steals a company's or individual's private information. In
some cases, this individual or group of individuals may be malicious and
destroy or otherwise corrupt the computer or data files.
Computer crime refers to any crime involves a computer and a network with the
cases of using of information technology for illegal purposes or for
anauthorized access of a computer system where the intent is to damage, delete
or alter the data present in the computer. Even identity thefts, misusing
device or electronic frauds are considered to be computer crimes. The computer may have been used in the commission of a crime, or
it may be target. There is another term in computer crime which is netcrime
that is refers to criminal exploitation of the Internet.
Subscribe to:
Posts (Atom)