Site icon Tutorial

Security and Computer Protection

Whether you’re using a computer connected to the Internet from home or office, your computer is a target. Hackers are often looking for credit card numbers, bank account information and any other information they can use for their own gain. It’s not just money-related information they’re after; once they invade a computer, intruders can use the hard disk, processor and Internet connection to attack other computers. Many personal computers are especially vulnerable because in general the average computer user does not realize the risks of being on a network and the protections that are available to guard against these threats. All computer users need to educate themselves and understand the threats in order to more effectively protect their personal information and computer systems.

Computer Threats and prevention

Various computer threats and their prevention are

Viruses

Various types of viruses, their spread and prevention are

Methods of spread

Viruses spread through a variety of methods.  The most common methods are

Prevention

Phishing

The act of sending an e-mail to a user and falsely claiming to be an established legitimate enterprise in an attempt to scam the user into surrendering private information that will be used for identity theft. The e-mail directs the user to visit a Web site where they are asked to update personal information, such as passwords and credit card, social security, and bank account numbers, that the legitimate organization already has. The Web site, however, is bogus and set up only to steal the user’s information. It is also called brand spoofing or carding. Prevention involves

Spyware

Any software that covertly gathers user information through the user’s Internet connection without his or her knowledge, usually for advertising purposes. Spyware applications are typically bundled as a hidden component of freeware or shareware programs that can be downloaded from the Internet; however, it should be noted that the majority of shareware and freeware applications do not come with spyware. Once installed, the spyware monitors user activity on the Internet and transmits that information in the background to someone else. Spyware can also gather information about e-mail addresses and even passwords and credit card numbers. Its prevention involves

Identity Theft

It is a crime whereby criminals impersonate individuals, usually for financial gain. If a thief is able to access this personal information, he or she can use it to commit fraud in your name. Its prevention involves

Mobile Device Security

As mobile devices become more part of our work, personal information, and sensitive data are stored on them which can be lost, stolen, or even hacked. Prevention involves

Wireless Security

A wireless network sends signals through the air instead of a wire. Thus, others can easily intercept the information being sent when using a “unsecured” public or “open access” wireless connection. Its prevention involves

Using personal firewalls on computers

Exit mobile version