Skip to main content

IMPORTANCE OF COMPUTER SECURITY | NORTON.COM/SETUP

COMPUTER SECURITY

Cybersecurity, computer security or IT security is the protection of computer systems from the theft and damage to their hardware, software or information, as well as from disruption or misdirection of the services they provide. Computer security can be defined as controls that are put in place to provide confidentiality, integrity, and availability for all components of computer systems. These components include data, software, hardware, and firmware.

The threat to Computer Security
A threat, in the context of computer security, refers to anything that has the potential to cause serious harm to a computer system. A threat is something that may or may not happen, but has the potential to cause serious damage. Threats can lead to attacks on computer systems, networks and more.
Types of threats
There are several types of computer security threats such as Trojans, Virus, Adware, Malware, Rootkit, hackers and much more. Check some of the most harmful types of computer Security Threats.
1. Distributed denial-of-service (DDoS) attack
A distributed denial-of-service (DDoS) attack — or DDoS attack — is when a malicious user gets a network of zombie computers to sabotage a specific website or server. The attack happens when the malicious user tells all the zombie computers to contact a specific website or server over and over again.
2. COMPUTER VIRUS
A Computer Virus is a malicious program, which replicates itself and infects the files and programs of your PC and can make them non-functional.
3. COMPUTER WORMS
A self-replicating computer program that spreads malicious codes, computer worms make use of the network to send copies of the original codes to other PCS. It can also go to the extent of sending transferring documents utilizing the email of the user.
4. SCAREWARE
Scareware is a malware that tricks victims to buy software by displaying fake virus alerts. A scareware infected PC may get pop-ups of fake malware threats and to get rid of those, users are prompted to purchase a fake anti-malware software.
5. KEYLOGGER
Also known as a keystroke logger, Keyloggers can track the real-time activity of a user on his computer. Keylogger runs in the background and records all keystrokes made by a user and passes the information to the hacker with the motive to steal password and banking details.
6. ROOTKIT
A rootkit is considered extremely dangerous as they appear to be legitimate files and deceives the computer user. Rootkit masks viruses and worms and makes them appear as necessary files. These are very difficult to remove and only an antivirus with the anti-rootkit feature can remove a rootkit.
Security Defenses
Because of a large number of threats, a lot of defensive strategies and tools have been developed. Bill may have to contend with some of these as he attacks his organization’s computer network, but as an insider, he will likely have the knowledge needed to bypass them. This is why insiders can be so dangerous to computer security.
Bill’s boss, John, takes security seriously. He relies upon encryption for any data he sends to others. Encryption is a method for securing data by using special mathematical algorithms to convert the data into scrambled code before transmission. The data are decoded when an authorized user accesses it. There are a number of software encryption standards, but the two main ones are RSA by RSA Data Security and PGP, or Pretty Good Privacy, available on the Internet.
There are a few ideas to help your kids stay safe and healthy while growing up in the Digital Age.
1. Increase awareness:
Help ensure younger children know the basics of staying safe online by using techniques like online games and videos that will define computer terms (e.g., cyberbullying, netiquette, virus protection) to establish basic understanding.
2. Protect your kid’s identity:
Remind your kids never to give out personal information, such as name, home address, or telephone number, to anyone they don’t know through email, Twitter, Facebook, or in online chat rooms or bulletin boards. Talk with your children about the online risks of interacting with strangers through the computer and sending notes and pictures into cyberspace. Online games may help kids understand how to protect their personal information and the ramifications of stolen identity.
3. Protect your computer:
Regularly updating security software can protect your family against scammers, hackers, and other online threats that can compromise your computer system and, consequently, your family’s financial security and other private information. Using software security that automatically updates keeps your technology current and decreases the likelihood of picking up bad programs or malware.
4. Create unique passwords:
For online safety, tell your kids to use different passwords for every online account they have to help prevent others from accessing their personal information. Make sure that you monitor each account and make sure your children know that strong passwords should include elements like symbols, numbers, uppercase and lowercase letters, and no names or words that others could easily guess.
5. Monitor online activity:
Monitoring your kids’ online activity can help keep them safe. Explore various parental controls and consider what options may work best for you and your family.
6. Prevent cyberbullying:
Cyberbullying — bullying using electronic technology — can happen anytime and anywhere. Teach your children to think through what they post on the Net about other people and the consequences those posts could have if they are unkind or mean. Also, keep communication with your child open and speak up if you suspect someone is bullying him or her.
7. Promote appropriate online interactions:
Use some online games to help show kids how to make responsible decisions about online communication and learn about key issues of digital citizenship. Online activities can include exploration of methods of communication in chat rooms and emails.
Jami Martin is a self-professed security expert; he has been making the people aware of the security threats. His passion is to write about Cybersecurity, cryptography, malware, social engineering, internet and new media. He writes for Norton security products at norton.com/setup

Comments

Post a Comment

Popular posts from this blog

10 Best Privacy Extensions for Google Chrome

Recently, we all are using Google Chrome because it is one of the most common internet browsers available for all individuals and businesses. However, it will always provide you a simple, clean, responsive and also provides you a much-secured browsing experience. Even the Google Chrome antivirus settings are one of the best settings, as there is always a new and emerging thought available online. While to create extra security protection, there are many security extension is available in the Chrome Web Store only to secure Google Chrome. It always provides us a host of built-in features who’s aimed is to maintain your privacy, including the capabilities to surf the web in Incognito mode or to easily manage websites data collection records on your browsing habits. But the other or third party Chrome Extensions can bring your privacy to the next level. With the help of these privacy extensions in the Chrome Web Store, users can do everything by blocking ads to get easy access to yo...

How to Make Use of the Google Reverse Image Search

Get to know about the origin of the picture, take help of your Mac, laptop, tablet or the PC. Through Google to reverse image search, you can research the origins of an image that has been found online. It may be a historical picture that is shown with a petite context or a picture that seems falsified, in such cases you can find the internet for its other uses. Performing a Google Reverse Image Search mission with the help of the Drag and Drop and Open Google Images On your device, locate image file. To the ‘Google Images’ search page, choose and drag the file. Users will see a changed search box when the image will be placed over it. Drop the image; Google will start looking for it. In the Google Search page, your results will be shown. Performing a Google Reverse Image with the help of a picture’s URL You got an image online, but you are not willing to download it. At the contrary, look for it by pasting and copying and pasting the URL. Look for the image that you w...

How to Fix Double NAT Detected in Xbox One Network Settings

Even though Xbox One is one of the most incredible gaming consoles with robust features, sometimes users may encounter issues while using it. Users may encounter the Double NAT detected error on their Xbox One, and they may be daunted by this technical language. However, this error can be resolved easily. Let’s quickly go through what double NAT is, and the method to fix this error. What is Double NAT? Usually, in any typical home network, the Microsoft’s gaming console is hooked to the router for accessing the net. The Xbox One gets allocated to a private IP address when you connect it, and this assists in its identification in the local network. Also, the home network comes with a certain public Internet Protocol address that is unique to it. NAT is the acronym for Network Address Translation, and it enables several gadgets to share a single public Internet Protocol address when the internet connection is allowed. NAT has an integral part in connectivity for MPGs as it deci...