Network security consists of the provisions and policies adopted by a network administrator to prevent and monitor unauthorized access, misuse, modification, or denial of a computer network and network-accessible resources. Network security involves the authorization of access to data in a network, which is controlled by the network administrator. Users choose or are assigned an ID and password or other authenticating information that allows them access to information and programs within their authority. Network security covers a variety of computer networks, both public and private, that are used in everyday jobs conducting transactions and communications among businesses, government agencies and individuals. Networks can be private, such as within a company, and others which might be open to public access. Network security is involved in organizations, enterprises, and other types of institutions. It does as its title explains: It secures the network, as well as protecting and overseeing operations being done. The most common and simple way of protecting a network resource is by assigning it a unique name and a corresponding password.
virus :
A computer virus is a computer program that can replicate itself and spread from one computer to another. The term "virus" is also commonly, but erroneously used, to refer to other types of malware, including but not limited to adware and spyware programs that do not have a reproductive ability.
Viruses can increase their chances of spreading to other computers by infecting files on a network file system or a file system that is accessed by other computers. This is some example of computer virus :
- Adware
- Malware
- Spam
- Spyware
- Computer Worms
- Trojan
cyber crime :
Cyber crime encompasses any criminal act dealing with computers and networks (called hacking). Additionally, cyber crime also includes traditional crimes conducted through the Internet. For example; hate crimes, telemarketing and Internet fraud, identity theft, and credit card account thefts are considered to be cyber crimes when the illegal activities are committed through the use of a computer and the Internet. Type of cyber crime is :
- THEFT OF TELECOMMUNICATIONS SERVICES
- COMMUNICATIONS IN FURTHERANCE OF CRIMINAL CONSPIRACIES
- TELECOMMUNICATIONS PIRACY
- DISSEMINATION OF OFFENSIVE MATERIALS
- ELECTRONIC MONEY LAUNDERING AND TAX EVASION
- ELECTRONIC VANDALISM, TERRORISM AND EXTORTION
- SALES AND INVESTMENT FRAUD
- ILLEGAL INTERCEPTION OF TELECOMMUNICATIONS
- ELECTRONIC FUNDS TRANSFER FRAUD
Hacking :
finding out weaknesses in an established system and exploiting them. A computer hacker is a person who finds out weaknesses in the computer and exploits them. Hackers may be motivated by a multitude of
reasons, such as profit, protest, or challenge. The subculture that has evolved around hackers is often referred to as the computer underground but it is now an open community. While other uses of the word hacker exist that are not related to computer security, they are rarely used in mainstream context. They are subject to the long standing hacker definition controversy about the true meaning of the term hacker. In this controversy, the term hacker is reclaimed by computer programmers who argue that someone breaking into computers is better called a cracker, not making a difference between computer criminals (black hats) and computer security experts (white hats). Some white hat hackers claim that they also deserve the title hacker, and that only black hats should be called crackers. The type of hacker is :
- White hat
- Black hat
- Grey hat
- Elite hacker
- Script kiddie
- Neophyte
- Blue hat
- Hacktivist
- Nation state
- Bots
HOW TO PROTECT YOUR COMPUTER ?
- Keep Your Firewall Turned On:
A firewall helps protect your computer from hackers who might try to gain access to crash it, delete information, or even steal passwords or other sensitive information. Software firewalls are widely recommended for single computers. The software is prepackaged on some operating systems or can be purchased for individual computers. For multiple networked computers, hardware routers typically provide firewall protection.
- Install or Update Your Antivirus Software:
Antivirus software is designed to prevent malicious software programs from embedding on your computer. If it detects malicious code, like a virus or a worm, it works to disarm or remove it. Viruses can infect computers without users' knowledge. Most types of antivirus software can be set up to update automatically.
- Install or Update Your Antispyware Technology:
Spyware is just what it sounds like software that is surreptitiously installed on your computer to let others peer into your activities on the computer. Some spyware collects information about you without your consent or produces unwanted pop-up ads on your web browser. Some operating systems offer free spyware protection, and inexpensive software is readily available for download on the Internet or at your local computer store. Be wary of ads on the Internet offering downloadable antispyware in some cases these products may be fake and may actually contain spyware or other malicious code. It's like buying groceries shop where you trust.
- Keep Your Operating System Up to Date:
Computer operating systems are periodically updated to stay in tune with technology requirements and to fix security holes. Be sure to install the updates to ensure your computer has the latest protection.
- Be Careful What You Download:
Carelessly downloading e-mail attachments can circumvent even the most vigilant anti-virus software. Never open an e-mail attachment from someone you don't know, and be wary of forwarded attachments from people you do know. They may have unwittingly advanced malicious code.
- Turn Off Your Computer:
With the growth of high-speed Internet connections, many opt to leave their computers on and ready for action. The downside is that being "always on" renders computers more susceptible. Beyond firewall protection, which is designed to fend off unwanted attacks, turning the computer off effectively severs an attacker's connection be it spyware or a botnet that employs your computer's resources to reach out to other unwitting users.
No comments:
Post a Comment