Tuesday, June 11, 2019
Internet Security IT Research Paper Example | Topics and Well Written Essays - 750 words
Internet Security IT - Research Paper ExampleIn fact antisocial elements are creating new viruses every day and it is difficult to frustrate such attacks. A proper antivirus software potbelly pr tear downt m both of the virus attacks. However, such antivirus programs should be updated quite regularly to prevent attacks from newer viruses. A rudimentary and key way of staying secure is to make surely you rapidly deploy software updates, such as operating system and browser updates. Make sure too that patches, particularly security patches, are inst each(prenominal)ed as soon as available (How to deal with Internet security threats) If you have ever used an creation program to install system or service software (as nearly every company has), and you have not removed unnecessary services and installed all security patches, then your computer system is vulnerable to taxicab attack (The Top 10 approximately Critical Internet Security Threats - (2000-2001 Archive). art object lay third party programs, spywares and malwares can also be get installed in the computer. Many people have the habit of installing free software even if it may not be useful. Majority of the free software available for download contains malware and spyware to monitor the internet activities of the user and also to steal the username and passwords. It is better to rescind installation of free software from unauthorized or non-credible sources. Moreover, under no circumstances, credit card numbers or bank account numbers should be given to the internet sites which have least protection. Before giving such private details, it should be ensured that those sites have enough security certificates and start with https instead of http. While using usernames and passwords for generateing sensitive internet accounts, easy to guess type of words or names should be avoided. Under no circumstances, a hacker should not be able to guess a username or password correctly. Pass words should contain al phabets as well as characters and numbers so that hackers may struggle to identify it. For operating systems, default installations always include extraneous services and corresponding open ports. Attackers break into systems via these ports (The Top 10 Most Critical Internet Security Threats - (2000-2001 Archive). So, while installing essential software, care should be taken to avoid unwanted services so that the number of open ports can be minimized. The top Web-based attacks in 2009 targeted Internet Explorer and PDF readers. Users tend to trust PDF files because they dont think of them as executing anything however, embedded code in the PDF can carry malware(Mushthaler and Mushthaler). The above information clearly suggests that even software from trusted and reputed vendors may contain malicious things. Firewalls should be strengthened in order to retard the attacks of malicious things such as viruses, spyware etc. All the information entering and leaving the computer should p ass through a properly created firewall so that any malpractices can be detected. Firewall is combined with other security functions, including (in many cases) web application firewalling (WAF), sometimes also known as deep packet follow-up (DPI) (How To Deal With Internet Security Threats) Trojan software is considered to be the most harmful in terms of E-Commerce security due to its ability to secretly tie in and send confidential information. These programs are developed for the specific purpose of communicating without the
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.