SECURITY MEASURES
- Anti virus
definition - Antivirus (or anti-virus) software is used to prevent, detect, and remove malware, including computer viruses, worms, and trojan horses. Such programs may also prevent and remove adware, spyware, and other forms of malware.You can help protect your computer against viruses by using antivirus software, such as:
- AVG Free Edition – AVG Resident Shield provides real-time protection executions of files and programs. It features a smart e-mail scanner, virus updates and virus vault for secure handling of the files which are infected by viruses. The base version for windows is Free for private and non-commercial use.
- McAfee VirusScan for Windows: This antivirus package detects all virus types, including Word and Excel macros; boot-sector infections; and file, multipartite, stealth, polymorphic, and encrypted viruses
- Kaspersky Anti-Virus Personal Pro – A commonly used virus protection solution offering full protection against macro-viruses and unknown viruses. It offers reliable data integrity control and protection of e-mails from viruses.
- ESET NOD32 Antivirus – ESET NOD32 Anti-virus is available as an anti-virus for small businesses, individuals and for large networks. The trialware enables the user to try the application for a period of 30 days
- avast! Home Edition – A free antivirus solution for scanning disk, CDs, in E-mail, HTTP, NNTP, IM and P2P
- Norton AntiVirus – Norton AntiVirus is the most popular and secure virus scanner for checking boot sector records at startup. The live update feature automatically installs new updates for regular protection against viruses
To help prevent the most current viruses, you must update your antivirus software regularly. You can set up most types of antivirus software to update automatically.
How to Identify Virus?
Two technique are used to identify the virus.
If an antivirus program identifies an infected file, it attempts to remove its virus, worm or Trojan horse. If the antivirus program cannot remove the infection, it often quarantines the infected file. Quarantine is a separate area of a hard disk that holds the infected file until the infection can be removed. This step ensures other files will not become infected. Patents for inventions Utility, design or plant patents that protect inventions and improvements to existing inventions
Two technique are used to identify the virus.
If an antivirus program identifies an infected file, it attempts to remove its virus, worm or Trojan horse. If the antivirus program cannot remove the infection, it often quarantines the infected file. Quarantine is a separate area of a hard disk that holds the infected file until the infection can be removed. This step ensures other files will not become infected. Patents for inventions Utility, design or plant patents that protect inventions and improvements to existing inventions
- Anti-spyware
definition - Spyware is a program placed on a computer without the user’s knowledge. It secretly collects information about the user.
The spyware program communicates information to the outside source.
An anti-spyware application program sometime called tracking software or a spybot is used to remove spyware.
Among of the popular anti-spyware programs are:
• Spybot Search and Destroy
• Ad-aware
• Spyware Blaster
The spyware program communicates information to the outside source.
An anti-spyware application program sometime called tracking software or a spybot is used to remove spyware.
Among of the popular anti-spyware programs are:
• Spybot Search and Destroy
• Ad-aware
• Spyware Blaster
Some vendors or employers use spyware to collect information about program usage or employees. Internet advertising firms often collect information about users’ Web browsing habits by hiding spyware in adware. Adware is a program that dispkays an online advertisement in a banner or pop-up windows on Web pages, email, or othe Internet services
How to protect your computer from spyware?
The best defence against spyware and other unwanted technologies is to prevent them from getting into your computer in the first place. Here are some steps you can take to stay safe while using the Internet and software programs.
- Keep security on your computer up to date
o Update security patches
o Security and privacy settings in Internet browsers
- Only download programs from web sites you trust.
- Beware of the fine print: Read all security warnings, license agreements, privacy statements, and “opt-in” notices with any software you download.
- Don’t be tricked into clicking: You don’t have to click “OK,” “Agree,” or “Cancel” to close a window.
- Be extra careful with certain types of “free” programs.
- Use available tools to detect and delete spyware.
o Anti-spyware and antivirus software
o Personal firewall
- Cryptography
definition - A process associated with scrambling plaintext (ordinary text, or cleartext) into ciphertext (a process called encryption), then back again (known as decryption).
Almost all cryptosystems depend on a key such as a password like the numbers or a phrase that can be used to encrypt or decrypt a message.
The traditional type of cryptosystem used on a computer network is called a symmetric secret key system.
The traditional type of cryptosystem used on a computer network is called a symmetric secret key system.
- Firewall
definition - A firewall is a part of a computer system or network that is designed to block unauthorized access while permitting authorized communications. It is a device or set of devices which is configured to permit or deny computer based application upon a set of rules and other criteria.
Firewalls can be implemented in either hardware or software, or a combination of both. Firewalls are frequently used to prevent unauthorized Internet users from accessing private networks connected to the Internet, especially intranets. All messages entering or leaving the intranet pass through the firewall, which examines each message and blocks those that do not meet the specified security criteria.
There are several types of firewall techniques:
- Packet filter: Packet filtering inspects each packet passing through the network and accepts or rejects it based on user-defined rules. Although difficult to configure, it is fairly effective and mostly transparent to its users. It is susceptible to IP spoofing.
- Application gateway: Applies security mechanisms to specific applications, such as FTP and Telnet servers. This is very effective, but can impose a performance degradation.
- Circuit-level gateway: Applies security mechanisms when a TCP or UDP connection is established. Once the connection has been made, packets can flow between the hosts without further checking.
- Proxy server: Intercepts all messages entering and leaving the network. The proxy server effectively hides the true network addresses.
How Firewalls Work?
If you have been using the Internet for any length of time, and especially if you work at a larger company and browse the Web while you are at work, you have probably heard the termfirewall used. For example, you often hear people in companies say things like, "I can't use that site because they won't let it through the firewall."
If you have a fast Internet connection into your home (either a DSL connection or a cable modem), you may have found yourself hearing about firewalls for your home network as well. It turns out that a small home network has many of the same security issues that a large corporate network does. You can use a firewall to protect your home network and family from offensive Web sites and potential hackers.
Firewalls have helped protect computers in large companies for years. Now, they're a critical component of home networks, as well. See more computer networking pictures.
- Data backup
definition - Data Backup is a program of file duplication. Backups of data applications are necessary so that they can be recovered in case of an emergency.
Data backup involves the saving of your data in two or more locations, so that if something happens to your computer, you still have your data reserved in backup. This allows you to keep your data even if you lose your computer. While you might think that the chances of having a major loss of data on your computer or even having your entire computer crash are very small, disasters happen and it is always best to prepare for the worst, especially when it comes to something as irreplaceable as your files.
0 comments:
Post a Comment