Skip to main content

How Does Internet Security Work?


  • The Internet, also known as the World Wide Web, allows individuals and businesses to share information and files with other computers. However, any computer that is connected to the Internet is exposed to many risks from other computer users. Even when you are not aware of it, your computer is receiving information from other computers. Some Internet security tasks are automatically performed by your operating system; others must be managed and monitored by the user to be effective.

Common Threats

  • Protecting your computer while using the Internet is a constant process. PC, Mac and other popular operating systems have some built in Internet security features such as firewalls that block unauthorized access to your computer. Internet browser settings can help protect your computer from popups, adware and malicious codes in JavaScript and ActiveX applications. In addition, many Internet ready computers have virus and spyware detection already installed. Coordinating and monitoring these security programs is up to the user.

Basic Defense

  • The first line of defense for dial-up, high speed and wireless Internet access is a firewall. When it is active, your computer will only allow connections from computers at trusted sources. Depending on your operating system, you can allow exceptions and add programs and websites. Virus and spyware protection software will help you safeguard your files and your operating system. Malicious computer users (hackers) insert viruses and spyware in html codes, text files and software programs. Once downloaded and activated, these programs can destroy files, copy passwords and damage software applications to the extent that your computer no longer functions.

Passwords and Privacy

  • Almost every website, forum and even your email program requires you to enter a password. For added security, do not use the same password repeatedly. Combine random letters and numbers for strong password security. Avoid giving your personal email address to every site that you visit. It is better to sign up on new sites with a disposable email address. Despite aggressive legislation and prosecution, spam is still a major problem for Internet users. Review every website's privacy policy before providing personal information including your home address.

Email Security

  • Pay particular attention to common email security threats. Do not open email file attachments from unknown sources because this tends to be a major source of viruses. Clicking on active links in emails can redirect your browser to sites that contain spyware, adware or worse. Phishing, phony emails from trusted sources that ask for personal and financial information, can lead to identity theft. In general, your bank or credit card will never email a request for you update your information.

Stay Secure

  • New Internet threats appear daily. Keeping your security software updated is essential to your security plan. Review the default Internet security settings and update settings for your operating system, browser, email program and all installed security software often. Schedule a daily or weekly time for your virus and spyware software to run and report your security status. If you are frequently finding that your computer has been invaded by spyware or viruses, upgrade your software or select stronger protection options.

Comments

  1. You really are my number 1 teacher in blogland

    ReplyDelete

Post a Comment

Popular posts from this blog

CIA Triad for- Base of Information security

The essential security principles of confidentiality, integrity, and availability are often  referred to as the  CIA Triad. All security controls must address these principles. These three  security principles serve as common threads throughout the CISSP CBK. Each domain  addresses these principles in unique ways, so it is important to understand them both in  general terms and within each specific domain: Confidentiality is the principle that objects are not disclosed to unauthorized subjects. Integrity is the principle that objects retain their veracity and are intentionally modified by  authorized subjects only. Availability is the principle that authorized subjects are granted timely access to objects  with sufficient bandwidth to perform the desired interaction. Different security mechanisms address these three principles in different ways and offer varying  degrees of support or application of these principl...

10 Steps to Become a Top Information Security Professional: A Comprehensive Guide

In 2024, the demand for skilled information security professionals is higher than ever. As cyber threats continue to evolve, organizations around the globe are in desperate need of experts who can safeguard their critical data and systems. If you're aspiring to become one of the best in the field, you're in the right place. This comprehensive guide outlines ten essential steps to help you build a successful career in information security. From foundational education to advanced certifications, hands-on experience, and continuous learning, we'll cover everything you need to know to excel and stand out in this dynamic industry. Let's embark on your journey to becoming a top-tier information security professional. 1. Foundation in Computer Science Degree : Obtain a degree in computer science, information technology, or a related field. This will provide you with a strong foundational knowledge. Programming : Learn multiple programming languages such as Python, C++, Java, a...

My Article :- હેકર બનવું છે? કઈ રીતે?

મારી ૨ વર્ષ ની કારકિર્દી માં મને કેટલાય  લોકોએ, ખાસ કરીને કોલેજ ના વિદ્યાર્થીઓએ ઘણી વાર પૂછ્યું છે કે "મારે હેકર બનવું છે. તો હું શું કરું? " અને મારા બ્લોગ્સ માં પણ પૂછવામાં આવે છે કે એક સારો હેકર કઈ રીતે બની શકાય? એવું હું શું કરું અથવા તો મારા માં કઈ લાયકત હોવી જોઈએ એક હેકર બનવા માટે? આ પ્રશ્ન નો સંતોષકારક જવાબ આપવા માટે મેં internet પર શોધખોળ કર્યા પછી મને જે કઈ માહિતી મળી તેને હું આજે અહી રજુ કરું છું. મિત્રો, સૌપ્રથમ હેકર કઈ રીતે બનવું એ જાણવા પહેલા એ જાણવું જરૂરી છે કે ખરેખર હેકિંગ શું છે ? અને હેકર કોને કહેવાય. હેકિંગ ની સીધી અને સરળ વ્યાખ્યા નીચે મુજબ છે.  "તમારા કમ્પ્યુટર,નેટવર્ક(ઈન્ટરનેટ કે LAN દ્વારા) કે કોઈ ડીવાઈસ માં (ફોન, ટેબ્લેટ) માં કરવામાં આવતા ગેરકાયદેસર પ્રવેશ અને ઉપયોગ એ હેકિંગ કહેવાય છે."અને હેકિંગ કરતા લોકોને હેકર કહેવાય છે. હવે તમને થશે કે આવું શું કામ કરવું જોઈએ? આ તો ક્રાઈમ છે. તો તમને જણાવી દઉં કે હેકર મુખ્યત્વે ૨ પ્રકારના હોય છે.    વાઈટ હેટ હેકર્સ (એથીકલ હેકર્સ) : ધારો કે તમે તમારો ફેસબુક નો પાસવર્ડ ભૂલી ગયા(ખરેખર ના ભૂલતા ક્યારેય..)કે ત...