Intrnrl Td

  • Subscribe to our RSS feed.
  • Twitter
  • StumbleUpon
  • Reddit
  • Facebook
  • Digg

Wednesday, 13 May 2009

INTERNET SECURITY

Posted on 03:56 by Unknown
When a computer connects to a network and begins communicating with others, it is taking a risk. Internet security involves the protection of a computer's Internet account and files from intrusion of an unknown user.[1] Basic security measures involve protection by well selected passwords, change of file permissions and back up of computer's data.
Security concerns are in some ways peripheral to normal business working, but serve to highlight just how important it is that business users feel confident when using IT systems. Security will probably always be high on the IT agenda simply because cyber criminals know that a successful attack is very profitable. This means they will always strive to find new ways to circumvent IT security, and users will consequently need to be continually vigilant. Whenever decisions need to be made about how to enhance a system, security will need to be held uppermost among its requirements.
Internet security professionals should be fluent in the four major aspects:

Penetration testing
Intrusion Detection
Incidence Response
Legal / Audit Compliance
Anti-virus
Programs can be made to help your computer, but some users can also create programs with intentions of destroying the computers data by being deceptive. Such programs are known as Trojan horses, worms, viruses and spy ware.
Trojan horses are programs which pretend to do one thing, but in reality snoop out your personal data or damage it. These types conceal their identity or true intentions and are usually quite hard to detect.
Worms are programs which are able to replicate themselves over a computer network and in turn perform malicious actions. As a result it has the ability to affect other programs on the computer.
Viruses are programs which are able to log into the personal files on a computer it has affected and as a result, can end up removing all of them. It can have serious side effects on a computers system.
Mal ware can be classified as Trojans with a limited payload and are often not detected by most antivirus software. They may require the use of other software designed to detect other classes of malware, including spy ware.
Software programs such as antivirus software are the most useful in protecting your computer from harmful viruses. These programs are used to detect and eliminate viruses. Anti-virus software can be purchased from any software vendor or downloaded off the Internet. Care should be taken in the selection of anti-virus software, as some programs are not very effective in finding and eliminating viruses or malware. Also, when downloading anti-virus software from the Internet, one should be cautioned that some websites say they are providing protection from viruses with their software, but they are really trying to install malware on your computer by disguising it as something else.
Anti-spy ware
There are two major kinds of threats in relation to spy ware:
Spy ware collects and relays data from the compromised computer to a third-party.
Ad ware automatically plays, displays, or downloads advertisements. Some types of ad ware are also spy ware and can be classified as privacy-invasive software. Ad ware often are integrated with other software.
Email Security
An significant part of the Internet, E-mail encryption is an important subset of this topic.
Browser choice
Almost 70% of the browser market is occupied by Internet Explorer[1]. As a result, malware writers often exploit Internet Explorer. Often malware exploit ActiveX vulnerabilities. Internet Explorer market share is continuously dropping (as of 2009; see list of web browsers for statistics) as users switch to other browsers, most notably FireFox, Opera and Google Chrome.
Buffer overflow attacks
A buffer overflow is a attack that could be used by a hacker to get full system access through various methods. It is similar to "Brute Forcing" a computer in that it sends an immense attack to the victim computer until it cracks. Most Internet security solutions today lack sufficient protection against these types of attacks.
So to protect Ur PC from different types of viruses, there are several types of antiviruses available in the market, which provides quite secure enviornment on internet......
And for more information on internet security visit Internet Security Concepts.
Source ; en.wikipedia.org/wiki/Internet_security
Email ThisBlogThis!Share to XShare to FacebookShare to Pinterest
Posted in | No comments
Newer Post Older Post Home

0 comments:

Post a Comment

Subscribe to: Post Comments (Atom)

Popular Posts

  • Popup Test
    Popup Test is located at the bottom of the page, but let me explain the test first. The popup test is an interactive popup test that will ...
  • It courses
    IT Courses C2 in Information Technology (General) C3 in Information Technology (General) C4 in Information Technology (General) C4 in Inform...
  • UK ISP SAQ Touts New 24Mbps and 96Mbps Broadband Packages
    UK ISP SAQ has revamped its website and launched a new range of broadband services, which includes a bonded ADSL2+ package that can reach sp...
  • Wireless Networking
    Wi-Fi is an extension of the LAN to the wireless domain (WLAN). Wi-Fi technology has simplified the installation and distribution of network...
  • Free ISP
    Free ISPs are Internet Service Providers (ISPs) which provide service free of charge. Many free ISPs display advertisements while the user i...
  • Broadband Speed Test for Cable, DSL and Modem
    Think the test on this page was cool, then check out our new Broadband Speed Test ! Own a website? You can put place the test on your site f...
  • Anti Spam
    Anti spam fights spam bots The purpose of this page is to make it so spammers who attempt to collect email addresses off the web, via progra...
  • SECURITY SERVICES
    ADVANCED SECURITY MultiNet provides several layers of security to protect against unauthorised network access and intruders from the Interne...
  • Dot-com bubble
    Suddenly the low price of reaching millions worldwide, and the possibility of selling to or hearing from those people at the same moment whe...
  • From gopher to the WWW
    As the Internet grew through the 1980s and early 1990s, many people realized the increasing need to be able to find and organize files and i...

Categories

  • HISTORY
  • Internet
  • NETWORKING

Blog Archive

  • ▼  2009 (68)
    • ►  June (22)
    • ▼  May (46)
      • Interstate Highway System
      • Information Superhighway:
      • 1972: First public demonstration of ARPANET
      • 1969: The first LOGs: UCLA -- Stanford
      • 1957: Sputnik has launched ARPA
      • Roads and Crossroads of Internet History
      • No title
      • Mobile phones and the Internet
      • CERN, the European Internet, the link to the Pacif...
      • TCP/IP becomes worldwide
      • Merging the networks and creating the Internet
      • Networks that led to the Internet
      • Packet switching
      • Three terminals and an ARPA
      • Before the Internet
      • INTERNET SECURITY
      • Internet Security
      • Internet Banking: Risk and Security Issues
      • Internet Banking
      • Internet Use at Wells Fargo Bank
      • Uses of Internet
      • CDMA & GSM Cellular Technology
      • ISP,s LIST OF PAKISTAN
      • Common uses of internet
      • Internet service provider
      • End-User-to-ISP Connection
      • Locality
      • ISP Interconnection
      • Peering
      • Virtual ISP
      • Free ISP
      • Types of networks
      • Computer network
      • Wide area network
      • TCP/IP Family Protocol Information
      • Protocols according to layers
      • Growth
      • Creation
      • Internet
      • Intranet
      • Planning and creating an intranet
      • UK ISP SAQ Touts New 24Mbps and 96Mbps Broadband P...
      • ARIN Warns ISPs - IPv4 Internet Addresses to be De...
      • ISP Eutelsat Preps Affordable UK 2Mbps Satellite B...
      • BSkyB Tops 2.085 Million Sky Broadband UK ISP Cust...
      • Vodafone UK Offers One Days FREE Mobile Broadband
Powered by Blogger.

About Me

Unknown
View my complete profile