19-10-2012, 11:30 AM
CYBER SECURITY
cyber.docx (Size: 21.44 KB / Downloads: 169)
ABSTRACT:
In this paper, we see about the following aspects,
1.Internet Security: What it is and why you need it
2.Protecting yourself from Internet threats
3.Advanced Protection. Simple Solution.
The commonly accepted definition of cyber security is the protection of any computer system, software program, and data against unauthorized use,disclosure,transfer,modification, or destruction, whether accidental or intentional. Cyber attacks can come from internal networks, the Internet, or other private or public systems. Businesses cannot afford to be dismissive of this problem because those who don’t respect, address, and counter this threat will surely become victims.
Threats
Cookies, pop-ups, and adware are tools that track your online behavior, and are used to promote various products. Many cookies are harmless online information gathering and tracking tools. The majority of adware consists of pop-up ads that are merely unsolicited nuisances. The problem is that hackers and online criminals are increasingly using cookies and adware to quietly sneak onto your computer and to access your personal information without your knowledge. This “spyware” watches and records everything you do online, leaving your passwords, private account information, and other personal and sensitive information vulnerable. Once captured, this information can be sent back to online criminals for use in accessing your private information, stealing your identity, and your money. It can also be used to highjack your computer for illegal purposes.
Step One: Find out what’s already on your computer.
The first thing you need to do is to find out whether or not you have spyware or other threatening software on your computer. This requires a good, comprehensive Internet security analysis tool that completely scans your computer for hidden files that would pose a danger or compromise the security of your personal information. The right scanning software will identify Trojan Horses, system monitors, adware, cookies and other dangerous spyware threats and will also review the Web sites that have been visited by anyone using your computer and alert you to any inappropriate content found on them. After a scan has been completed you’ll have a better idea of how secure your computer, personal information, and family actually are.
Step Two: Get rid of the threats.
Once the threats found on your computer have been identified, it’s important to eliminate them as soon as possible. Every minute you wait increases the chances of you becoming a victim of financial and identity theft. This step requires that you use a solid anti-spyware software program which can isolate and eliminate the cookies, adware, system monitors, Trojan Horses, and other dangerous spyware found on your computer. Correctly using the right anti-spyware software will leave your computer free of these dangerous threats.
Step Three: Build a protective wall around your computer.
Once you’ve eliminated all the potentially dangerous programs and cookies from your computer, you’ll want to stay threat free by adding a crucial safeguard called a firewall. A firewall’s job is a lot like the thick walls of a castle. It provides a barrier between you and potential attackers trying to access your computer. It acts as a drawbridge, allowing only communication you control to pass through the gates of your Internet connection. An effective firewall blocks outside intruders who try to access your computer without your permission, giving you the added assurance that your personal information is guarded and safe.
Step Four: Filter out the Internet junk.
No one cares more about the safety and protection of your family than you do. Operators of Web-based businesses that deal in inappropriate Web-content and pornography set out with the goal of getting as many sets of eyes viewing their Web sites as possible, regardless of whether they belong to adults or children. The only sure way to protect those you care about is to manage the content and use of your computer yourself.
The most effective and efficient way to gain total control of your computer content is to install a proven Web-filtering software program (also known as“parentalcontrol”software). Good Web-filtering software lets you decide what’s permitted onto your computer through your browser and what will be denied access. Web-filtering software gives you the extra peace of mind that your family is safe from the barrage of unwanted content and messages that exist online.
BACKUP FILES
Reduce your risk of losing important files to a virus, computer crash, theft or disaster by creating back-up copies. Keep your critical files in one place on your computer’s hard drive so you can easily create a back up copy. Save copies of your important documents and files to a CD, online backup service, flash or USB drive, or a server. Store your back-up media in a secure place away from your computer, in case of fire or theft.Test your back up media periodically to make sure the files are accessible and readable.
COMPUTER SAFETY AT WORK
Be sure to work with your technical support coordinator before implementing new cyber-safety measures. Talk with your technical support coordinator about what cyber-safety measures are in place in your department. Report to your supervisor any cyber-safety policy violations, security flaws/weaknesses you discover or any suspicious activity by unauthorized individuals in your work area. Physically secure your computer by using security cables and locking building/office doors and windows. Do not install unnecessary programs on your work computer.