When it comes to personal protection on our personal devices, there are many preventive measure that need to be followed. A firewall must be turned on to help protect computers from hackers that might try to gain access. Installation and update of antivirus software and antispyware technology, will prevent malicious programs from embedding on the computer, most types of antivirus are set up to update automatically. Just as a company, the operating system needs to be up to date to fix security holes, this will make a computer to have the latest protection. Finally, as an individual being careful with what is downloaded in the computer is a major protection, carelessly downloading e-mail attachments can circumvent even the most vigilant anti-virus software
Many forms of spyware, however, are more malicious and can have serious effects on users and businesses. Key logging spyware, for example, transmits to the author of the spyware a log of every keystroke entered on that computer. The author can then sift through this data to find valuable information, such as credit card numbers, security codes and confidential information, from that user or their business. Other types of spyware search through the data stored on the host computer for particular types of file, which are likely to contain confidential or personal information, such as Word documents or images, and transmit them to the spyware
How Scareware Affect / Attack a. Some forms of Spyware also qualify as Scareware because they change the desktop background and claims that same type of spyware has infected the computer. b. Smart fortress is also a type of Scareware when they ask the users to buy professional security for their computer as it has lot of viruses. 6.
History of Norton Antivirus Before Internet access was widespread, viruses were usually transmitted by infected floppy disks. In the year 1990, Norton Antivirus appeared by Peter Norton, who ran a computer software company. In 1994, Symantec bought the company from Norton with all rights and it was developed to detect viruses and spyware. This year, Norton continues with a best user interface, decent essential protection, but still needs being improvements to meet the requirements of the times because evil minds are still creating viruses maligning that effect in the safety of computer systems. So, all of us computer should depend on a strong shield by Norton.
• Worms – A computer worm is a malware computer program that reproduces in order to spread to other computers. He often uses a computer network to spread, based on security vulnerabilities on the target computer to access it. Unlike a computer virus, it does not need to join an existing program. • Trojan horse – At the beginning appears to benign, but then does something other than expected. • Bad applets – malicious java applets or ActiveX controls that may be downloaded onto clients and activated merely by surfing to a web site.
Any hacker want to access your PC will have to face the firewall and the firewall will either deflect the attacks as well as gives warning about it. Firewall basically works as a filter between computer/network and internet There are several ways by which firewall filter information. For home use, firewall easily operate and save your computer from malicious activity. There are two ways by which firewall protects either it allows all traffic and stops the desired malicious content or it stops all traffic unless malicious content is
Some the most common affected sectors from this flaw are web applications, login and logout, password management, remember me, timeouts and account update. • Security Misconfiguration – Most common and most dangerous vulnerability which occurs due to outdated software, unnecessary services, default settings not being changed, incorrect exception management and use of default accounts. This vulnerability is insidious and can cause catastrophic impact. With these vulnerabilities, each and every entrepreneur will be concerned about the data security and privacy online. Now, we will discuss about the major aspect of cyber security for a new entrepreneur.
On the other hand, this does not mean they are fully protected because anyone may obtain a user’s information. In other words, the most common Internet crimes are frauds. Today, not only humans getting viruses, but computers are also. Computers are mainly getting these viruses from the Internet, yet viruses may also be transferred through floppy disks. However, people should mainly be concerned about receiving viruses from the Internet.
They attack a computer with the sole intent of causing harm. They can make the computer malfunction or even this can be very costly especially if you lose important data. Worse yet is the fact that you can easily fall victim to malicious software by clicking on a link on the Internet that appears genuine. Internet viruses can be categorized to three types - those that harm your executable boot files and system, those that affect a specific file by destroying it and those that keep changing things in your computer like Word files. You can protect yourself by installing a reliable anti-virus program on your computer before accessing the