Sunday, September 8, 2019

Internet Security IT Research Paper Example | Topics and Well Written Essays - 750 words

Internet Security IT - Research Paper Example In fact antisocial elements are creating new viruses every day and it is difficult to prevent such attacks. A proper antivirus software can prevent many of the virus attacks. However, such antivirus programs should be updated quite regularly to prevent attacks from newer viruses. â€Å"A basic and key way of staying secure is to make sure you rapidly deploy software updates, such as operating system and browser updates. Make sure too that patches, particularly security patches, are installed as soon as available† (How to deal with Internet security threats) â€Å"If you have ever used an installation program to install system or service software (as nearly every company has), and you have not removed unnecessary services and installed all security patches, then your computer system is vulnerable to hacker attack† (The Top 10 Most Critical Internet Security Threats - (2000-2001 Archive). While installing third party programs, spywares and malwares can also be get install ed in the computer. Many people have the habit of installing free software even if it may not be useful. Majority of the free software available for download contains malware and spyware to monitor the internet activities of the user and also to steal the username and passwords. It is better to avoid installation of free software from unauthorized or non-credible sources. Moreover, under no circumstances, credit card numbers or bank account numbers should be given to the internet sites which have least protection. Before giving such private details, it should be ensured that those sites have enough security certificates and start with https instead of http. While using usernames and passwords for opening sensitive internet accounts, easy to guess type of words or names should be avoided. Under no circumstances, a hacker should not be able to guess a username or password correctly. Pass words should contain alphabets as well as characters and numbers so that hackers may struggle to i dentify it. â€Å"For operating systems, default installations always include extraneous services and corresponding open ports. Attackers break into systems via these ports† (The Top 10 Most Critical Internet Security Threats - (2000-2001 Archive). So, while installing essential software, care should be taken to avoid unwanted services so that the number of open ports can be minimized. â€Å"The top Web-based attacks in 2009 targeted Internet Explorer and PDF readers. Users tend to trust PDF files because they don't think of them as executing anything; however, embedded code in the PDF can carry malware†(Mushthaler and Mushthaler). The above information clearly suggests that even software from trusted and reputed vendors may contain malicious things. Firewalls should be strengthened in order to block the attacks of malicious things such as viruses, spyware etc. All the information entering and leaving the computer should pass through a properly created firewall so that any malpractices can be detected. â€Å"Firewall is combined with other security functions, including (in many cases) web application firewalling (WAF), sometimes also known as deep packet inspection (DPI)† (How To Deal With Internet Security Threats) Trojan software is considered to be the most harmful in terms of E-Commerce security due to its ability to secretly connect and send confidential information. These programs are developed for the specific purpose of communicating without the

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.