Software security:
Computer security software covers a wide variety of potential
risks, including hacker intrusions, destruction of data, harmful viruses,
Trojan horses and other malicious attacks. Computer security software is
available either within the computer's operating system or add-ons freely downloaded or
purchased. Computer security software offers peace of mind amid a growing array
of risks that increase exponentially as more PCs become accessible through the
Internet.
2.Malware
“Malware” is short for “malicious
software” - computer programs designed to infiltrate and damage computers
without the users consent. “Malware” is the general term covering all the
different types of threats to your computer safety such as viruses, spyware, worms,
trojans, rootkits and so on.
1.1
Types of malware:
Viruses
and worms – the contagious threat
Viruses and worms are
defined by their behaviour – malicious software designed to spread without the
user’s knowledge. A virus infects legitimate software and when this software is
used by the computer owner it spreads the virus – so viruses need you to act
before they can spread. Computer worms, on the other hand, spread without user
action. Both viruses and worms can carry a so-called “payload” – malicious code
designed to do damage.
Trojans and Rootkits – the masked threat
trojans and rootkits are grouped together as
they both seek to conceal attacks on computers. Trojan Horses are malignant
pieces of software pretending to be benign applications. Users therefore
download them thinking they will get a useful piece of software and instead end
up with a malware infected computer. Rootkits are different. They are a masking
technique for malware, but do not contain damaging software. Rootkit techniques
were invented by virus writers to conceal malware, so it could go unnoticed by
antivirus detection and removal programs. Today,antivirus products , like bullguard Interner Security,strike back as they come with effective rootkit removal tools.
Spyware and keyloggers
– the financial threat
Spyware and keyloggers are malware used in
malicious attackslike identity theft, phising and social engineering - threats designed to
steal money from unknowing computer users, businesses and banks.
The
latest security reports for the first quarter of 2011 put Trojan infections at
the top of the malware list, with more than 70% of all malicious files detected
on computer systems, followed by the traditional viruses and worms.
The
popularity of rogue antiviruses has been decreasing over the end of 2010 and
beginning of 2011, but the number of downloader Trojans significantly
increased. The detection rates of new malware have increased 15% in the first
quarter of 2011 compared to the last quarter of 2010
3.Antivirus:
Antivirus software
is a type of utily used for scanning
and removing viruses from your
computer. While many types of antivirus (or "anti-virus") programs
exist, their primary purpose is to protect computers from viruses and remove
any viruses that are found.
Types:
Avast
AVG
Avira
4.Adware
Adware
is free software that is supported by advertisements. Common adware programs
are toolbars that sit on your desktop or work in conjunction with your Web
browser. They include features like advanced searching of the Web or your hard
drive and better organization of your bookmarks and shortcuts. Adware can also
be more advanced programs such as games or utilities. They are free to use, but
require you to watch advertisements as long as the programs are open. Since the
ads often allow you to click to a Web site, adware typically requires an active
Internet connection to run.
5.Dangers of Using the
Internet
There are several ways in which the computer can be dangerous to users. The
following is a partial list:
·
It is possible to bring viruses into an individual
computer or an entire network. These viruses can seriously disrupt or even
destroy important work.
·
Users can be spammed with vast quantitities of useless
email. This overabundance of useless information can cause people to miss
important information or to waste time wading through the useless information.
·
People can be cheated by con artists who advertise
seductive products on the Internet.
·
Information that is presented as accurate or important
may be inaccurate and misleading.
·
Children may encounter information that their parents
and teachers don't want them to encounter. Examples include sexually explicit
content, hate literature, bomb-building information, confusing religious
prosylitization, and misinformation about cults and satanic materials.
·
People can be tempted to do illegal or improper things
on the the Internet. Examples include gambling and the perpetration of pranks
or criminal activity.
·
Users can become addicted to the Internet.
6.Wi-fi password
WPA
Wi-Fi Protected Access (WPA) is a
security standard to secure computers connected to a Wi-Fi network.
WPA2
Wi-Fi Protected Access (WPA) is a
security standard to secure computers connected to a Wi-Fi network.
Free
wi-fi dangers
Use of Wi-Fi in coffee
shops, libraries, airports, hotels, universities, and other public places pose
major security risks. While convenient, they’re often not secure. You’re
sharing the network with strangers, and some of them may be interested in your
personal information. If the hotspot doesn’t require a password, it’s not
secure. If it asks for a password through your browser simply to grant access,
or it asks for a Wired Equivalent Privacy (WEP) password, it’s best to treat it
as unsecured. You can be confident that a hotspot is secure only if it asks for
the Wi-Fi Protected Access (WPA and WPA2) password. WPA2 is the most secure.
Also, unsecure laptops
and smart phones make it easy for a hacker to intercept information to and from
the web, including passwords and credit or debit card numbers. They are also
vulnerable to virus and spyware infections, and to having their contents stolen
or destroyed.
7.How to shop
safely and securely online
Before
you type your card details into a website, ensure that the site is secure. Look
out for a small padlock symbol in the address bar (or elsewhere in your browser
window) and a web address beginning with https:// (the s stands for 'secure').
You
also need to check that the website is trustworthy