Friday, February 6, 2009

The threat of online security: how safe is our data?


The Internet is a global system of interconnected computer networks that interchange data by packet switching using the standardized Internet Protocol Suite (IP). It is a “network of networks” that consists of million of private and public business, academic and government networks, which carries various information resources and services such as electronic mail, file sharing or file transfer of local to global scope that are linked by wireless connection, copper wires and fiber-optic cables.

What is Internet Security?

What w
as once a small research network, a home for greybeard researchers and future millionaire geeks is now front-page material? When computer connects to a network and begin communicating with others, it is taking a risk. Internet security involves the protection of a computer’s internet account and files from intrusion of an outside user. Basic security measures involve protection by well selected passwords, change of file permissions and back up of computer’s data.

Programs can be mad
e to help your computer, but there are also some types of Internet Threats that user can create with intentions of destroying the computers data by being deceptive.

(i)
Trojan Horses: programs which pretend to do one thing, but in reality snoop out your personal data or damage it. These types conceal their identity and are usually quite hard to detect.

(ii) Viruses: programs which are able to log into the personal files on a computer it has affected and as a result, can end up removing all of them. It can have serious sides that will effects on a computers system.

(iii) Malware: also known as Malicious Software. It is software designed to infiltrate or damage a computer system without the owner’s informed consent. Besides, Malware can be classified as Trojans with a limited payload and are often not detected by most antivirus software. They may require the use of other software designed to detect other classes of malware, which including spyware.


(iv) Worms: programs which are able to replicate themselves over a computer network and in turn perform malicious actions. As a resu
lt it has the ability to affect other programs on the computer.


Hackers and How to Protect Yourself

http://www.youtube.com/watch?v=0TkDB4KK1s8

The latest in Internet Security Threats

http://www.youtube.com/watch?v=3x7Lj5sdWPk




Thursday, February 5, 2009

How to safeguard our personal and financial data?

Nowadays, internet is more and more important in human life. We rely on internet to save our personal data and using online financial services to do financial transactions such as online banking in order to save time. Therefore, safeguard for us to protect our personal and financial data is very importtant. The following tips will help us become aware of how to protect data both at work and at home.

1. Password protect
Use a strong password or pass-phrase to protect the access data.


2. Safeguard your Social Security number
Never carry your card with you, or any other card that may have your number, like a health insurance card. And don’t put your number on your checks. It's the primary target for identity thieves because it gives them access to your credit report and bank accounts.

3. Secure Your Network
If you have a wireless network at home or work, make sure that you secure it. Hacker can gain access to anything you do over an unsecured network in a matter of seconds. If you look at the documentation for your wireless router, you'll be able to find out how to lock your router and encrypt your information. It won't affect the way you use your wireless network, but it will keep intruders from getting a hold of your info. Using the antivirus software may help you to prevent from hacker.


4. Install and update antispyware and antivirus programs
Install an antivirus program such as Symantec and Norton antivirus, AVG antivirus or other more in order to protect yourself against viruses and Trojan horses that may steal or modify the data on your own computer . In order for the well protection, you must must sure to keep your virus definitions up to date.


5. Install a firewall
A firewall is a software program designed to allow good people in and keep bad people out. Most new computers come with firewalls integrated into their operating systems. If you have an older computer or using dial-up, you may need to buy a firewall separately and install it yourself.


6. Avoid accessing financial information in public
Prevent form logging on to check your bank balance when working from a coffee shop that offers wireless access. Although the systems are convenient but we do not know how powerful their firewalls are.


7. Review your payment statements carefully
Make sure you recognize the website and check the purchases listed before paying the bill. If you don't need or use department-store or bank-issued credit cards, consider closing the accounts. Always check the statement carefully before you leave the website.