Every single day, we spend hours on the internet surfing
about whatever interests us. Some people even leave their computer online 24/7
because they don’t want to miss the information that they require. Almost
everything can be done just by surfing the net from your bunny slippers. The
thinking of not going out is safer well, think again. Even by sitting in front
of your computer also can make you a victim of criminal activity.
Remember that internet is a large network. A network that
contains millions of computers connected together. Our computer is connected to
the internet using fiber optic connection or wireless (WiFi). Each computer
have a unique ‘identification number’ called Internet Protocol (IP) address.
This IP enables you to connect to a certain computer. Using this connection,
you can send emails, chat, view videos, shop and other stuff. IPs are provided
by Internet Service Provider (ISP) such as AT&T,
Axiata, AOL
and Telekom.
One most popular crime on the internet is fraud in internet
banking service. Criminals usually sends emails to you asking for your password
and the next minute, just like Criss Angel, all your savings are gone in a
blink of an eye. This is one example of crime using the internet. Do you see
now how important is the internet security? As long as there is connection and
data exchange, we are vulnerable to cybercrimes.
Types of online attacks:
1. Viruses/Trojans/Worms
These are common attacks that we see every day. Some of us
can avoid it and some cannot. Viruses, trojans and worms are usually sent through
emails and free applications or software downloaded from the internet. Even
pirated software and computer games also received complain from users for
carrying threats to the computer. Viruses, Trojans and worms are actually an
application. It runs on its own when you open the infected files. Most of them
are in stealth mode which means you cannot see when and what are the
applications are doing. They can be detected if you run an antivirus program to
scan your computer.
The motive of this kind of attack is to wreck your computer
and all your files. They can modify, rewrite and even delete your files and
other programs. Your computer system also can be infected. Infected system can
make your computer shuts down on its own or restarts. The worst case is it can
damage the whole system.
2. Hacking/Phishing/Identity Theft
These types of attacks are done by professionals. They have
the knowledge and expertise in computer programming and they know what they are
doing. Hackers enter your computer through active connection and take your
personal files, passwords, bank transactions and so on. These are all for
personal gain. Some hackers don’t have to enter your computer. All they have to
do is send fraud emails to their victim and when their victim falls for it,
they will give away their personal information and password through a fake form
that looks really convincing. This is called phishing.
Image: Source
3. Malware/Spyware/Adware
These are almost as same as viruses and Trojans. They are software
send to your computer through email, chat rooms and advertisements (usually
pornography adverts). Malware also tends to destroy or interrupt your computer
program and functions.
Spyware and adware mostly are sent by advertisers to
increase traffic to their site. You will realize you are infected by spyware
and adware when your browser sends you to a specific website that you don’t
require or keep sending pop-up ads. Sometimes there will be unexpected toolbar
appear at your browser that you never install.
Internet Protection Methods
1. Backup your system and files
The most evergreen techniques ever created are your backup
files. It is a traditional safety measures but still proven effective. If your
computer has been infected by viruses, worms, malware etc., you can format your
computer. If you don’t know how to format, ask a computer technician to do it
for you, which is if you have backup your file. You can restore the file later
after your computer has been formatted. This will save you a lot of time to
start from zero again.
I personally don’t encourage backup files not to mention if
you get your backup from the infected computer. You will not know if the files
that you saved in infected or not. However, backup files are best if you store
your file in another device such as external hard disk.
2. Turn on your firewall
Some people know what firewall do and tends to turn it off
if it’s blocking a website from displaying or prevent downloading. That is not
a wise thing to do if you don’t know anything about the website. Even if you
are dying to know the content of the website because its sound cool, you should
just back away. You don’t want to be the next victim of scammers don’t you?
Firewall can control incoming and out coming data to from
your computer. It provides a passage that all network traffic must pass through
before coming or going out from the computer. As the name sounds, the ‘passage’
it provides must pass its security settings. This means not all information
that you are looking for is given the permission to pass the firewall.
Firewall is free build-in software in the operating system
or it can be hardware. This means that you only purchase it with an operating
system cd. There are a few firewall software that you can buy separately. You
can view your firewall settings in control panel and adjust the setting
according to what you desire.
3. Buy Antivirus Software/Antispyware/Antimalware
Of course there are numerous amount and brands of antivirus
software in the market. You can choose which one you like. Every antivirus has
its own strength and weaknesses, so you should choose the one that you can
certainly trust. There are even free
antivirus software like Panda Security,
Microsoft
Security Essentials and AVG
antivirus.
Antivirus can detect almost all suspicious activity in your
computer. If a new virus spreads around, the antivirus software will be updated
to overcome the new infection. At this moment, antivirus is the best solution
for most of the infection in your computer. Usually paid software is better
than the free one. But of course you have to update your license every year to
get their protection service.
4. Advance Internet Security Method
With the advance technology and rapidly changing hacker’s
style, there are organizations that develop its own security measure for its
personal use or for sell to the market. This is because there are organizations
that store confidential data and very top secret like the data of the police,
FBI and CIA. This advance technology is called biometric system.
Biometric is not new technologies. It existed long time ago
but for its expensive price and expensive installment, many individual and
organization think twice before they are willing to buy one. Examples of
biometric are fingerprint scanners, eye scanners, voice recognition and face
recognition system.
Conclusion
No matter how high-tech your computer protection is, there
will be a way for hackers, viruses, spyware etc. to attack your computer. The best
thing to do is to prevent intrusion before it’s too late. Use your common sense
to avoid suspicious website or email. Watch out for bargains that are too good
to be true. Protect also our love ones from internet attacks such as children. Most
of the time internet attacks can be avoided but children that knew nothing will
click anything they see on the internet. You can educate your children about internet
security or use internet filters. Make sure you update your antivirus license
every year and keep every security measures on your computer are working
perfectly.
Article by,
Albert Babok
2010975805
References,
Pakhare, J. (26 February 2008). Internet Security. Retrieved from http://www.buzzle.com/articles/internet-security.html.
Bhavani (31 August 2011). Internet Security Treats and Various Protection Methods. Retrieved from http://www.indiastudychannel.com/resources/144609-Internet-security-threats-various-protection.aspx.
Avolio, F. (n.d). The Internet Protocol Journal, Vol 2, No.2. Firewalls and Internet Security, the Second Hundred (Internet) Years. Retrieved from http://www.cisco.com/web/about/ac123/ac147/ac174/ac200/about_cisco_ipj_archive_article09186a00800c85ae.html.
Shoniregun, C.A. (October 2002). The Future of Internet Security. Retrieved from http://ubiquity.acm.org/article.cfm?id=763941.
Adeyinka, O. (n.d). Internet Attack Methods and Internet Security Technology (pdf). Retrieved from http://jmiller.uaa.alaska.edu/cse465-fall2011/papers/adeyinka2008-1.pdf.
Article by,
Albert Babok
2010975805
References,
Pakhare, J. (26 February 2008). Internet Security. Retrieved from http://www.buzzle.com/articles/internet-security.html.
Bhavani (31 August 2011). Internet Security Treats and Various Protection Methods. Retrieved from http://www.indiastudychannel.com/resources/144609-Internet-security-threats-various-protection.aspx.
Avolio, F. (n.d). The Internet Protocol Journal, Vol 2, No.2. Firewalls and Internet Security, the Second Hundred (Internet) Years. Retrieved from http://www.cisco.com/web/about/ac123/ac147/ac174/ac200/about_cisco_ipj_archive_article09186a00800c85ae.html.
Shoniregun, C.A. (October 2002). The Future of Internet Security. Retrieved from http://ubiquity.acm.org/article.cfm?id=763941.
Adeyinka, O. (n.d). Internet Attack Methods and Internet Security Technology (pdf). Retrieved from http://jmiller.uaa.alaska.edu/cse465-fall2011/papers/adeyinka2008-1.pdf.
0 comments:
Post a Comment