Subscribe For Free Updates!

We'll not spam mate! We promise.

Friday 22 March 2013

Internet Security - Set Your Boundaries Online


Every single day, we spend hours on the internet surfing about whatever interests us. Some people even leave their computer online 24/7 because they don’t want to miss the information that they require. Almost everything can be done just by surfing the net from your bunny slippers. The thinking of not going out is safer well, think again. Even by sitting in front of your computer also can make you a victim of criminal activity.

Remember that internet is a large network. A network that contains millions of computers connected together. Our computer is connected to the internet using fiber optic connection or wireless (WiFi). Each computer have a unique ‘identification number’ called Internet Protocol (IP) address. This IP enables you to connect to a certain computer. Using this connection, you can send emails, chat, view videos, shop and other stuff. IPs are provided by Internet Service Provider (ISP) such as AT&T, Axiata, AOL and Telekom.

One most popular crime on the internet is fraud in internet banking service. Criminals usually sends emails to you asking for your password and the next minute, just like Criss Angel, all your savings are gone in a blink of an eye. This is one example of crime using the internet. Do you see now how important is the internet security? As long as there is connection and data exchange, we are vulnerable to cybercrimes.

Types of online attacks:

1. Viruses/Trojans/Worms
These are common attacks that we see every day. Some of us can avoid it and some cannot. Viruses, trojans and worms are usually sent through emails and free applications or software downloaded from the internet. Even pirated software and computer games also received complain from users for carrying threats to the computer. Viruses, Trojans and worms are actually an application. It runs on its own when you open the infected files. Most of them are in stealth mode which means you cannot see when and what are the applications are doing. They can be detected if you run an antivirus program to scan your computer.

The motive of this kind of attack is to wreck your computer and all your files. They can modify, rewrite and even delete your files and other programs. Your computer system also can be infected. Infected system can make your computer shuts down on its own or restarts. The worst case is it can damage the whole system.

2. Hacking/Phishing/Identity Theft
These types of attacks are done by professionals. They have the knowledge and expertise in computer programming and they know what they are doing. Hackers enter your computer through active connection and take your personal files, passwords, bank transactions and so on. These are all for personal gain. Some hackers don’t have to enter your computer. All they have to do is send fraud emails to their victim and when their victim falls for it, they will give away their personal information and password through a fake form that looks really convincing. This is called phishing.

Image: Source

3. Malware/Spyware/Adware
These are almost as same as viruses and Trojans. They are software send to your computer through email, chat rooms and advertisements (usually pornography adverts). Malware also tends to destroy or interrupt your computer program and functions.

Spyware and adware mostly are sent by advertisers to increase traffic to their site. You will realize you are infected by spyware and adware when your browser sends you to a specific website that you don’t require or keep sending pop-up ads. Sometimes there will be unexpected toolbar appear at your browser that you never install.

Internet Protection Methods
1. Backup your system and files
The most evergreen techniques ever created are your backup files. It is a traditional safety measures but still proven effective. If your computer has been infected by viruses, worms, malware etc., you can format your computer. If you don’t know how to format, ask a computer technician to do it for you, which is if you have backup your file. You can restore the file later after your computer has been formatted. This will save you a lot of time to start from zero again.

I personally don’t encourage backup files not to mention if you get your backup from the infected computer. You will not know if the files that you saved in infected or not. However, backup files are best if you store your file in another device such as external hard disk.

2. Turn on your firewall
Some people know what firewall do and tends to turn it off if it’s blocking a website from displaying or prevent downloading. That is not a wise thing to do if you don’t know anything about the website. Even if you are dying to know the content of the website because its sound cool, you should just back away. You don’t want to be the next victim of scammers don’t you?

Firewall can control incoming and out coming data to from your computer. It provides a passage that all network traffic must pass through before coming or going out from the computer. As the name sounds, the ‘passage’ it provides must pass its security settings. This means not all information that you are looking for is given the permission to pass the firewall.

Firewall is free build-in software in the operating system or it can be hardware. This means that you only purchase it with an operating system cd. There are a few firewall software that you can buy separately. You can view your firewall settings in control panel and adjust the setting according to what you desire.

3. Buy Antivirus Software/Antispyware/Antimalware
Of course there are numerous amount and brands of antivirus software in the market. You can choose which one you like. Every antivirus has its own strength and weaknesses, so you should choose the one that you can certainly trust.  There are even free antivirus software like Panda Security, Microsoft Security Essentials and AVG antivirus.

Antivirus can detect almost all suspicious activity in your computer. If a new virus spreads around, the antivirus software will be updated to overcome the new infection. At this moment, antivirus is the best solution for most of the infection in your computer. Usually paid software is better than the free one. But of course you have to update your license every year to get their protection service.

4. Advance Internet Security Method
With the advance technology and rapidly changing hacker’s style, there are organizations that develop its own security measure for its personal use or for sell to the market. This is because there are organizations that store confidential data and very top secret like the data of the police, FBI and CIA. This advance technology is called biometric system.

Biometric is not new technologies. It existed long time ago but for its expensive price and expensive installment, many individual and organization think twice before they are willing to buy one. Examples of biometric are fingerprint scanners, eye scanners, voice recognition and face recognition system.

Conclusion
No matter how high-tech your computer protection is, there will be a way for hackers, viruses, spyware etc. to attack your computer. The best thing to do is to prevent intrusion before it’s too late. Use your common sense to avoid suspicious website or email. Watch out for bargains that are too good to be true. Protect also our love ones from internet attacks such as children. Most of the time internet attacks can be avoided but children that knew nothing will click anything they see on the internet. You can educate your children about internet security or use internet filters. Make sure you update your antivirus license every year and keep every security measures on your computer are working perfectly. 

Article by,
Albert Babok
2010975805

References,
Pakhare, J. (26 February 2008). Internet Security. Retrieved from http://www.buzzle.com/articles/internet-security.html.
Bhavani (31 August 2011). Internet Security Treats and Various Protection Methods. Retrieved from http://www.indiastudychannel.com/resources/144609-Internet-security-threats-various-protection.aspx.
Avolio, F. (n.d). The Internet Protocol Journal, Vol 2, No.2. Firewalls and Internet Security, the Second Hundred (Internet) Years. Retrieved from http://www.cisco.com/web/about/ac123/ac147/ac174/ac200/about_cisco_ipj_archive_article09186a00800c85ae.html.
Shoniregun, C.A. (October 2002). The Future of Internet Security. Retrieved from http://ubiquity.acm.org/article.cfm?id=763941.
Adeyinka, O. (n.d). Internet Attack Methods and Internet Security Technology (pdf). Retrieved from http://jmiller.uaa.alaska.edu/cse465-fall2011/papers/adeyinka2008-1.pdf.

Socializer Widget By Blogger Yard
SOCIALIZE IT →
FOLLOW US →
SHARE IT →

0 comments:

Post a Comment