This website uses cookies to ensure you have the best experience. Learn more

Computer Security Article Essay

2387 words - 10 pages


PC Safety and Security -- What Do I Need

This article is intended to provide you with general hints and tips for PC security, as well as some suggestions for reputable, tierd and tested programmes that can help you maintain a clean system. It is not something just to be followed slavishly, without any thought - rather it will provide you with guidelines that will help defened againts the large number of viruses, Troujans, diallers and other nasties that lurk in the undergrowth of the internet. So, once you've digested every last morsel here, have a think about what you need to do improve your security and prevent infection.

This has probaly been said before but is still worth repeating: there is no such thing as perfect security. And this applies not just to Pcs!

Now that that's out the way, lets move on and see what we need to think about to keep safe and secure while out and about on the web.

The first and most important thing to get is........commonsense! Yes, thats's what I said, commonsense. Got some handy? Good, you'll need it. Now you're thinking "this is all a bit weird - thought i was going to learn about PC security" You are - just keep paying attention!

one of the most obvious things to avoid on the internet is clicking 'OK' to a pop up. Now, you might think that's a bit obvious but many inexperinced users still do this - DON'T!!. Unless you can be 1000% sure that you know the source of the pop up and that the originator is someone to be trusted, just DON'T - This is one of the easier ways to become infected. This also aplies to pop ups that tell your that your system is already infected and if you click here you'll be able to sort the probem - you won't!! Chances are you were not infected in the first place, but as soon as you click on the 'OK' button you will be! You can find a list of rogue ant spyware programmes at Spyware Warrior - all compiled and tested by Eric Howes. Rogue or suspect means that these products are of unkown, questionable or dubious value as anti spyware protection Many will sometimes infect you just to force you to buy theier product. You have been warned! Don't click 'OK' to a pop up! Did I mention that you shouldn't click 'OK' to a pop up? This also applies to e-mail attachements If you dont't know the sender, delete the e-mail and ask questions later! If necessary make a note of the sender's e-mail address and reply with a fresh e-mail.

Some words here about a technique know as phishing. This is where you receive an e-mail or Instant Mesage supposedly from your bank or PayPal or similar institution. The scammers will use something know as "social engineering" to try and make you respond. A link to your Bank's website is usally included and you are asked to click on the link and confirm your account details. Never click on any such links! You will be taken to a...

Find Another Essay On computer security article

Computers Essay

2254 words - 9 pages 16th, 2000 Week 8, Computer Crime Article: The next e-security threat: Cell phones This article states that cell phones are going to be the next wink link in internet security it says that at the moment personal computers are the weak link. According to the article using online services on cells hackers will be able to hack or unleash a virus and store a laptop while being able to disappear. It states that these people could be hard to track

Computer Hacking Essay

2087 words - 8 pages Precis of 'Who's reading your E-mail" by Richard Behars The article exposes the vulnerability of computer data and of corporations with the popularity of the Internet. The Internet can allow hackers access to any computer in the world, with understated ease. Break-ins can go virtually undetected Major corporations and government security departments have acknowledged that hacker break-ins are out of control. Some companies are too fearful to

Computer Crime Analysis Report

873 words - 4 pages /blog/it-security/attacked-by-anonymous-how-to-defend-against-a-denial-of-service/ O'Reilly, D. (2014). Telltale signs of a computer virus infection. Retrieved February 8, 2014 from Richardson, R. (2008). 2008 CSI Computer Crime & Security Survey. Retrieved February 8, 2014 from Verton, D. (2013). Thwart Insider Abuse. Retrieved February 8, 2014 from

Overview of Network Security

1050 words - 4 pages Prevention System that helps detects intrusion by monitoring suspicious activity. It also prevents the suspicious activity from doing harm to your computer by eliminating it. “Effective network security targets a variety of threats and stops them from entering or spreading on your network.” (Cisco’s Network Security Article). Effective ways of securing a network communication are authentication and encryption. Encryption is a process of where you

Critically review the article in terms of how such private operations relate to public justice agency functions

1053 words - 4 pages In reading an article recently on the privatized security in Alaska called, "PRIVATE PROTECTION: SECURITY OFFICERS IN ALASKA.", I was truly taken back by how closely it related to the material I was currently being taught in an Organizational Security and Management course, through the University of Phoenix, online. Most of the information contained in this article coincided, almost verbatim, with the information contained in our course reading

The State of PC Security

3791 words - 15 pages IntroductionPrivacy and security is the number one concern of Computer users today. Survey after survey indicates people's mounting concern for the protection of their identities and the safeguard of their data. While our computer security and privacy faces threats from both private and probably governmental intrusions, the existing patchwork of laws and practices fails to provide comprehensive protection. Instead, we live in a confusion of

Updates Over Security Software

2521 words - 10 pages Almost all information technology professionals, believe their ideas will be the most effective way to protect their computer networks and end users from viruses, Trojans, malware, and intrusion. Every day users expose themselves to security related concerns. Developers release patches and updates every day; these updates affect firmware, operating systems, application, and device drivers. With most users and devices connected to the Internet

IT Security Breaches

1001 words - 4 pages . That is quite a large sum that is also highly avoidable. Due to escalation in Internet use, the amount of computer security breaches that businesses have experienced in the last year has increased at a rapid rate. Breaches can come from external attacks as well as within the walls of a company. External attacks are serious but the threat created by a company’s employees can be much worse (Robb, 2010). Last year 81 percent of security breaches

Computers and Homeland Security

775 words - 3 pages about its purpose and scope. According to a Wired magazine article however, some of the funding for TIA was redirected to similar programs. So research into the technology continues. Computer translation documents and phone call transcripts pour into U.S. security agencies, but there?s one catch?much of the data is not English. Computers can be used to translate documents and have become more sophisticated at this task thanks to research for

COMP Midterm

910 words - 4 pages to make a change on your computer" (Microsoft Corporation). Lastly, parental controls allow parents setting controls on their devices so that children cannot download malicious software off the Internet or access particular sites that they should not. There was an article that was written on the pros and cons of Windows 7 Security on The author conducted research and detailed the good security features of Windows 7 OS and its

Educating Information Technology Staff

1318 words - 6 pages institutes an instructor-led information security awareness course for employees garners the expertise of a subject matter expert. The instructor can develop a course based upon organization objectives and provide immediate feedback to the employees. Additionally, an instructor-led course on information security items may be outsourced as not to allocate internal organizational resources for training. Organizations may employ web-based or computer

Similar Essays

Informational Technology Essay

1028 words - 5 pages open up a lot of doors for me in internet security as a part of information technology. Information technology has been increasing rapidly in today’s world since most of the jobs are opening major fields of information technology. In the newspaper article Daily News it states that, “The best jobs in 2014 are information technology, was also number one overall in software developer followed by computer systems analyst. There will also be an

The Computer Industry Essay

1922 words - 8 pages networking about the vast changes in the PC industry. The Personal Computer Radio Show – A radio show that brings you computer news and reviews on hardware and software. Powered By Computing- An article explaining the different operations a computer profession does other than program. Secure Computing For Personal Computer Users – A guide on security for personal computer users. Personal Computing Best Practices & HIPAA Security Requirements

Internet 2 Essay

1181 words - 5 pages . William R. Cheswick & Steven M. Bellovin in Firewalls and Internet Security assert that encryption is often touted as the ultimate weapon in the computer war but it is not. They claim that encryption is a valuable tool, but like everything else it is a tool towards an ultiminate goal. They continue to assert that if encryption is used improperly, it can hurt the real goal of the organization. pg14.According to an article published in the

The Hacker Subculture Essay

2020 words - 8 pages hat hacker breaks security for non-malicious reasons. [edit] Grey hat Main article: Grey hat A grey hat hacker is a hacker of ambiguous ethics and/or borderline legality, often frankly admitted. [edit] Black Hat Main article: Black hat A black hat hacker is someone who subverts computer security without authorization or who uses technology (usually a computer or the Internet) for terrorism, vandalism (malicious