Вы находитесь на странице: 1из 6

COMPUTER SECURITY

o Computer security, cybersecurity or information


technology security (IT security) is the protection
of computer systems from the theft of or damage
to their hardware, software, or electronic data, as
well as from the disruption or misdirection of the
services they provide.
o Computer security has become increasingly
important since the late 1960s, when modems
(devices that allow computers to communicate
over telephone lines) were introduced. The
proliferation of personal computers in the 1980s
compounded the problem because they enabled
hackers to illegally access major computer systems
from the privacy of their homes. The development
of advanced security techniques continues to
diminish such threats, though concurrent
refinements in the methods of computer crime
pose ongoing hazards.
COMPONENTS OF COMPUTER SECURITY
 Hardware is the physical part of the computer, like
the system memory and disk drive.
 Firmware is the permanent software that runs the
processes of the computer and is mostly invisible
to the user, like the start-up functions that make
elements of the hardware work together.
 Software is the programming that offers services
to the user and administrator. The operating
system, word processor, computer games, and
Internet browser are all examples of software
commonly found on a computer.
COMPUTER THREATS
Phishing scams

A phishing scam is when you receive a hoax email, text


or social media post that looks like it's come from a
legitimate company like your bank, mobile phone or
internet service provider.
Protect yourself from phishing scams

Be aware of what to look out for in suspicious emails.


Typical signs include
 misspellings and poor grammar
 patchy graphics or design
 asking for personal information, usernames or
passwords
 not addressing you by name at the start of the
message
 a sense of urgency, claiming that your immediate
attention is needed
 an email address that doesn’t look quite right
Spyware and adware
Spyware

Spyware is software that secretly monitors your


computer and online activity. It might record your
keystrokes or take screengrabs of the websites
you visit, capturing any confidential information
you’ve entered, such as credit card details and
passwords. Other spyware collects information on
the websites you visit, how long you spend on
each one and which ads you click on.
Adware

Adware is a type of spyware that shows you adverts like


pop-ups and banner ads whenever you’re online,
interrupting your browsing session and slowing down
your computer. Adware also tracks the sites you visit,
the articles you read and the adverts you click on,
allowing it to customise future ads you see
Viruses and Worms
Viruses

A computer virus is software that spreads from


computer to computer, attacking the way each
operates and corrupting data. The virus attaches
itself to a program like a file, spreadsheet or word
document, and runs when that file is opened,
allowing it to reproduce and attach itself to other
programs.
Computer viruses can also spread via emails and
are known as email viruses. An email virus usually
replicates automatically by sending itself out to
everyone in your email contacts list.
Worms

A worm can be just as destructive to your


computer as a virus. Worms work by finding a
security breach in your computer’s network and
then replicating itself between devices.
Trojans

A Trojan is a type of malicious software (malware)


that’s disguised as a normal file. If your computer’s
infected with a Trojan, it’ll take control of your
device, stealing data and introducing viruses that
corrupt your files and leave you vulnerable to
attacks from hackers.
COMPUTER SECURITY PRACTISES
1. Antivirus: Whenever Windows is up, it should
be running an up-to-date antivirus program.
These work in the background, blocking not
only viruses, but all sorts of malware.
2. Another-opinion malware scanner: Even the
best antivirus program can miss an occasional
attack. So, once a week, scan your PC with
another program that scans only when you
tell it to. I recommend the free version of
Malwarebytes Anti-malware.
3. Firewall: Like an antivirus, this type of
program runs in the background at all times.
But this one controls the traffic between your
PC and the rest of the network (and Internet).
4. Encryption: If your PC is stolen, why let the
thieves get your secrets, as well. Put your
most sensitive files in an encrypted container.
5. Passwords: You need a separate password for
every website you log into, and each
password must be long, strong, and complex.

Вам также может понравиться