technology security (IT security) is the protection of computer systems from the theft of or damage to their hardware, software, or electronic data, as well as from the disruption or misdirection of the services they provide. o Computer security has become increasingly important since the late 1960s, when modems (devices that allow computers to communicate over telephone lines) were introduced. The proliferation of personal computers in the 1980s compounded the problem because they enabled hackers to illegally access major computer systems from the privacy of their homes. The development of advanced security techniques continues to diminish such threats, though concurrent refinements in the methods of computer crime pose ongoing hazards. COMPONENTS OF COMPUTER SECURITY Hardware is the physical part of the computer, like the system memory and disk drive. Firmware is the permanent software that runs the processes of the computer and is mostly invisible to the user, like the start-up functions that make elements of the hardware work together. Software is the programming that offers services to the user and administrator. The operating system, word processor, computer games, and Internet browser are all examples of software commonly found on a computer. COMPUTER THREATS Phishing scams
A phishing scam is when you receive a hoax email, text
or social media post that looks like it's come from a legitimate company like your bank, mobile phone or internet service provider. Protect yourself from phishing scams
Be aware of what to look out for in suspicious emails.
Typical signs include misspellings and poor grammar patchy graphics or design asking for personal information, usernames or passwords not addressing you by name at the start of the message a sense of urgency, claiming that your immediate attention is needed an email address that doesn’t look quite right Spyware and adware Spyware
Spyware is software that secretly monitors your
computer and online activity. It might record your keystrokes or take screengrabs of the websites you visit, capturing any confidential information you’ve entered, such as credit card details and passwords. Other spyware collects information on the websites you visit, how long you spend on each one and which ads you click on. Adware
Adware is a type of spyware that shows you adverts like
pop-ups and banner ads whenever you’re online, interrupting your browsing session and slowing down your computer. Adware also tracks the sites you visit, the articles you read and the adverts you click on, allowing it to customise future ads you see Viruses and Worms Viruses
A computer virus is software that spreads from
computer to computer, attacking the way each operates and corrupting data. The virus attaches itself to a program like a file, spreadsheet or word document, and runs when that file is opened, allowing it to reproduce and attach itself to other programs. Computer viruses can also spread via emails and are known as email viruses. An email virus usually replicates automatically by sending itself out to everyone in your email contacts list. Worms
A worm can be just as destructive to your
computer as a virus. Worms work by finding a security breach in your computer’s network and then replicating itself between devices. Trojans
A Trojan is a type of malicious software (malware)
that’s disguised as a normal file. If your computer’s infected with a Trojan, it’ll take control of your device, stealing data and introducing viruses that corrupt your files and leave you vulnerable to attacks from hackers. COMPUTER SECURITY PRACTISES 1. Antivirus: Whenever Windows is up, it should be running an up-to-date antivirus program. These work in the background, blocking not only viruses, but all sorts of malware. 2. Another-opinion malware scanner: Even the best antivirus program can miss an occasional attack. So, once a week, scan your PC with another program that scans only when you tell it to. I recommend the free version of Malwarebytes Anti-malware. 3. Firewall: Like an antivirus, this type of program runs in the background at all times. But this one controls the traffic between your PC and the rest of the network (and Internet). 4. Encryption: If your PC is stolen, why let the thieves get your secrets, as well. Put your most sensitive files in an encrypted container. 5. Passwords: You need a separate password for every website you log into, and each password must be long, strong, and complex.