Why does the Computer Security is essential in each and every devices. Cybersecurity, computer security or IT security is the protection of computer systems from the theft and damage to their hardware, software or information, as well as from disruption or misdirection of the services they provide.
Computer security can be defined as controls that are put in place to provide confidentiality, integrity, and availability for all components of computer systems. These components include data, software, hardware, and firmware.
The threat to Computer Security
A threat, in the context of computer security, refers to anything that has the potential to cause serious harm to a computer system. A threat is something that may or may not happen, but has the potential to cause serious damage. Threats can lead to attacks on computer systems, networks and more.
Types of threats-
There are several types of computer security threats such as Trojans, Virus, Adware, Malware, Rootkit, hackers and much more. Check some of the most harmful types of computer Security Threats.
- Distributed denial-of-service (DDoS) attack
A distributed denial-of-service (DDoS) attack — or DDoS attack — is when a malicious user gets a network of zombie computers to sabotage a specific website or server.The attack happens when the malicious user tells all the zombie computers to contact a specific website or server over and over again.
- COMPUTER VIRUS
A Computer Virus is a malicious program, which replicates itself and infects the files and programs of your PC and can make them non-functional.
- COMPUTER WORMS
A self-replicating computer program that spreads malicious codes, computer worms make use of the network to send copies of the original codes to other PCS. It can also go to the extent of sending transferring documents utilizing the email of the user.
Scareware is a malware that tricks victims to buy software by displaying fake virus alerts. A scareware infected PC may get pop-ups of fake malware threats and to get rid of those, users are prompted to purchase a fake anti-malware software.
Also known as a keystroke logger, Keyloggers can track the real-time activity of a user on his computer. Keylogger runs in the background and records all keystrokes made by a user and passes the information to the hacker with the motive to steal password and banking details.
A rootkit is considered extremely dangerous as they appear to be legitimate files and deceives the computer user. Rootkit masks viruses and worms and makes them appear as necessary files. These are very difficult to remove and only an antivirus with the anti-rootkit feature can remove a rootkit.
Because of the large number of threats, a great deal of defensive strategies and tools have been developed. Bill may have to contend with some of these as he attacks his organization’s computer network, but as an insider, he will likely have the knowledge needed to bypass them. This is why insiders can be so dangerous to computer security.
Bill’s boss, John, takes security seriously. He relies upon encryption for any data he sends to others. Encryption is a method for securing data by using special mathematical algorithms to convert the data into scrambled code before transmission. The data is decoded when an authorized user accesses it. There are a number of software encryption standards, but the two main ones are RSA by RSA Data Security and PGP, or Pretty Good Privacy, available on the Internet.
There are few ideas to help your kids stay safe and healthy while growing up in the Digital Age.
- Increase awareness: Help ensure younger children know the basics of staying safe online by using techniques like online games and videos that will define computer terms (e.g., cyberbullying, netiquette, virus protection) to establish basic understanding.
- Protect your kid’s identity: Remind your kids never to give out personal information, such as name, home address, or telephone number, to anyone they don’t know through email, Twitter, Facebook, or in online chat rooms or bulletin boards. Talk with your children about the online risks of interacting with strangers through the computer and sending notes and pictures into cyberspace. Online games may help kids understand how to protect their personal information and the ramifications of stolen identity.
- Protect your computer: Regularly updating security software can protect your family against scammers, hackers, and other online threats that can compromise your computer system and, consequently, your family’s financial security and other private information. Using software security that automatically updates keeps your technology current and decreases the likelihood of picking up bad programs or malware.
- Create unique passwords: For online safety, tell your kids to use different passwords for every online account they have to help prevent others from accessing their personal information. Make sure that you monitor each account and make sure your children know that strong passwords should include elements like symbols, numbers, uppercase and lowercase letters, and no names or words that others could easily guess.
- Monitor online activity: Monitoring your kids’ online activity can help keep them safe. Explore various parental controls and consider what options may work best for you and your family.
- Prevent cyberbullying: Cyberbullying—bullying using electronic technology—can happen anytime and anywhere. Teach your children to think through what they post on the Net about other people and the consequences those posts could have if they are unkind or mean. Also, keep communication with your child open and speak up if you suspect someone is bullying him or her.
- Promote appropriate online interactions: Use some online games to help show kids how to make responsible decisions about online communication and learn about key issues of digital citizenship. Online activities can include exploration of methods of communication in chat rooms and emails.