ComputersSecurity

Internet Security: Basic Rules

What kind of problems does security form on the Internet? Perhaps the machinations of hackers are just spectacular shots from the movie, but in reality the network space is not as hostile as we are trying to inspire in blockbuster scenarios? In what cases should the security rules of the Internet be observed especially carefully?

Hackers - online

The reality is that hackers do not slumber. Their interest is fueled, above all, by the still growing commercialization of virtual space. People use virtual bank accounts, pay for purchases from credit cards, exchange currency. Security of payments on the Internet is a very topical issue.

Of course, there is a significant percentage of hackers acting by virtue of personal ambitions, with the goal of proving to oneself or friends - that's, I will definitely crack this e-mail. There are, if we talk about the industry of hacking, segments related to business wars. Talents of "burglars" use corporations in order, for example, to acquire the secrets of competitors.

However, even ordinary users, far from big business, can feel discomfort due to the fact that security problems on the Internet are now very relevant. And this is not necessarily because of the risk of losing control over financial transactions. This can be expressed, in particular, in the fact that a hacker is able to turn another user's PC into a hotbed of aggressive advertising or to gain access to his confidential personal data. All this, of course, is unpleasant.

How to improve security on the Internet? Today we will talk about this.

Hacker Toolkit

But first, let's look at what tools hackers endanger Internet security for users. Among the main ones are the same ones that have been used for many years. These are viruses, trojans, various kinds of "spyware" software. With the help of various kinds of malicious codes, a hacker can, firstly, acquire user's logins and passwords for e-mail, banking client, credit card information, etc.

In general, the security of personal data on the Internet is a matter of the most urgent due to the incredibly high activity of crackers, engaged, as a rule, financially. There are, of course, other areas of interest for hackers. As we said above - this is personal information. But almost always everything comes down to the extraction of some financial benefit - through advertising, as an option, mechanisms.

Let's consider now, through which channels the infection of PC users with viruses or trojans most often occurs or direct access to personal data via logins and passwords is obtained. In which aspects of using the computer and the Internet, PC owners should be especially careful?

I hear from the impostor

One of the most common methods used by hackers to access passwords and PC resources is to access users on behalf of a well-known Internet service, blog, postal service, bank, merchant network or even a provider. The burglar, as a rule, writes a letter drawn up in an extremely diplomatic form, where he asks for the "identity confirmation" or under a different plausible pretext to indicate the login and password. Externally, the e-mail message in terms of design can be hung with real logos of that resource, belonging to which the hacker declares. And the domain used in the e-mail address can be very similar to the original one.

In addition to this method, one applies where the letter does not ask for a login and password, but there is a polite request to follow the link for the same "identity confirmation". In a similar way, advertising messages can be attracting. Of course, all of them are a threat to security on the Internet. It is impossible to react to this kind of treatment. By clicking on the link, the user will almost certainly download the malicious code, the purpose of which can be very different, usually sending files with logins and passwords from the computer.

Do not be tempted

Hackers can use another scenario. Technologically, it is somewhat similar to the method of applying references to "confirmation". However, the long-awaited click is made by the user not by virtue of a calling appeal to e-mail, but by the fact of temptation to study an interesting advertising proposal that popped up on the screen, or, which is also common, an offer from an elegant lady to "get to know each other" Screen window. Click - and the user downloads a virus to his PC. Therefore, the safety technology on the Internet, based on the immunity to this type of temptation - the most important factor in the preservation of personal data.

Free cheese

The Internet is often used as a free channel for watching movies, clips, downloading programs. Even in cases where the original version of the media or applications is commercial, the user, nevertheless, is looking for a site where you can get access to movies and software distributions for free. It is worth noting that a few years ago, such resources were present on the Internet in large numbers, and they really could find a distribution of expensive software with a free key or activator as a gift. With movies - the same.

Today the situation has changed. Russian legislation has become tougher in terms of control over pirated IT versions of products and films, mechanisms have been improved with which providers can find portals where unauthorized copies of programs and media files are posted. Much is being done to improve user security. And anonymity on the Internet is reduced to a minimum - to stop attempts to spread pirated content.

If before there were no problems with finding a pirated version of the blockbuster before it even went to theaters, today even after a few months from the date of the release of the film it can be very difficult to find a portal where it would be laid out free of charge. Security on the Internet is now actually at the state level. Actually, what does this mean?

With high probability is that even if the user can find a site where there is a pirated version of the desired movie, the files to be downloaded will be infected with viruses. The logic is simple. If such a site functioned without violating the security on the Internet (that is, specializing, as it was several years ago, on the distribution of unlicensed content), the hosting provider would have figured it out and blocked it a long time ago.

Modern users should forget that on the Internet today - "free" cheese. And so do not trust and do not check the portals, which seemingly have a free copy of the favorite movie. Moreover, now there are many options in order to view or even download a legal version of the media is inexpensive, at least, cheaper than going to the cinema. And as for the programs - most commercial applications today, as a rule, have more than one competitive free alternative.

A gift from a friend

Of course, the option to pick up a virus or a trojan exists not only through virtual channels. It often happens that a user complies with the above-described security rules for working on the Internet, but his computer is infected in some inexplicable way with malicious code. The most likely reason for this - the virus accidentally brought a friend on a flash drive. Or, using a medium to print text or photos in the cabin, the user inadvertently "hooked" the virus from there.

In this case, it's really hard to predict whether there is a similar kind of surprise on a flash drive brought on by the fact of operation on another PC. Therefore, the user needs to have the skills not only of passive protection from threats (in the form of avoiding contact with suspicious online content), but also some active tools. Which ones?

Antiviruses

The most necessary type of software in this case is antivirus software. This type of IT-products is now more relevant than ever before. It is extremely undesirable to use a modern computer without a pre-installed good antivirus. What are the criteria for the quality of this kind of applications? Experts prefer to pay attention to what the market is talking about. It, unlike many other segments, in this case is far from monopolistic trends: the competition of IT-firms producing antiviruses is very high. And therefore, if some company is a leader, then this status is most likely given to it for a reason.

And therefore, improving the security measures on the Internet, the user should pay attention to the most famous anti-virus brands - Kaspersky, ESET, Symantec, DrWeb. Experts recommend not to save on such programs. Yes, the license costs about $ 50. However, in return, the user gets a really good, effective tool to combat malicious code.

Firewalls

In addition to antiviruses, it is highly desirable to install firewalls. These programs are designed to filter the access of applications installed on a PC to the Internet (as well as to control access to the computer by actors in the virtual space). That is, if, for example, the Trojan has nevertheless skipped past the antivirus (yes, it can be), then with a high-quality firewall, it is highly likely that it will not be able to transfer the logins and passwords found on the PC to the hacker. Attempts to send files to the Internet will block the program.

Regarding firewalls: experts also recommend not to save and buy commercial versions of such programs, or even better - complex products in which the functions of the antivirus and firewall are very well integrated. Among them - Internet Security from Kaspersky or Smart Security from the Slovak competitors of Russians - the company ESET.

The browser protects us

Internet access is provided through a browser. Accordingly, the main channel for the penetration of malicious code on the PC is the window of this application. How to provide security on the Internet using a browser? Some experts recommend adhering to the concept of the kind of "what not to do". Let's try to navigate and we are at it. Thus, using the browser, the user should not:

- keep logins and passwords inside the program (even if she herself suggests doing it);

- neglect the function of updating the browser;

- include unnecessarily various kinds of extensions, scripts, scripts.

Actually, on the first point everything is clear. The passwords and logins that the Trojan finds on the PC are obviously written by the browser into a file. If it does not exist, then the malicious code can not transfer anything to the hacker. It is extremely important to comply with this rule if the user wants to ensure the security of payments on the Internet.

Updating the browser is important from the point of view that the manufacturer always improves the internal software protection system from low-level hacking mechanisms, as well as from malicious codes that for one reason or another can not be detected by antivirus software.

Actually, the samples of the hacking software in question are oriented to the so-called "holes" in browsers, arising from the excessive enthusiasm of users by installing the marked extensions, scripts and scripts. Almost always you can do with the default options. There is absolutely no good reason to include additional, to the delight of hackers.

Step into the camp of competitors

Many IT specialists recognize that the Windows operating system, by virtue of its architecture, is much more vulnerable to virus threats when compared to alternative platforms. First of all, such as Linux and Mac. At least, according to many experts, the number of viruses created for these operating systems is several times less than those written for Windows. The main argument here is the relatively small share of alternative platforms on the market. And because hackers are not particularly interesting to write viruses for these OS. Which, in addition, according to a number of experts, really better protected from malicious codes.

The question is why users do not migrate massively from Windows to Linux and Mac? There is a reason for each OS. Speaking of Linux, this operating system is much more difficult to use. If in Windows, the drivers and software are installed using automatic algorithms embedded in the OS, then in Linux some programs must be installed manually. This does not suit many users, and they prefer to own an OS that is simpler. Although Linux is completely free. These are the principles of its creators, those who turned this OS created by amateurs into a global project. By the way, there are a lot of versions of Linux with different design and management interfaces, among which users can always find themselves comfortable. But, most importantly, for many IT professionals who help develop this project, Internet security is the most important priority.

Regarding the Mac, the reason is different - it is just the same in price. Computers based on this OS are significantly more expensive than those on which Windows and Linux can be installed. They are a platform from Apple, implemented by other technical principles than PCs related to the IBM PC architecture , compatible with Windows and Linux.

However, if you use the computer to work with the Internet, office documents, simple graphic files, and there is no particular need to run games, then you can pay attention to Linux. Note that the programs for this OS, in which it is possible to use the above functions, as a rule, do not belong to the category of those that are to be installed manually. Almost all modern browsers have a Linux-version, in no way inferior to distributions for Windows. There are many office applications, the functionality of which is generally comparable to Word, Excel and complementing their programs.

Similar articles

 

 

 

 

Trending Now

 

 

 

 

Newest

Copyright © 2018 en.atomiyme.com. Theme powered by WordPress.