Computer Security and Protection Measures

Unit 6: Computer Security and Protection

Security Threats

Malware

Malicious software, any program intended to cause damage or harm the computer or user.

Virus

A type of malware that infects other files; it cannot exist independently but is embedded in the code of another file.

Worm

Malware whose main objective is to create as many copies of itself as possible to facilitate its spread. Unlike viruses, worms do not infect other files. Their objective is to overwhelm a computer system. They can spread via email, storage devices, local networks, or network file systems.

Spyware

Malware that silently installs and runs on the computer to steal user information (passwords, search history, files, etc.) and send it via the internet to a remote server.

Trojan

Malware hidden inside a seemingly legitimate file.

Keylogger

A Trojan that captures keystrokes made on the computer.

Adware

Malware that installs on your computer to display unwanted pop-up advertisements.

Browser Hijacker

Malware that modifies the browser’s home page, search page, or error page, or includes links in the Favorites folder. The goal is to increase visits to a specific website.

Phishing

A type of deception used to obtain sensitive information like credit card numbers, passwords, and bank account data.

Spam

Bulk emails sent for advertising purposes to an address list obtained from databases or through various channels, often involving hoaxes.

Hoax

An email, often appearing to be from an acquaintance, containing false information, such as a non-existent virus alert or misleading news, and requesting that it be forwarded to all contacts.

Software Protection

Operating System Security Module

The operating system itself provides a first line of defense against attacks through user management and permissions. If malware runs with full access privileges, the damage can be extensive.

Web Browser Security

Web browsers may include protection features such as not remembering passwords or sensitive data and verifying encrypted pages with valid security certificates.

Antivirus Software

Specifically designed to detect, block, and remove malicious code, including viruses, worms, Trojans, and spyware. When malicious code is found, the software typically offers three options: Disinfect (remove the malicious code while saving the file), Delete (remove the infected file), or Ignore (inform the user to manually delete the file).

Other Security Tools

URL analyzers can determine if accessing certain websites is potentially dangerous. One example is McAfee SiteAdvisor.

Firewall

A firewall blocks connections to potentially dangerous sites and prevents unauthorized programs from connecting to the internet. It must be configured to specify which programs are allowed internet access.

Proxy

Software that checks all internet connections and blocks potentially dangerous ones.

Encryption Protocols and Security

HTTPS

Secure HTTP sends encrypted data, which can only be interpreted with a password.

Prevention

System Maintenance

Keep the operating system, browser, and antivirus software updated to protect against the latest malware and threats.

System Analysis

Regularly scan the system, including external devices, for malware. Analyze internet downloads before opening them.

Firewall Usage

Keep the firewall enabled while browsing and only disable it when absolutely necessary, such as when installing trusted software.

Data Backup

Maintain at least two physically separate copies of important files.

Strong Passwords

Use random combinations of uppercase and lowercase letters, numbers, and symbols, with a minimum length of 8 characters. Change passwords regularly and store them securely.

Password Management

  • Avoid entering passwords on public computers.
  • Do not enter passwords on pages accessed via email links, as these may be fake.
  • Use HTTPS when conducting important transactions or exchanging sensitive data online.