Computer Security and Protection Measures
Unit 6: Computer Security and Protection
Security Threats
Malware
Malicious software, any program intended to cause damage or harm the computer or user.
Virus
A type of malware that infects other files; it cannot exist independently but is embedded in the code of another file.
Worm
Malware whose main objective is to create as many copies of itself as possible to facilitate its spread. Unlike viruses, worms do not infect other files. Their objective is to overwhelm a computer system. They can spread via email, storage devices, local networks, or network file systems.
Spyware
Malware that silently installs and runs on the computer to steal user information (passwords, search history, files, etc.) and send it via the internet to a remote server.
Trojan
Malware hidden inside a seemingly legitimate file.
Keylogger
A Trojan that captures keystrokes made on the computer.
Adware
Malware that installs on your computer to display unwanted pop-up advertisements.
Browser Hijacker
Malware that modifies the browser’s home page, search page, or error page, or includes links in the Favorites folder. The goal is to increase visits to a specific website.
Phishing
A type of deception used to obtain sensitive information like credit card numbers, passwords, and bank account data.
Spam
Bulk emails sent for advertising purposes to an address list obtained from databases or through various channels, often involving hoaxes.
Hoax
An email, often appearing to be from an acquaintance, containing false information, such as a non-existent virus alert or misleading news, and requesting that it be forwarded to all contacts.
Software Protection
Operating System Security Module
The operating system itself provides a first line of defense against attacks through user management and permissions. If malware runs with full access privileges, the damage can be extensive.
Web Browser Security
Web browsers may include protection features such as not remembering passwords or sensitive data and verifying encrypted pages with valid security certificates.
Antivirus Software
Specifically designed to detect, block, and remove malicious code, including viruses, worms, Trojans, and spyware. When malicious code is found, the software typically offers three options: Disinfect (remove the malicious code while saving the file), Delete (remove the infected file), or Ignore (inform the user to manually delete the file).
Other Security Tools
URL analyzers can determine if accessing certain websites is potentially dangerous. One example is McAfee SiteAdvisor.
Firewall
A firewall blocks connections to potentially dangerous sites and prevents unauthorized programs from connecting to the internet. It must be configured to specify which programs are allowed internet access.
Proxy
Software that checks all internet connections and blocks potentially dangerous ones.
Encryption Protocols and Security
HTTPS
Secure HTTP sends encrypted data, which can only be interpreted with a password.
Prevention
System Maintenance
Keep the operating system, browser, and antivirus software updated to protect against the latest malware and threats.
System Analysis
Regularly scan the system, including external devices, for malware. Analyze internet downloads before opening them.
Firewall Usage
Keep the firewall enabled while browsing and only disable it when absolutely necessary, such as when installing trusted software.
Data Backup
Maintain at least two physically separate copies of important files.
Strong Passwords
Use random combinations of uppercase and lowercase letters, numbers, and symbols, with a minimum length of 8 characters. Change passwords regularly and store them securely.
Password Management
- Avoid entering passwords on public computers.
- Do not enter passwords on pages accessed via email links, as these may be fake.
- Use HTTPS when conducting important transactions or exchanging sensitive data online.