Term | Description |
Device passwords | Wireless access points, routers, and other devices often ship with a default password that an attacker can easily find on the internet. For this reason, it's important to change the default password to something secure.
Computing devices such as laptops and smartphones typically give the option of using the device without a password or using another authentication method. While it's convenient to use devices without security, it's a really bad idea. If you lose the device, sensitive data could immediately be in the hands of a stranger. |
Firewalls | Firewalls control the flow of network traffic and protect systems from unauthorized network connections. They're configured with a set of rules that define what kind of traffic is allowed and not allowed.
For example, if a malicious user on the internet tries to establish a connection to a computer, the firewall identifies it as a violation and blocks the connection. There are two general types of firewalls: Network firewalls are configured at the border of the network, where it connects to the internet. By placing a firewall in this location, it can protect an entire network. Proxy servers can be configured as network firewalls as well. Host firewalls are installed on individual computer systems and protect only that system. For those who run a Windows system, Windows Defender Firewall is enabled by default. There are many third-party host firewalls available as well.
To avoid conflicts, be sure to uninstall Windows Defender Firewall if you choose a third-party firewall. Typically, most networks use both types of firewalls. Network firewalls must be purchased and manually installed. Host-based firewalls are usually installed and enabled by default on most computer systems. |
Data encryption | Data encryption is the process of translating data into an unreadable form that can deciphered only with a secret key. Windows 10, for example, can encrypt your entire device. This is a form of data encryption at rest.
Other technologies provide the ability to encrypt the data when it is being sent to another device, typically over the internet. |
Backups | Making a copy of your data, typically on a separate device, is another way to protect your data. This copied data is known as a backup.
Having a backup of your data means that if your data is corrupted, you haven't lost your data. You can retrieve the data from the backup. |
Anti-malware | Anti-malware software should be installed on computer systems to detect and prevent malware infections. Malware includes several types of malicious software: Viruses that attach to files and spread when the files are opened. Worms that infect systems and spread automatically through the network. Trojan horse programs that appear to be useful programs but secretly install malware without your knowledge. Spyware that tracks your computer or browser activity. Adware that displays unwanted pop-up advertisements.
Starting with Windows 7 and later, anti-malware software called Windows Defender is installed and enabled by default on Windows systems. You can also install third-party anti-malware packages.
You can have only one anti-malware package installed on a computer at a time. If you install a package and later choose a different one, be sure to uninstall the existing package before installing the new one. Anti-malware works as follows: Viruses and malware are identified by signatures or definitions. Attacks, including new attacks, are added to the software's database of viruses and malware. The software searches the computer for these signatures. The anti-malware software needs to be updated regularly. It can recognize the infection on a computer only if the software is current.
You can be proactive in preventing malware by taking the following actions: Regularly scan for malware. Avoid logging on with administrative privileges unless necessary. Exercise caution when opening file attachments, downloading files from the internet, installing new software, and clicking links in emails. Set your anti-malware software to automatically scan your network on a regular basis. Sometimes malware can come from an infected machine in the network.
A few signs to watch for that can indicate your system has been infected with malware are: Pop-ups show up in your browser and all the sites you visit. Sluggish processing time for websites to load or processing activities to complete. The system repeatedly crashes. A different toolbar displays. Sometime extra toolbars display. The default web browser has changed. You may get suspicious search results. Banner ads (third-party advertisements) display across the screen, often on multiple pages and often advertising free bogus security software programs. Redirection to a website different than the one you specified. It usually displays advertising, but could also attempt to capture authentication credentials.
When an infected file is detected, the anti-malware software is usually good at taking care of the problem. You can manually configure the actions you want the software to take in the event of a detected infection. You can have: The infection was removed through cleaning. The infected file quarantined by blocking the file from being opened. The infected file erased.
|
Anti-spam | Spam is unwanted, unsolicited email that's sent to an email account. Key points are: Spam often carries viruses, advertisements for questionable products, and phishing attacks. Some anti-malware software can block spam for you, but some can't. If your package doesn't, consider installing additional anti-spam software or switching to an anti-malware package does block spam. Although some spam is merely annoying; it does use processing resources.
|
Data destruction | When computers wear out or become obsolete, they're typically replaced with newer systems. System disposal can present a security risk. You must dispose of computers in a manner that prevents sensitive data from being exposed.
If you're selling or recycling a computer, use a special utility to wipe the hard disk drive clean. Deleting the files is insufficient. The data still remains on the drive and can be easily reconstructed by someone with the right skills.
Disk wiping software overwrites the hard drive with random data, obliterating any old data that's still on the drive. If you're disposing of a computer, consider destroying the hard disk to make the data it contains inaccessible. |
Updates and patches | A best practice is to update or patch your computer on a regular basis. This helps to protect the devices from being exploited by the latest types of attacks.
Patches and updates are needed for the operating systems, software, and even firmware. These patches can also help prevent zero day attacks, which are attacks that exploit a vulnerability in software before developers discover the vulnerability and patch it. |