Online security threats are one of the biggest challenges on the Internet. The problem is that every day there are new viruses and security threats that are launched all over the Internet, which means you need programs that can be updated continuously and don't just target one specific type of problem.
The best ways you can do if you get on the Internet at all is to use security software and hardware such as firewalls and authentication servers, as this is the most effective way to protect your computer and your personal information. It's best if you choose hardware and software that will update itself each time you are on the Internet, without you having to remember. It's also very important that you choose your passwords carefully, so that those that might want access to your information won't be able to guess as to what password you might use.
There are some of the main online security threats and the cautions of each :
1. Web servers and services ~ Default HTTP (Web) servers have had several vulnerabilities, and numerous patches have been issued over the past several years.
Cautions : Make sure all your patches are up to date, and do not use default configurations or default demonstration applications. These vulnerabilities may lead to denial-of-service attacks and other types of threats.
2. Windows authentication ~ Most Windows systems use passwords, but passwords can be easily guessed or stolen.
Cautions : Creating stronger, more difficult to guess passwords, not using default passwords, and following a recommended passwords policy will prevent password attacks.
3. Web browsers ~ Your window to the Internet, a Web browser contains many vulnerabilities. Common exploits may include disclosure of "cookies" with personal information, the execution of rogue code that could compromise a system, and exposure of locally-stored files.
Cautions : Configuring the browser's security settings for a setting higher than the default value will prevent most Web browser attacks.
4. Mail client ~ Attackers can use the mail client on a computer to spread worms or viruses, by including them as attachments in emails.
Cautions : Configuring the main servers appropriately, and blocking attachments such as .exe or .vbs files, will prevent most mail client attacks.
5. Instant messaging ~ Many corporations also block employees from using instant messaging, not only because of the technical threats but also because of the possibility of lost productivity.
Cautions : Configuring IM properly, applying all the latest patches, and taking control over any file transfers that occur over IM will prevent most attacks.
0 comments:
Post a Comment