Computer Security –
The meaning of the term computer security has emerged in recent years. Before the problem of data security was widely distributed in the media, a popular opinion on computer safety was focused on the body machine. Traditionally, computer services have always been
It is physically protected for three reasons:
- Prevent theft or damage to hardware
- Prevent the theft or damage of information
- Prevent service interruptions
Computer security is a security used on similar computer devices.
Computers and smartphones, as well as computer networks such as private and public networks, which cover the entire Internet.
The field covers all processes and methods in which digital goods, information and services are protected from unintentional mode or unauthorized access, modification or destruction, and is very important in accordance with increasing reliance on computer systems in many communities around the world. It includes physical protection against theft of equipment, and information security to protect data from that equipment.
It is sometimes referred to as “Internet security” or “IT security”, although these terms usually do not refer to physical protection (locks etc.).
For Free Demo classes Call: 9028649151
Registration Link: Click Here!
Some Of The Key Terms Used For Computer Security Are:
VULNERABILITY:
Vulnerability is a weakness that allows the attacker to compromise system information. At risk is a three-pronged conflict: system inclination or error, attacker’s access to the feature, as well as the attacker’s ability to exploit the error. Exploitation to be in danger, the attacker must have at least one effective tool or method to connect in system vulnerabilities. In this framework, vulnerability is also known as the offensive zone.
Risk management is a circular practice of identifying, classifying, correcting, and risk reduction. This practice usually refers to software vulnerabilities computer systems.
BACKDOORS:
A backdoor in a computer system, is a way to bypass normal authentication, to protect remote access to the computer, gaining access to empty text, and more, while trying to do so remain undetected. Read more at Ethical Hacking Course in Pune.
The back door may take the type of program installed (e.g., Back Orifice), or it may be I conversion to an existing program or hardware device. It can also be fake information about disk usage and memory.
Denial-of-service attacks:
Unlike other exploits, the ban on service attacks is not used to gain unauthorized access either system control. Instead they are designed to make it unusable. Attackers can deny it assisting individual victims, such as intentionally entering a password that is not accurate enough consecutive times for the victim’s account to be closed, or they may overload mechanical or network capabilities and block all users at once.
These types of attacks, in adaptation, which is very difficult to prevent, because the behavior of all networks should be analyzed, not only the behavior of small pieces of code. Distributed denial of service (DDoS) attacks are common, where a large number of strangers are at risk. (commonly referred to as “zombie computers”, used as part of a botnet containing, for example; worm, trojan horse, or backdoor exploit to control itself) are used to flood the target system with network applications, thus trying to make it unusable by the end of the app.
Direct access attack:
An unauthorized user who receives physical access to a computer (or part of it) may be unable to work many functions, install different types of devices to compromise security, including performance system modification, software worms, key hackers, and hidden listening devices. Learn more at Ethical Hacking Classes in Pune
I attacker can easily download large amounts of data to backup media, for or example CD-R / DVD-R, tape; or portable devices such as key, digital drives cameras or digital audio players. Another common way to start an operating system contained in the CD-ROM or other cache media and read data on the hard drive (s) In this way.
The only way to overcome this is to encrypt the last media and save the key separate from the system.
Direct access attacks are the only type of threat on private computers (never connect to the Internet), most of the time.
For Free Demo classes Call: 9028649151
Registration Link: Click Here!
Obedience:
Eavesdropping is the act of secretly listening to private conversation, usually moong network hosts. For example, programs like Carnivore and Nares Insight have used by the FBI and NSA to listen to systems of online service providers.
Spoofing:
When someone or something imagined tobe something else in an attempt to gain our confidence, access our systems, steal data, steal money, or distribute malicious software.
Like :
- Call spoofing
- Sms spoofing
- Email spoofing
- Website spoofing
Disruption:
Disruption refers to the deliberate modification of products in a way that can is a risk to the consumer.
Rejection:
Rejection refers to a situation in which the authenticity of the signature is challenged.
Disclosure of information:
Disclosure of Information (Privacy or Data Leakage) describes a situation in which information, thought to be safe, taken out of an unreliable environment.
The height of the right Elevation of Privilege describes a situation in which a person or system seeks to benefit superior rights or access to services that are generally limited to him / her.
Exploitation:
Exploit a piece of software, a piece of data, or a sequence of instructions to take the advantage of software “bug” or “glitch” to cause unintended or unexpected behavior that occurs in computer software, hardware, or an electronic device (usually computer).
This often includes things like computer system control or to allow for an increase in rights or the denial of service attacks. The word “exploit” is often used means small programs that are designed to take advantage of existing software errors acquired, remote or local.
Indirect attacks:
Indirect attacks are attacks carried out by an outside company –
Cyber Crime Prevention Tips
- Use Strong Passwords
Use a different combination of user ID / password for different accounts and avoid writing down.
Make passwords more complex by combining letters, numbers, special characters (a minimum of 10 characters in total) and change them to a always.
- Protect your computer
1.1) Activate your firewall
A firewall is the first line of defense on the Internet; blocking the connection to unknown or fake sites and will store other types of viruses and hackers.
2.2) Use anti-virus software
Prevent viruses from infecting your computer by installing it again and again
= updates anti-virus software.
= Prevent spyware attacks
Prevent spyware from entering your computer by installing and updating anti-spyware software.
- Be a Savvy Communication:
Verify your social media profiles (e.g. Face-book, Twitter, Youtube, MSN, etc.) are set to private. Check your security settings. Be aware of what information you have post online. When it is online, it is there forever!
- Protect Your Mobile Devices:
Be aware that your mobile device is vulnerable to viruses and hackers. Download
requests from trusted sources.
- Install the latest operating system updates:
Keep your apps and operating system (e.g., Windows, MacOS, Linux) current with the latest system updates.
Turn on automatic updates to prevent possible attacks in older software.
- Protect Your Data:
Use encryption for your most sensitive files such as tax returns or financial records, make regular backups of all your important data, and store them elsewhere.
For Free Demo classes Call: 9028649151
Registration Link: Click Here!
- Protect your wireless network:
= Wi-Fi (wireless) networks at home are vulnerable to intrusion if not properly configure edit is safe. Update and adjust default settings.
= Change router default password
= Avoid use public wi-fi or use with VPN(virtual private network).
= Avoid doing financial or business activities in this regard networks.
- Protect your e-identity:
Be careful when providing personal information such as your name, address, phone number or financial information online. Make sure websites are secure (e.g. when shopping online) or open privacy settings (e.g. when accessing / using social networking sites).
- Avoid being manipulated:
Always think before clicking on a link or an unknown file. You can feel it suppressed by any emails. Check the source of the message. If in doubt, confirm source. Never respond to emails asking you to verify your credentials or verify your own User ID or password.
- Call the right person for help:
Don’t panic! If you are a victim, if you encounter illegal online content (e.g. a child exploitation) or if you suspect cybercrime, identity theft or commercial fraud, report this to your local police. If you need help with repairs or software To be installed on your computer, contact your service provider or file a complain on cybercrime.gov.in. Read more at Ethical Hacking Training in Pune.
Author:-
Rajat Sharma
Call the Trainer and Book your free demo Class Call now!!!
| SevenMentor Pvt Ltd.
© Copyright 2021 | Sevenmentor Pvt Ltd.