Security continues to be the number one concern of computer professionals today, and with good reason. Consider the evidence: as many as 150 million computers worldwide may be remotely controlled by attackers. Over 94 million credit and debit cards were compromised in one data security breach with losses totaling over $140 million. On average, every 39 seconds your computer is probed by attackers looking for vulnerabilities. One out of every 25 e-mails contains a virus. An organization on average receives 13.6 attacks each day. There are almost eight million computer viruses on the loose. The median dollar loss for victims of ID theft is over $31,000. The number of US federal agencies that recently received a grade “F” on security is now eight. Over 15,000 freshly infected Web pages appear every day, and an unsuspecting user who only views one of these infected sites through their Web browser and does not even click on a link will find their computer infected. And over 1,500 users still respond to the “Nigerian General” spam each week.
We have all heard about detection, prevention, cleaning, firewalls, Antivirus, Anti malware, Anti spyware, Anti Trojan, Anti Rootkit, Adware, Internet security suite, detection tests, antivirus tests, penetration tests, and so on. It can be confusing right! So you ask what is what and more importantly what do I need as a consumer!
So let’s start with the basics. Security products can be classified into three areas:
1)Prevention: preventing anything from entering into your computer in the first place
2)Detection: detects when anything enters your computer (but only if it recognizes is it)
3)Cleaning: you are infected and in need of a decent product to clean up the mess
As always, what you get, has a lot to do with where you go. Part of the appropriate offense is developing a sense of where to visit and who to trust on the Internet. Prevention also suggests a few good softwares.
Let’s start with Anti-Virus software. A good analogy to Anti-Virus would be a policeman who has a Photo Fit of a murderer and trying to find/detect that criminal amongst the people/files. It can’t stop someone becoming a criminal but can detect them. So an Anti-Virus product could never prevent a new Virus it doesn’t know about from infecting your machine, just like policemen cannot arrest a future murderer for a crime they haven’t committed yet. Anti-Virus products were invented in the late 1980′s as “cleaning” products. In those days infections were spread at the speed of how fast you could exchange a floppy disk with your friends, but nowadays the number of malware is increasing drastically and the speed in which the infections occur is increasing, thanks to internet. So can your Anti-Virus company give you a guarantee that you will not be infected because they can’t possibly know the next Virus? Of course not, and that is why using detection only mechanism as your sole protection will leave you vulnerable and be the leading cause to why you could still get infected even though you have Anti-Virus products installed.
In addition to Anti-Virus software, some might consider additional detection tools at that are very similar, such as Anti-Spyware, Anit-Rootkits, and Anti-Trojans. Like Anti-Virus software, these products are used for detecting infection, just in a slightly different way.
The degree of protection against danger, damage, loss, and crime. Security as a form of protection are structures and processes that provide or improve security as a condition. Cryptography has been around since Caesar Rules the Roman Empire and he developed the first type of code called Caesar Cipher in which he used to communicate with his generals as early as 49 BC.
In the past, PCs were mainly under threat from viruses and worms. The main purpose of these programs was to spread; however, some programs were also designed to cause damage to files and PCs. Such malicious software, or “malware”, could be described as ‘cyber vandalism’.
The anonymous, unsolicited bulk email – it is effectively the email equivalent of physical junk mail delivered through the post office.
A device or set of devices designed to permit or deny network transmissions based upon a set of rules and is frequently used to protect networks from unauthorized access while permitting legitimate communications to pass.
Physical security’s main goal, is to deter people/persons from your confidential information.
Wireless security is the first line of defense in protecting your network from outside wireless intrusions.
In the ever expanding technological world, the need to protect your children online is paramount.
Physical security's main goal, is to deter people/persons from your confidential information. This security can come in many different shapes and forms ranging from a dead bolt all the way to a biometrics. Some examples of typical physical security are -
- Accesses Badges
- Electric Lock
- RFID chips