Connect to other computers within a LAN (home or business) to share a document, browse the network for the supply of cheaper mortgage or the latest version of a software to download, receive a notice in your mailbox e-mail have become common actions through the use of PCs is growing at home and at work. The sources of these potential risks can be very numerous: computer viruses, now made in industrial quantities, alter the code downloaded from some website "corrupt" up to, at worst, destructive action of some hackers. Certainly it is not easy to realize the complexity and vastness of the problem now commonly known as information security, but it is clear that it can no longer be either neglected or underestimated by those who use a PC for a purpose not only playful. In this brief introduction will therefore be of general considerations on the issue of information security, whereas in the other paragraphs below, attention will be mainly technical aspects and practical solutions.
Virtually anyone who is motivated by its laudable intentions. For the identity of the attacker belongs to a particular system does not matter because the only objective is to penetrate the system itself to be able to subsequently reuse or to perform malicious activities, or even just for the sake of doing so. In some cases it is a disarming ease. Unfortunately, the complexity of the software being produced today is accompanied in some cases to a level of imperfection that gives rise to serious security problems.
These real "flaws" are those whose research is pushing the hackers and those who are exploited (by whom is not motivated by a strong ethical) for illegally entering computer systems. To address these shortcomings software makers are often forced to issue patches to update the application of which is within the sole responsibility of us end users. Also do not forget that the complexity of the software can sometimes invest in issues relevant to its proper configuration to a level that will induce the user to use cd configurations. By default, which pave the way for dangerous deficiencies in terms of safety.
THE SCENARIO:
This first step is to identify the exact amount to be protection you need, for example Personal data, confidential documents and information, e-mail, operating system, etc.). And the nature and sources of possible harmful events (e.g. viruses, intrusions and external attacks, malfunctions, etc.). Surely at this stage is crucial to make a general comment on what the primary use that is made of PC because this affects much of the scenario resulting in further defining. It is clear that the concerns of those who use the computer only to draft documents to be very different from that of those who uses it mainly to surf the net and download software.
WHAT STEPS SHOULD BE TAKEN:
Although you cannot find an ideal complex of preventive measures we can say with certainty that many of the problems that typically arise when it comes to the security of a computer system can be avoided by taking the following corrective actions that, taken together, may be treated as a do's and don'ts:
- Use a good anti-virus: any computer connected to the Internet shall be so equipped, is also equally important to ensure regular updating of signature files;
- Use a firewall may seem excessive but the use of filtering devices such as firewalls, if appropriately configured, is able to offer a reasonable degree of protection against certain types of attacks and especially against a range of preparatory activities (such as port scanning TCP / UDP) that an attacker usually performs before groped unauthorized access; naively, do not open email attachments: this rule also applies to e-mail messages that appear to originate from a known address, in any case you should always save a file in the attachment and submit it to a virus scan before opening it; do not naively programs of all kinds: it is always a good idea to check the authenticity of any program before running it and the same is true for all documents that contain macros;
- Always apply the latest patch: This is true not only for the operating system but also for the application software; pay close attention to the abnormal function of the operating system is absolutely necessary to always look with suspicion at seemingly inexplicable workings of the operating system and try to identify the cause as possible with the use of specific instruments;
- Disable Java, JavaScript and ActiveX: these technologies can be a real thorn in the side when surfing the Internet, or alternatively, not to make navigation on some sites frustrating, you can protect yourself, but within certain limits, using specific software that acts as a filter for interactive content that is normally received or forms of navigation using anonymous proxy servers;
- Disable scripting features in email clients: often the most vulnerabilities affecting browser, linked to the presence of interactive content, we also present in this kind of software; make a regular backup of all sensitive data is equally important to keep copies in safe places generated; create a boot disk, this can help in the eventual recovery of activity of a compromised system but on condition that the copy is absolutely genuine and being stored in a safe place.
Bookmarks