Internet security is a discipline that is responsible for protecting the integrity and privacy of information stored in a computer system. In any case, there is no technique to ensure the inviolability of a system.
There are many free security tools available.
A computer system can be protected from a logical point of view (with the development of software) or physical (linked to electrical maintenance, for example). On the other hand, threats can come from harmful programs that are installed on the user’s computer (such as a virus) or arrive remotely (criminals who connect to the net and enter different systems).
In the case of viruses, it must be emphasized that currently there is a very large list of viruses that exist and that can palpably damage any computer or system. So, for example, we find the so-called resident viruses that are those that are characterized by the fact that they are hidden in what is RAM memory and that gives them the opportunity to intercept and control the different operations that are performed in the computer in question carrying out the infection of programs or folders that are a fundamental part of those.
In the same way there are also the known direct action viruses that are those that what they do is run quickly and spread throughout the team bringing with them the contagion of everything they find in their path.
The encrypted virus, the boot virus, the file virus or the overwriting are also other of the most important contagious dangers that can affect our computer.
Among the most common tools of computer protection, are antivirus programs, firewalls or firewalls, encryption of information and the use of passwords.
All of them are very useful tools, as are the well-known intrusion detection systems, also known as anti-spyware. These are programs or applications through which you can immediately detect what are those spyware that are in our computer system and what they do is a collection of information from it and then offer it to an external device without counting with our authorization in no time. Among this type of spies highlights, for example, Gator.
A secure system must be complete (with information that can only be modified by authorized persons), confidential (the data must be legible only for authorized users), irrefutable (the user must not be able to deny the actions he has taken) and have good availability ( it must be stable).
In any case, as in most areas of IT, the essential thing remains the training of users. A person who knows how to protect themselves from threats will know how to use their resources in the best possible way to avoid attacks or accidents.
In other words, it can be said that computer protection seeks to guarantee that the resources of an information system are used as an organization or a user has decided, without interference.
If we think for a minute about what risks we expose ourselves with the use of the Internet, it is likely that we will come up with many. There is a certain social alarm around the dangers, more because of ignorance than because of the real risks. In fact, the same prudence that we apply to our daily life should apply to our lives through the net of nets. We should not rely more or less on this medium than on any other.
Viruses, Trojans and Hackers
A virus is a program, usually disguised as a document, that causes an unexpected and usually undesirable effect when executed on our computer. They are often designed to spread automatically. Viruses can be transmitted through attachments in emails, such as direct downloads when downloading files from the inet, or by being present on a diskette or CD. The transmitter of these infected files usually does not have knowledge of the virus. Some viruses manifest their presence when they are executed; others remain dormant until certain circumstances cause their code to be executed by the infected computer (usually a specific date). Some viruses are harmless in their purpose and effect, but others can be enormously harmful, eliminating files or causing your disk, floppy disk or CD to require formatting again, with the subsequent partial or total loss of your information.
A Trojan was in its beginnings a program that was camouflaged inside another to get a user of a computer to execute it thinking that he was actually executing a legal program.
We talked in the past because, although the definition of “Trojan” is still valid, recent years have seen the emergence of a large number of Trojans with special characteristics, which have been generalized, extending their definition to the Trojan term.
These new Trojans, respond more specifically to the definition of Backdoor or Backdoor, that is, they open a communication channel in the infected computer that allows another computer to connect to it to perform actions without the legitimate user of this computer is aware of it.
The Computer Pirates are specialized computer users to penetrate the databases of computer systems in order to obtain certain information. Currently, the term is identified with that of computer criminal, and includes cybernauts who perform criminal operations through existing computer networks.
The Inet is no more insecure than the non-virtual society, therefore it is exposed to the same risks as anything else. Scams seem to be something inherent to the human being, since they have existed since the beginning of time, and scammers have adapted to new technologies, joining them to commit a crime. There are scams of any kind, but if we think carefully are not so different from traditional scams: usurpation of personality (send us an e-mail saying they are our bank and they need the data of our card), false bargains, etc. If we apply the same common sense to the inet as to our ordinary life, we will hardly have problems of this kind.
The biggest risk of theft exists when a hacker has obtained the data from our bank account and uses it to their own advantage. This is increasingly complicated (banks are determined to normalize the use of online banking and do not hesitate to invest large sums in security) and it is increasingly safe to use the Internet as a means of payment.
Perhaps one of the greatest potential risks on the net is addiction. The Foundation for Help Against Drug Addiction has warned that more and more people are suffering from this pathology. It can be associated with the mass consumption of games of chance (then we would be talking about a type of pathological gambling) as the abusive use of the network as a form or communication system (chats, Messenger). Children and adolescents are the most permeable to suffer addictive behaviors, also in the case of New Technologies, therefore they must be prevented and protected against irresponsible and massive consumption.
The information we disseminate on the net is open to being intercepted by anyone, which could leave us uncovered in certain situations. We must be prudent (and we must educate in prudence) when giving personal information that may expose our privacy. It is difficult to know who is really on the other side of the network and what intentions it takes, so it is not advisable to reveal information such as addresses, phone numbers or routing habits.