Content deleted Content added
m Bot: links syntax and spacing |
m link identity theft |
||
(30 intermediate revisions by 24 users not shown) | |||
Line 1:
'''Defensive
Strategies for defensive computing could be divided into two categories, [[network security]] and the [[backup]] and
== Network
Users put their computers at risk when accessing the [[Internet]] and other [[Computer network|networks]]. The use of either of these allows others to gain access to a user's system and important information. By implementing certain strategies, defensive users aim to reduce the risk associated with network access.
=== Firewall ===
A [[Firewall (computing)|firewall]] is a collection of security measures that protects a computer from harmful inbound and outbound traffic on the Internet and prevents the unauthorized access of computer systems.<ref name="one">[http://www.cs.unm.edu/~treport/tr/02-12/firewall.pdf http://www.cs.unm.edu/~treport/tr/02-12/firewall.pdf], A History and Survey of Network Firewalls</ref> These security measures are integrated into the form of special software that runs autonomously either on individual computer systems, or externally through built in software within [[Router (computing)|routers]] and [[modems]].
Not all firewall software will protect computers from sending unauthorized or harmful outbound traffic.
An important defensive computing strategy is to seek and implement quality firewall software that filters both inbound and outbound traffic.<ref name="two">[http://news.cnet.com/8301-13554_3-9923976-33.html http://news.cnet.com/8301-13554_3-9923976-33.html], The Pillars of Defensive Computing</ref>
=== Anti-
A basic strategy for all defensive computer users is to install and use anti-[[malware]] software.
Firewalls may not completely protect a computer. Malicious software may be able to get through a firewall and onto a system. Anti-Malware such as anti-virus, anti-phishing and email filtering software offer some protection against harmful software that reside within a computer. The amount of malicious software available over the Internet is steadily increasing.<ref name="three">
The other side of anti malware is that it contains serious vulnerabilities itself.<ref name="eight">{{Cite web |last=Taviso |date=2016-06-28 |title=Project Zero: How to Compromise the Enterprise Endpoint |url=https://googleprojectzero.blogspot.com/2016/06/how-to-compromise-enterprise-endpoint.html |access-date=2023-04-26 |website=Project Zero}}</ref> A malware could use vulnerabilities of anti-malware to launch malicious code.
Anti-malware works by scanning files a network connections for known signatures. Those signatures can never be up to date. To be able to scan network connections, encryptions (SSL/TLS) need to be bypassed or even broken by anti-malware software. When monitoring emails anti-malware opens all attachments for analysis, a bug in this scanner can be used as a starting point for malware. Attackers just need to send malware to a mailbox that is scanned automatically.
It is questionable if malware scanners are even useful at all. Ex Mozilla developer Rober O'Callahan writes in his blog that anti malware software should be disabled (except windows defender)<ref name="nine">{{Cite web |last=Robert |title=Disable Your Antivirus Software (Except Microsoft's) |url=https://robert.ocallahan.org/2017/01/disable-your-antivirus-software-except.html |access-date=2023-04-26}}
</ref>
=== Skepticism ===
An important aspect of defensive computing is for users to be skeptical of the data to which they have access via the Internet.<ref name="four">[http://www.melbpc.org.au/pcupdate/2206/2206article6.htm http://www.melbpc.org.au/pcupdate/2206/2206article6.htm] {{webarchive|url=https://web.archive.org/web/20060724025722/http://www.melbpc.org.au/pcupdate/2206/2206article6.htm |date=2006-07-24 }}, How To Protect Yourself From Virus Infection</ref> Malicious software can exist in a multitude of different forms and many are misleading to general computer users and even some anti-malware software. Defensive users think critically about the information they can access, to reduce their chances of downloading and spreading malicious software. Strategies include scanning
Defensive users can scan files they download prior to opening them and can also configure their computers to show [[file extensions]], revealing potentially dangerous files that appear harmless.<ref name="four"/>
Skepticism can also be applied to the websites visited by users. As with emails, users can be
== Backup and
Despite the efforts of a defensive computer user, the loss of important data can occur due to malware, power outages, equipment failure and general misuse. Although the loss of data cannot be completely prevented, defensive users can take steps to minimize the amount of data lost and restore systems to their previous state.
Line 30 ⟶ 37:
Some operating systems give users the option of performing a procedure that restores a computer to a predetermined state. If no option is available, a user can obtain the appropriate restoration software for their system. In the event of a system failure or a serious case of data loss, a user can restore any lost or changed files and remove any malicious files that did not previously exist.<ref name="five"/>
== Good
* Regularly backup important files, documents and emails.
* Do not use the administrator account for day-to-day activities.
Line 38 ⟶ 45:
* Disable auto run feature from USB [[flash drives]]. Some viruses, specially [[computer worm|worms]], spread automatically through USB flash drives <ref name="seven">[http://news.cnet.com/8301-13554_3-10027754-33.html http://news.cnet.com/8301-13554_3-10027754-33.html], Be safer than NASA: Disable autorun</ref>
* Always connect to the Internet behind a firewall
* When in doubt, throw it out
== References ==▼
{{Reflist}}▼
== See also ==
Line 49 ⟶ 53:
* [[End-user computing]]
* [[Network security]]
* [[
* [[
* [[Defense strategy (computing)]]
▲== References ==
▲{{Reflist}}
==External links==
*[https://web.archive.org/web/20091221035542/http://blogs.computerworld.com/15280/defensive_computing_priorities Defensive computing priorities ] by Michael Horowitz December 2009
{{malware}}
[[Category:Computer security
[[Category:Backup]]
|