Defensive computing: Difference between revisions

Content deleted Content added
Fixed capitalisation.
m link identity theft
 
(13 intermediate revisions by 11 users not shown)
Line 1:
'''Defensive computing''' is a form of practice for computer users to help reduce the risk of computing problems, by avoiding dangerous computing practices. The primary goal of this method of computing is to be able to anticipate and prepare for potentially problematic situations prior to their occurrence, despite any adverse conditions of a computer system or any mistakes made by other users. This can be achieved through adherence to a variety of general guidelines, as well as the practice of specific computing techniques.
 
Strategies for defensive computing could be divided into two categories, [[network security]] and the [[backup]] and [[Data restoration|restoration]] of data.
 
== Network security ==
Line 14:
=== Anti-malware software ===
A basic strategy for all defensive computer users is to install and use anti-[[malware]] software.
Firewalls may not completely protect a computer. Malicious software may be able to get through a firewall and onto a system. Anti-Malware such as anti-virus, anti-phishing and email filtering software offer some protection against harmful software that reside within a computer. The amount of malicious software available over the Internet is steadily increasing.<ref name="three">[http://www.washingtonpost.com/wp{{Cite news |last=Krebs |first=Brian |date=2008-dyn/content/article/2008/03/-19/AR2008031901439.html |title=Anti-Virus Firms Scrambling to Keep Up |language=en-US |url=http://www.washingtonpost.com/wp-dyn/content/article/2008/03/19/AR2008031901439.html], Antivirus|access-date=2023-04-26 Firms Scrambling to Keep Up|issn=0190-8286}}</ref> It is important for defensive users to use to anti-malware that is both effective and easily updated in order to combat new strains of malicious software that are developed.<ref name="two"/>
 
The other side of anti malware is that it contains serious vulnerabilities itself.<ref name="eight">{{Cite web |last=Taviso |date=2016-06-28 |title=Project Zero: How to Compromise the Enterprise Endpoint |url=https://googleprojectzero.blogspot.com/2016/06/how-to-compromise-enterprise-endpoint.html |access-date=2023-04-26 |website=Project Zero}}</ref> A malware could use vulnerabilities of anti-malware to launch malicious code.
 
Anti-malware works by scanning files a network connections for known signatures. Those signatures can never be up to date. To be able to scan network connections, encryptions (SSL/TLS) need to be bypassed or even broken by anti-malware software. When monitoring emails anti-malware opens all attachments for analysis, a bug in this scanner can be used as a starting point for malware. Attackers just need to send malware to a mailbox that is scanned automatically.
 
It is questionable if malware scanners are even useful at all. Ex Mozilla developer Rober O'Callahan writes in his blog that anti malware software should be disabled (except windows defender)<ref name="nine">{{Cite web |last=Robert |title=Disable Your Antivirus Software (Except Microsoft's) |url=https://robert.ocallahan.org/2017/01/disable-your-antivirus-software-except.html |access-date=2023-04-26}}
</ref>
 
=== Skepticism ===
An important aspect of defensive computing is for users to be skeptical of the data to which they have access via the Internet.<ref name="four">[http://www.melbpc.org.au/pcupdate/2206/2206article6.htm http://www.melbpc.org.au/pcupdate/2206/2206article6.htm] {{webarchive|url=https://web.archive.org/web/20060724025722/http://www.melbpc.org.au/pcupdate/2206/2206article6.htm |date=2006-07-24 }}, How To Protect Yourself From Virus Infection</ref> Malicious software can exist in a multitude of different forms and many are misleading to general computer users and even some anti-malware software. Defensive users think critically about the information they can access, to reduce their chances of downloading and spreading malicious software. Strategies include scanning [[email attachments]] prior to opening them and manually filtering suspicious emails from inboxes. Users should be aware of persuasive subject lines and headings in emails from any address, as they may actually contain malicious software or spam, which can mislead users into false advertisement resulting in [[identity theft]].<ref name="two"/>
Defensive users can scan files they download prior to opening them and can also configure their computers to show [[file extensions]], revealing potentially dangerous files that appear harmless.<ref name="four"/>
Skepticism can also be applied to the websites visited by users. As with emails, users can be leadled to false advertisements. Also, malicious software can unknowingly be downloaded and infect a computer, just by visiting a certain website.
 
== Backup and recovery procedures ==
Line 48 ⟶ 55:
* [[Computer worm]]
* [[Computer security]]
* [[Defense strategy (computing)]]
 
== References ==
Line 53 ⟶ 61:
 
==External links==
*[https://web.archive.org/web/20091221035542/http://blogs.computerworld.com/horowitz15280/defensive_computing_priorities Defensive Computingcomputing Blogpriorities ] by Michael Horowitz atDecember 2009 ComputerWorld.com
*[http://blogs.computerworld.com/15280/defensive_computing_priorities Defensive computing priorities ] by Michael Horowitz December 2009
 
{{malware}}
 
[[Category:Computer security exploits]]
[[Category:Backup]]