Content deleted Content added
Superking300 (talk | contribs) Added subheading for firewalls |
Superking300 (talk | contribs) added anti-malware subheading |
||
Line 9:
=== Firewall ===
A firewall is a collection of security measures that protects a computer from harmful inbound and outbound traffic on the Internet and prevents the unauthorized access of computer systems. <ref name="two">[http://www.cs.unm.edu/~treport/tr/02-12/firewall.pdf http://www.cs.unm.edu/~treport/tr/02-12/firewall.pdf],A History and Survey of Network Firewalls</ref> These security measures are integrated into the form of special software that runs autonomously either on individual computer systems, or externally through built in software within routers and modems.
Not all firewall software will protect computers from sending unauthorized or harmful outbound traffic.
An important defensive computing strategy is to seek and implement quality firewall software that filters both inbound and outbound traffic. <ref name="three">[http://news.cnet.com/8301-13554_3-9923976-33.html http://news.cnet.com/8301-13554_3-9923976-33.html], The Pillars of Defensive Computing</ref>
=== Anti-Malware software ===
A basic strategy for all defensive computer users is to install and use anti-malware software.
Firewalls may not completely protect a computer. Malicious software may be able to get through a firewall and onto a system. Anti-Malware such as anti-virus, anti-phishing and email filtering software offer some protection against harmful software that reside within a computer. The amount of malicious software available over the Internet is steadily increasing. <ref name="four">[http://www.washingtonpost.com/wp-dyn/content/article/2008/03/19/AR2008031901439.html http://www.washingtonpost.com/wp-dyn/content/article/2008/03/19/AR2008031901439.html], Antivirus Firms Scramblinb to Keep Up</ref> It is important for defensive users to use to anti-malware that is both effective and easily updated in order to combat new strains of malicious software that are developed.<ref name="two">[http://news.cnet.com/8301-13554_3-9923976-33.html http://news.cnet.com/8301-13554_3-9923976-33.html], The Pillars of Defensive Computing</ref>
=== Emails ===
|