Defensive computing: Difference between revisions

Content deleted Content added
m link identity theft
 
Line 24:
 
=== Skepticism ===
An important aspect of defensive computing is for users to be skeptical of the data to which they have access via the Internet.<ref name="four">[http://www.melbpc.org.au/pcupdate/2206/2206article6.htm http://www.melbpc.org.au/pcupdate/2206/2206article6.htm] {{webarchive|url=https://web.archive.org/web/20060724025722/http://www.melbpc.org.au/pcupdate/2206/2206article6.htm |date=2006-07-24 }}, How To Protect Yourself From Virus Infection</ref> Malicious software can exist in a multitude of different forms and many are misleading to general computer users and even some anti-malware software. Defensive users think critically about the information they can access, to reduce their chances of downloading and spreading malicious software. Strategies include scanning [[email attachments]] prior to opening them and manually filtering suspicious emails from inboxes. Users should be aware of persuasive subject lines and headings in emails from any address, as they may actually contain malicious software or spam, which can mislead users into false advertisement resulting in [[identity theft]].<ref name="two"/>
Defensive users can scan files they download prior to opening them and can also configure their computers to show [[file extensions]], revealing potentially dangerous files that appear harmless.<ref name="four"/>
Skepticism can also be applied to the websites visited by users. As with emails, users can be led to false advertisements. Also, malicious software can unknowingly be downloaded and infect a computer, just by visiting a certain website.