Defensive computing: Difference between revisions

Content deleted Content added
m Reverted edits by 67.68.16.60 (talk) to last version by 24.45.38.243
Turko88 (talk | contribs)
No edit summary
Line 1:
'''Defensive Computing''' is a form of training for computer users to help reduce the risk of computing problems by avoiding dangerous computing practices. Its aim is to reduce the risk of problems by anticipating dangerous situations, despite adverse conditions or the mistakes of others. This can be achieved through adherence to a variety of general rules, as well as the practice of specific computing techniques.
 
Defensive computing is about taking steps when things are running well, to avoid or minimize problems down the road. In short, it's about being smart and planning ahead. <ref name="one">[http://att.com.com/8301-13554_3-9740197-33.html http://att.com.com/8301-13554_3-9740197-33.html], Introducing the defensive computing blog </ref> Strategies for defensive computing could be divided into two categories: [[Network security]] being the first one, and [[backup]], recovery procedures and file protection as the second.
It is inspired by the practice of [[defensive driving]].
 
== ExampleNetwork routinesSecurity ==
There are many ways a user can put his/her systems at risk by simply browsing the [[Internet]] and checking [[emails]]. That is why there are several techniques a computer user can apply in order to maintain his/her files and systems secure.
* Regularly [[backup]] important files and documents.
 
=== Emails ===
Users should be extremely careful when opening email attachments. It is a very good habit to only open attachments after scanning them first with an up-to-date antivirus program. When the user receives an image file, he/she shouldn’t double-click on the attachment. The image viewing application should be opened first and then the image should be opened from within the viewing program. <ref name="two">[http://www.melbpc.org.au/pcupdate/2206/2206article6.htm http://www.melbpc.org.au/pcupdate/2206/2206article6.htm], How To Protect Yourself From Virus Infection </ref>
 
Also one should beware of persuasive messages with headings that are out of the ordinary, or invitations that promise rewards or excitement. Most of them could be spam, misleading the user into false advertisement that could reach his/her private information.
 
The important lesson is to always be skeptical about e-mail messages, and to not judge them based on the sender’s address. It is very easy to forge the sender’s address in an e-mail message. <ref name="three">[http://news.cnet.com/8301-13554_3-9763538-33.html http://news.cnet.com/8301-13554_3-9763538-33.html], A new e-mail scam </ref>
 
Check [http://michaelhorowitz.com/bademails.html this link] for examples of unsafe emails.
 
=== Downloading ===
Users should be careful when [[downloading]] and opening files. Once again it is a very good idea to scan them with an up-to-date [[antivirus]] program before opening them. Users should configure their computers to always show [[file extensions]], in this way not letting dangerous files (EXE, VBS, BAT) appear as harmless (JPG, TXT, DOC). <ref name="two" />
 
=== Instant Messaging ===
On the Internet, a person’s identity is completely concealed. This anonymity comes into play even when users are [[instant messaging]] with somebody they know. All the responses from a friend’s computer may not actually be coming from the user’s friend. Some may be inserted by [[malicious software]] running on that person’s computer. <ref name="four">[http://news.cnet.com/8301-13554_3-10047186-33.html http://news.cnet.com/8301-13554_3-10047186-33.html], Defending instant messaging </ref>
 
If a [[computer virus|virus]] infects a user’s friend’s computer’s instant messaging program, then it can insert anything into the chat windows and it will look like the message is coming from the user’s friend. Furthermore, it can provide a link for the user to click on that may lead to malicious software. <ref name="five">[http://www.eset.com/threat-center/blog/?p=148 http://www.eset.com/threat-center/blog/?p=148], It Doesn’t Hurt to Ask </ref>
 
== Backup and Recovery Procedures ==
In order to prevent data loss, it is a good idea to always back up one’s files.
 
There are many ways users can unintentionally lose information on a computer. Some examples include a child playing the keyboard like a piano, a power surge, lightning, floods, and equipment failure. <ref name="six">[http://www.microsoft.com/protect/yourself/data/what.mspx http://www.microsoft.com/protect/yourself/data/what.mspx], How to decide what data to back up </ref>
 
If a user regularly makes backup copies of their files and keeps them in a safe place, they can get some, if not all, of their information back in the event of something happening to the originals. <ref name="six" />
 
Users should back up files containing personal information such as banking records. They should also backup music, photos, personal projects, calendars and contact lists.
 
At some point, the computer the user is using will eventually [[computer crash|crash]] and the user will lose some files and data. Most of the times crashes are inevitable, but users can minimize the loss in different ways. Using [[System Restore]] is an option, but there are also other alternatives users can use.
 
If users have all of their personal information and files backed up, it will be very easy to restore their computers to the way they were before, which in turn would make the data loss minimal.
 
== Good Practices for Protecting One's Data ==
* Regularly [[backup]] important files, documents and documentsemails.
* Do not use the administrator account for day-to-day activities.
* Keep your software up-to-date with the latest versions.
* Keep antivirus and [[antispyware]] up-to-date with latest versions.
* Separate your trust - useUse different passwords
* Disable auto run feature from USB [[flash drives]]. Some viruses, specially [[computer worm|worms]], spread automatically through USB flash drives <ref name="seven">[http://news.cnet.com/8301-13554_3-10027754-33.html http://news.cnet.com/8301-13554_3-10027754-33.html], Be safer than NASA: Disable autorun </ref>
* Always connect to the Internet behind a firewall
 
== References ==
<references/>
{{Reflist}}
 
== See also ==
Line 14 ⟶ 54:
* [[Computer insecurity]]
* [[End-user computing]]
* [[Network security]]
 
* [[computer worm]]
== External links ==
* [[computer security]]
*[http://www.melbpc.org.au/pcupdate/2206/2206article6.htm How to protect yourself against viruses]
 
[[Category:Security exploits|Insecurity]]