Content deleted Content added
Superking300 (talk | contribs) Edited the opening paragraph. Edited the intro paragraph to network security. |
Superking300 (talk | contribs) Added subheading for firewalls |
||
Line 6:
== Network Security ==
Users put their computers at risk when accessing the [[Internet]] and other [[networks]]. The use of either of these allows others to gain access to a user's system and important information. By implementing certain strategies, defensive users aim to reduce the risk associated with network access.
=== Firewall ===
A firewall is a collection of security measures that protects a computer from harmful inbound and outbound traffic on the Internet and prevents the unauthorized access of computer systems. <ref name="two">[http://www.cs.unm.edu/~treport/tr/02-12/firewall.pdf http://www.cs.unm.edu/~treport/tr/02-12/firewall.pdf],A History and Survey of Network Firewalls</ref> These security measures are integrated into the form of special software that runs autonomously either on individual computer systems, or externally through built in software within routers and modems.
Not all firewall software will protect computers from sending unauthorized or harmful outbound traffic.
An important defensive computing strategy is to seek and implement quality firewall software that filters both inbound and outbound traffic. <ref name="three">[http://news.cnet.com/8301-13554_3-9923976-33.html http://news.cnet.com/8301-13554_3-9923976-33.html], The Pillars of Defensive Computing</ref>
=== Emails ===
Users should be extremely careful when opening email attachments. It is a very good habit to only open attachments after scanning them first with an up-to-date antivirus program. When the user receives an image file, he/she shouldn’t double-click on the attachment. The image viewing application should be opened first and then the image should be opened from within the viewing program. <ref name="
Also one should beware of persuasive messages with headings that are out of the ordinary, or invitations that promise rewards or excitement. Most of them could be spam, misleading the user into false advertisement that could reach his/her private information.
|