Defensive computing: Difference between revisions

Content deleted Content added
added anti-malware subheading
added subheading for skepticism
Line 8:
 
=== Firewall ===
A [[firewall]] is a collection of security measures that protects a computer from harmful inbound and outbound traffic on the Internet and prevents the unauthorized access of computer systems. <ref name="two">[http://www.cs.unm.edu/~treport/tr/02-12/firewall.pdf http://www.cs.unm.edu/~treport/tr/02-12/firewall.pdf],A History and Survey of Network Firewalls</ref> These security measures are integrated into the form of special software that runs autonomously either on individual computer systems, or externally through built in software within [[routers]] and [[]modems]].
 
Not all firewall software will protect computers from sending unauthorized or harmful outbound traffic.
An important defensive computing strategy is to seek and implement quality firewall software that filters both inbound and outbound traffic. <ref name="three">[http://news.cnet.com/8301-13554_3-9923976-33.html http://news.cnet.com/8301-13554_3-9923976-33.html], The Pillars of Defensive Computing</ref>
 
 
=== Anti-Malware software ===
A basic strategy for all defensive computer users is to install and use anti-[[malware]] software.
Firewalls may not completely protect a computer. Malicious software may be able to get through a firewall and onto a system. Anti-Malware such as anti-virus, anti-phishing and email filtering software offer some protection against harmful software that reside within a computer. The amount of malicious software available over the Internet is steadily increasing. <ref name="four">[http://www.washingtonpost.com/wp-dyn/content/article/2008/03/19/AR2008031901439.html http://www.washingtonpost.com/wp-dyn/content/article/2008/03/19/AR2008031901439.html], Antivirus Firms Scramblinb to Keep Up</ref> It is important for defensive users to use to anti-malware that is both effective and easily updated in order to combat new strains of malicious software that are developed.<ref name="two">[http://news.cnet.com/8301-13554_3-9923976-33.html http://news.cnet.com/8301-13554_3-9923976-33.html], The Pillars of Defensive Computing</ref>
 
=== Skepticism ===
An important aspect of defensive computing is for users to be skeptical of the data to which they have access via the Internet.<ref name="two">[http://news.cnet.com/8301-13554_3-9923976-33.html http://news.cnet.com/8301-13554_3-9923976-33.html], The Pillars of Defensive Computing</ref> Malicious software can exist in a multitude of different forms and many are misleading to general computer users and even some anti-malware software. Defensive users think critically about the information they can access, to reduce their chances of downloading and spreading malicious software. Strategies include scanning email attachments prior to opening them and manually filtering suspicious emails from inboxes. Users should be aware of persuasive subject lines and headings in emails from any address, as they may actually contain malicious software or spam, which can mislead users into false advertisement resulting in identity theft.<ref name="two">[http://news.cnet.com/8301-13554_3-9923976-33.html http://news.cnet.com/8301-13554_3-9923976-33.html], The Pillars of Defensive Computing</ref>
Defensive users can scan files they download prior to opening them and can also configure their computers to show file extensions, revealing potentially dangerous files that appear harmless[7]. Skepticism can also be applied to the websites visited by users. As with emails, users can be lead to false advertisements. Also, malicious software can unknowingly be downloaded and infect a computer, just by visiting a certain website.
 
=== Emails ===