Defensive computing: Difference between revisions

Content deleted Content added
FrescoBot (talk | contribs)
m Bot: links syntax and spacing
m minor cleanup
Line 1:
'''Defensive Computingcomputing''' is a form of practice for computer users to help reduce the risk of computing problems, by avoiding dangerous computing practices. The primary goal of this method of computing is to be able to anticipate and prepare for potentially problematic situations prior to their occurrence, despite any adverse conditions of a computer system or any mistakes made by other users. This can be achieved through adherence to a variety of general guidelines, as well as the practice of specific computing techniques.
 
Strategies for defensive computing could be divided into two categories, [[network security]] and the [[backup]] and [[Data restoration|restoration]] of data.
 
== Network Securitysecurity ==
Users put their computers at risk when accessing the [[Internet]] and other [[Computer network|networks]]. The use of either of these allows others to gain access to a user's system and important information. By implementing certain strategies, defensive users aim to reduce the risk associated with network access.
 
Line 12:
An important defensive computing strategy is to seek and implement quality firewall software that filters both inbound and outbound traffic.<ref name="two">[http://news.cnet.com/8301-13554_3-9923976-33.html http://news.cnet.com/8301-13554_3-9923976-33.html], The Pillars of Defensive Computing</ref>
 
=== Anti-Malwaremalware software ===
A basic strategy for all defensive computer users is to install and use anti-[[malware]] software.
Firewalls may not completely protect a computer. Malicious software may be able to get through a firewall and onto a system. Anti-Malware such as anti-virus, anti-phishing and email filtering software offer some protection against harmful software that reside within a computer. The amount of malicious software available over the Internet is steadily increasing.<ref name="three">[http://www.washingtonpost.com/wp-dyn/content/article/2008/03/19/AR2008031901439.html http://www.washingtonpost.com/wp-dyn/content/article/2008/03/19/AR2008031901439.html], Antivirus Firms Scrambling to Keep Up</ref> It is important for defensive users to use to anti-malware that is both effective and easily updated in order to combat new strains of malicious software that are developed.<ref name="two"/>
Line 21:
Skepticism can also be applied to the websites visited by users. As with emails, users can be lead to false advertisements. Also, malicious software can unknowingly be downloaded and infect a computer, just by visiting a certain website.
 
== Backup and Recoveryrecovery Proceduresprocedures ==
Despite the efforts of a defensive computer user, the loss of important data can occur due to malware, power outages, equipment failure and general misuse. Although the loss of data cannot be completely prevented, defensive users can take steps to minimize the amount of data lost and restore systems to their previous state.
 
Line 30:
Some operating systems give users the option of performing a procedure that restores a computer to a predetermined state. If no option is available, a user can obtain the appropriate restoration software for their system. In the event of a system failure or a serious case of data loss, a user can restore any lost or changed files and remove any malicious files that did not previously exist.<ref name="five"/>
 
== Good Practicespractices for Protectingprotecting Datadata ==
* Regularly backup important files, documents and emails.
* Do not use the administrator account for day-to-day activities.