EssaysForStudent.com - Free Essays, Term Papers & Book Notes
Search

How Can Home Internet Security Be Achieved Both Efficiently and Effectively?

By:   •  Essay  •  890 Words  •  May 17, 2010  •  950 Views

Page 1 of 4

How Can Home Internet Security Be Achieved Both Efficiently and Effectively?

How Can Home Internet Security Be Achieved Both Efficiently And Effectively?

A reasonable amount of home Internet security can be achieved in an efficiently and effectively.

Out of 20 people surveyed, 15 stated a firewall as most important, 5 said anti-virus software. In my opinion, anti-virus software is the most important security measure followed by a firewall. This is because viral attacks seem to be much more prevalent than hacker intrusions. My analysis of this data is that most people are aware that firewalls provide network security from intrusion, but take anti-virus software for granted.

Many steps must be taken in order to achieve adequate LAN security. Most importantly for keeping outsiders (hackers) out of the network is a firewall (usually software), which can be used to close all ports unnecessarily open. Updated anti-virus software is very important for dealing with threats such as viruses, Trojans, worms, etc. Keeping up with Windows security updates will do a great deal to close know security holes in various Microsoft products. Depending on the value of data to be protected, there are many encryption schemes available at many different price levels to secure information both on the computer as well as information sent and received. Default Windows accounts and passwords should be changed or deactivated.

A virus is a program or piece of code that is loaded onto your computer without your knowledge and runs against your wishes. Viruses can also replicate themselves. All computer viruses are manmade. A simple virus that can make a copy of itself over and over again is relatively easy to produce. Even such a simple virus is dangerous because it will quickly use all available memory and bring the system to a halt. An even more dangerous type of virus is one capable of transmitting itself across networks and bypassing security systems.

There are many companies that produce anti-virus software. The most widely used brands are Norton (Symantec) and McAfee.

A hacker is a person who enjoys learning programming languages and computer systems and can often be considered an expert on the subject(s). Among professional programmers, depending on how it used, the term can be either complimentary or derogatory, although it is developing an increasingly derogatory connotation. The pejorative sense of hacker is becoming more prominent largely because the popular press has co-opted the term to refer to individuals who gain unauthorized access to computer systems for the purpose of stealing and corrupting data.

Windows comes with basic firewall software, though this may not be enough to prevent most advanced attacks. Many companies make firewall software. Norton makes the most widely used software. Hardware firewalls are also available. Most routers also serve as a firewall. Hardware firewalls can be combined with software firewalls for added security.

Spyware is any software that covertly gathers user information through the user's Internet connection without his or her knowledge, usually for advertising purposes. Spyware applications are typically bundled as a hidden component of freeware or shareware programs that can be downloaded from the Internet. It should be noted that the majority of shareware and freeware applications do not come with spyware. Once installed, the spyware monitors user activity on the Internet and transmits that information in the background to someone else. Spyware can also gather information about e-mail addresses and even passwords and credit card numbers.

Spyware is similar to a Trojan horse in that users unwittingly install the product when they install something else. A common way to become a victim of spyware is to download certain

Download as (for upgraded members)  txt (5.8 Kb)   pdf (97.4 Kb)   docx (12.4 Kb)  
Continue for 3 more pages »