- How do I get information security and protect my computer or laptop against malware
- How do I keep my emails, website and internet safe?
- Why can spam be dangerous, not just an irritation?
- How do I get information security?
Information security, and protecting your computer and network against malware means you need to be informed and have a good understanding of IT terminology. Having information security and protecting your computer against malware will influence your peace of mind.
Protect your computer from malware.
Malware is software that is built deliberately to attack a computer or network to cause damage. The software is created as code or scripts and in the form of viruses, Trojan horses, worms, spyware, ransom ware adware and scare-ware. Information security is needed for any device that can be connected to a network e.g. cell phone, note pad, laptop, desktop.
Types of malware currently:
Viruses: replicates itself by modifying programs, inserting its own code through the modification.
Scripting written for a specific environment. Spyware is created to gather information about the person or organisation such as personal details
Worms software that replicates itself and spreads to other computers and spread harm. Worms take advantage of weak points in a system.
Ransom-ware: This is malware created to threaten the person by holding their data or access ransom unless a ransom is paid.
Adware: (advertising supported) unexpected adverts popping up which when clicked on works as pay – per – click thus generating revenue.
Trojan-horse malware: named after the Trojan horse used to conquer the city of Troy, where an “innocent” looking item is accepted by the receiver e.g. email, which actually contains malicious code meant to create damage.
Bootkits: Infecting the startup processes, inhibiting the start up of certain programs. Some internet software providers use this legitimately to prevent other programs from starting up already installed.
Rootkits: mostly malicious software hidden once inserted, and aiming to access the “root” of the operating system. Automated installation, or installed by the attacker. The attacker makes use of a known weakness, or password through e.g. phishing. Re-installation of the operating system is normally needed as it is a more difficult malware to detect using cloaking techniques.
Keystroke logging: logging the keys typed on the keyboard with the person typing unaware of the monitoring.
Screen scraping / data scraping: taking information from what is visible on the screen, usually done through using the terminal memory.
Logic bomb: A logic bomb is timed malware, which is activated when certain criteria are met
Tips for information security for protecting your computer and network?
Protecting your computer means it is vital to avoid malware on the computer or network and protect the contents using the following tips.
*Don’t open emails with unknown email addresses
*Never put in bank details using an email link
*Have antivirus software installed
*Use password controls on your devices
*Promises of payments or gifts on emails is probably not there for your good, but their profit
*If what the sender is promising is too good to be true, it probably is!
*Use programs with secure coding
*Use authentication software for accessing software or programs
*Use data centric security programs
*Use mobile secure gateways