History of Internet Security
Computers have become ubiquitous and indispensable today. The traditional system of documenting things on paper is being rapidly replaced by computers. The growing dependency on computers, especially since the advent of the Internet, has also made the integrity, confidentiality and availability of information and resources vulnerable.
Internet Security Measures
Here's an overview of the most important security measures and technologies widely implemented over the Internet. Implementing one or more of these methods will go a long way in securing your data online.
Routers with Encryption Facility
Using routers with in-built encryption technology can secure your wireless Internet connection and prevent snooping by external sources.
Firewall is a software or hardware-based network security system that controls the incoming and outgoing network traffic by analyzing the data packets and determining whether they should be allowed through or not, based on applied rule set.
Using Antivirus Software
Using Antivirus Software: Computers may be affected by viruses, trojans, worms etc. due to some infected files downloaded from the Internet. These viruses are nothing but programs that install themselves and operate whenever the host programs run, causing malicious attacks.
Passwords are used to prevent illegal access to networks to secure the entire system as a whole. Construction of passwords should be in a way that the other people do not easily guess it. Alphanumeric passwords with symbols used in between can be harder to crack.
antivirus is protective software designed to defend your computer against malicious software. Malicious software, or "malware" includes: viruses, Trojans, keyloggers, hijackers, dialers, and other code that vandalizes or steals your computer contents. In order to be an effective defense, your antivirus software needs to run in the background at all times, and should be kept updated so it recognizes new versions of malicious software.Phishing is a type of Internet fraud that seeks to acquire a user's credentials by deception. It includes theft of passwords, credit card numbers, bank account details and other confidential information.
Phishing messages usually take the form of fake notifications from banks, providers, e-pay systems and other organizations. The notification will try to encourage a recipient, for one reason or another, to urgently enter/update their personal data. Such excuses usually relate to loss of data, system breakdown, etc.
Several software programs pose a threat to Internet security. The software that runs along with other applications, without the permission of a user, gathering information and sending it to hackers through the internet, is known as spyware. Another software called ad-ware works similar to spyware. In addition, it pops up advertisements during Internet access and increases the CPU cycles, slowing down the computer. Antivirus software, with inbuilt antispyware or adware removal functionality, can be of great help in preventing such intrusions.