服务承诺
资金托管
原创保证
实力保障
24小时客服
使命必达
51Due提供Essay,Paper,Report,Assignment等学科作业的代写与辅导,同时涵盖Personal Statement,转学申请等留学文书代写。
51Due将让你达成学业目标
51Due将让你达成学业目标
51Due将让你达成学业目标
51Due将让你达成学业目标私人订制你的未来职场 世界名企,高端行业岗位等 在新的起点上实现更高水平的发展
积累工作经验
多元化文化交流
专业实操技能
建立人际资源圈Internet_Security
2013-11-13 来源: 类别: 更多范文
Internet Security
Many of us do banking and keep personal financial records on our computers. Although it is very convenient to do most of our financial and bill paying through the internet, this useful tool can become very threatening. New means of stealing personal information and destroying all of our computer data through the network are being developed daily and spread to the public in different forms, such as viruses, worms, fake e-mails, and spyware. Viruses and worms can create major headaches. Computer viruses are small software programs that are designed to spread from one computer to another and to interfere with computer operation. A virus might corrupt or delete data on your computer, use your e-mail program to spread itself to other computers, or even erase everything on your hard disk.
Although nothing can guarantee the security of your computer 100 percent, you can continue to improve your computer's security and decrease the possibility of infection by using a firewall, keeping your system up-to-date, maintaining a current antivirus software subscription, and following a few best practices. It is also important to back up critical files on a regular basis before you encounter a virus or other problems (Microsoft). Connecting to the internet without using a firewall is much the same as leaving your house unlocked when you go to work. Eventually, someone will find the unlocked door and wander in to see what kind of valuables you might have. Without a firewall, your personal information and files are open for attack or even theft. If someone hacks into your computer and gets access to your files, you could become a victim of identity theft. One of the most popular free firewall programs is Zone Alarm. It is updated regularly and does a good job of protecting your computer (Internet Security Guide).
There are several things that you should do to protect your computer from virus infections, and that is: 1- Use a high-quality anti-virus program, and be sure to update it regularly. Use it to scan any files, programs, software, or diskettes (even new software from a commercial company) before you use them on your computer. 2- Make back-up copies of important documents or files and store them on separate diskettes. Making backups will also protect your information against accidental file deletion, diskette failure, and other damage. 3- Whenever you use a computer in a campus lab, be sure to reboot or run "cleanup" before you start your session and log out when you end your session. 4- Do not share commercial software with anyone. It is a violation of the author's copyright to distribute such material, and it is a way to spread viruses. 5- When you get public domain (PD) software for which the author has granted permission to make copies, get it from a reliable source. (For example, and individual you do not know is not a reliable source.) Before you run PD material, use an anti-virus program to inspect for known viruses.
Avoid clicking links in unexpected email messages or downloading files or attachments that you weren't expecting. These things can lead to security problems and virus infections. Even if someone you know sends you something, don't click it until you verify they meant to send it and it's safe. You should also always remember to disconnect from the internet. Most high-speed internet connections are "always on" - whenever your computer is turned on, your connection is active. If you're not using the internet, it's best to disconnect from it to keep your computer safe from unexpected attacks or infections. If you need to share your computer with other people, make sure there are rules in place of what they can and can't do. This is especially true with kids - they have a tendency to download anything and everything, without any thought for how it could affect the computer and the information on it.
Never reply to spam. Doing so simply indicates to the spammer that your e-mail address is valid, and you’ll receive more spam than before. Some spam contains a message offering to remove your e-mail address from their mailing list. Don’t use even this service - it’s nothing but another method for verifying e-mail addresses (Security Manor).
Above all, never give your credit card number, bank account details or private data to anyone unknown over the Internet. PayPal, for example, and other legitimate online businesses will never ask for your password in an email. One common scam is to fake return addresses and tailor subject lines and content so the message appears to be from them or another financial institution ‘confirming’ your information. Don’t fall for them.
A Trojan horse is a program that is downloaded by a computer user that does not destroy data or files. Instead, a Trojan horse allows files to be accessed by outside parties. The problem begins with a download of a file that seems innocent - perhaps a song or small program file. Trojan horses are a serious concern because of the rising seriousness of identity theft and the importance of protecting the privacy of sensitive information. The key to avoiding a Trojan horse is to download only content that you are 100% certain is from a credible and safe source. The best way to avoid viruses, worms, and Trojan horses is to make sure anti-virus software is reliable and up to date.
To conclude, the internet is a great tool for many things, but unfortunately it can also pose a security risk for your personal information and privacy. Everyone who is connected to the internet needs to be aware of and have a basic understanding of how to protect themselves. Always remember have the most updated versions of anti-viruses and don’t connect to the internet without a firewall.
Works Cited
Internet Security Guide. 10 April 2009 .
Microsoft. 10 April 2009 .
Security Manor. 10 April 2009 .

