Internet Security
Internet security has become a serious issue for anyone connected to the net. Even if you don’t think you have anything worth protecting on your computer, it’s still important that you keep it locked down.
Your files are not the only thing at stake here. If someone gains access to your computer, it can be used as a “zombie” for hacking into other computer, hiding the trail of the person who is actually doing it.
How would you like to get a call from your local police telling you that there’s been a virus attack that has been traced back to your computer?
No, even if your computer isn’t used for anything critical you need to run security software such as an antivirus and a firewall.
These programs will keep your computer “hidden” from prying eyes over the internet, as well as protected from viruses and other malware that can be spread through email or other methods.
You also need to make sure you’re familiar with the different types of security threats so you can deal with them if they ever come up.
When a computer connects to a network and begins communicating with others, it is taking a risk. Internet security involves the protection of a computer’s internetaccount and files from intrusion of an unknown user.[1] Basic security measures involve protection by well selected passwords, change of file permissions and back up of computer’s data.
Security concerns are in some ways peripheral to normal business working, but serve to highlight just how important it is that business users feel confident when using IT systems. Security will probably always be high on the IT agenda simply because cyber criminals know that a successful attack is very profitable. This means they will always strive to find new ways to circumvent IT security, and users will consequently need to be continually vigilant. Whenever decisions need to be made about how to enhance a system, security will need to be held uppermost among its requirements.
Internet security professionals should be fluent in the four major aspects:
1. Penetration testing
2. Intrusion Detection
3. Incidence Response
4. Legal / Audit Compliance