928-649-8324

Computer Security – Overview


Computer security is the protection and security of computers and networks, data, software, hardware, and related data from misuse, theft, unauthorized access, loss, or other security threats. While the Internet has made our lives simpler and provided many benefits, it also poses a risk to our security system. It could be infected with a virus, hacked, or cause damage to our system.

Technology is advancing every day, and technology is transforming the world. It is impossible to imagine a world without electronic devices. Invaders, hackers, and thieves are using this technology to try to compromise our computer security. They do so for ransom demands, monetary gain, recognition purposes, bullying others, and invading other businesses, organizations, or even personal privacy. Computer security is essential to safeguard our system against all these threats.

Different Types Of Computer Security

There are four types of computer security:

1. Cyber Security:

  • Cyber security is the protection of computers, electronic devices, and networks, as well as programs and systems, from cyber attacks. Cyber attacks are attacks that can occur when our system connects to the Internet.

2. Information Security:

  • Information security is the protection of our system’s data from theft, illegal usage, and piracy. Information security has three main objectives:
    • Confidentiality
    • Integrity
    • Availability

3. Application Security:

  • This refers to protecting our applications and data from hackers. The databases of these applications must also be kept private and secure for the owner so that users’ data is protected.

4. Network Security:

  • Network security is the protection of a network’s data and information. Hackers can steal packets of data from networks by using spoofing, man-in-the-middle attacks, wardriving, etc., and then misuse them for their own purposes.

Cyberattacks Types

1. Denial-of-service attack (or DOS):

  • This is a type of cyber attack that causes disruption to the network’s services by sending innumerable requests, temporarily or permanently making it or its resources unavailable to the intended audience.

2. Backdoor:

  • Malware, trojan horses, or viruses can be installed into your system through a backdoor attack. This will affect the security of the files as well. Let’s say you download free software from an online site. Unknowingly, this software comes with a malicious file. Once you run the downloaded software, it starts to affect your computer security. This is called a “backdoor”.

3. Eavesdropping:

  • Eavesdropping is listening to conversations without permission. Hackers attempt to steal, modify, alter, or hack information or systems. They passively listen to network communications and know passwords. One physical example is if you talk to someone in your company and that person listens in on your private conversations, then they can be said to have eavesdropped on your conversation. If your internet connection is not secure, attackers could listen to your private conversations and connect to your network to intercept them.

4. Phishing:

  • Phishing can be pronounced “fishing”, and the working function is very similar. We catch fish by baiting them. In phishing, an attacker tricks a user into trusting him or acting as if the victim is real. The attacker then steals the information. There are a few websites that appear to be legitimate, but they are actually fraud sites. These websites trick users into giving out personal information, such as their login details, bank details, or card number. Phishing comes in many forms: voice phishing, text phishing, and others.

5. Spoofing:

  • Spoofing This is the act of pretending to be a valid entity by falsifying data (such as an IP address, or username), to gain access or resources one is not authorized to have. There are many types of spoofing: email spoofing and IP address spoofing; MAC spoofing; biometric spoofing; etc.

6. Malware:

  • The word Malware is made by combining the words Malicious and Software to make Malware. Malware is software that intrudes on the system and is intended to cause damage to our computers. There are many types of malware, including spyware, ransomware, and Trojan horses.

7. Social Engineering:

  • This is a psychological attack that involves manipulating people and extracting sensitive or confidential data from them. The attacker usually relies on the cognitive basis of users or people to gain their trust.

8. Polymorphic Attacks:

  • Poly is a combination of (poly) “many” and (morph) “form”. Polymorphic attacks involve attackers who adopt multiple forms and alter them so they are difficult to recognize. These types of attacks can be difficult to spot because they change their forms.

How To Protect Your Computer From Hackers

To protect your system against the mentioned attacks, you should take steps to secure your system.

  1. Keep your Operating System current. It reduces the chance of it being attacked by viruses and malware.
  2. Use a secure network connection. Always connect to a secured network. Avoid public wi-fi and unsecure networks as they can be attacked by an attacker.
  3. Install an Antivirus program and make sure it is up-to-date. Antivirus software scans your computer for viruses and isolates infected files from other system files to ensure that they are not affected. Paid anti-viruses are better because they offer greater security.
  4. Turn on the firewall. A firewall is a system that prevents unauthorized access to/from computers or to private networks of computers. You can have a firewall in either hardware, software, or both.
  5. Use strong passwords. Strong passwords are essential for social media accounts. Use different passwords for each account so they can’t be key logged, brute force, or easily detected using dictionary attacks. A strong password has 16 characters that are a combination of upper and lowercase alphabets, numbers, and special characters. You should also change your passwords frequently.
  6. Do not trust people easily. It is impossible to know the intentions of someone so don’t be tempted to trust them and give your personal information. It is impossible to predict how someone will use your data.
  7. Keep your personal information hidden. Keep your personal information private on social media. You don’t know who might be spying on your activities. We try to avoid speaking to strangers or sharing any information with them, just like in the real world. Social media can also be used to communicate with people you don’t know. If you post all of your information, you could end up in trouble.
  8. Do not download attachments sent with emails until you are certain that the source is genuine. These attachments often contain malware that can infect your computer or cause harm.
  9. Do not buy anything online unless you are sure of the source. Be sure to shop only on a trusted website when you go online. Multiple fraud websites can steal your card information and make you bankrupt.
  10. Computer security and ethics are important topics. It is important to be aware of safe computing practices and ethical issues in the computing industry. It is important to have the right knowledge in order to reduce cybercrime.
  11. Notify the cyber cell immediately if you are attacked. They will take the appropriate actions and protect other people from being attacked by the same person. Do not be afraid to complain if you feel that people are having fun at your expense.
  12. Do not use pirated content. People often try to download pirated videos, movies, or web series to get them free. Pirated content is at risk of infecting your computer with viruses, trojans, or malware.

If your computer has been hacked and you need assistance in getting it working again, please contact our shop right away.