Sunday, 14 August 2016

Cyber security and web protection



Cyber security and web protection w3workers
Cyber security and web protection
Cyber security 

Cyber security term is used to make data secure from unauthorized access.

Information technology is growing everyday globally and most useful information related to government, banking, online sellers, social media, payment gateways etc all are stored in servers to access confidential data from these servers needed some authentication process to make sure that information on server is accessed by authorized agencies and individuals.


Cyber attacks and malicious software

 Malicious software are the software that are designed  intentionally  to harm your data.
 they are commonly know as malware

 1. Computer viruses:

A virus is a program that can  infect other program by modifying them. the modification includes a copy of the virus program which can then go on to infect other programs.

Types of computer  viruses:
  • Boot sector virus:
A virus that infects the boot record on hard drives.
  • Macro virus 
A virus that infects documents using application specific macro languages.
  •  Companion viruses:
The virus keep the name of program that is supposed to run. so it gives an illusion  to wiser that original program is running, but it infected the original program is excuted after excution of virus that has same 'program name but different extension'.
For Example:  ".exe" file to ".com".
  •  Execution program viruses:
Executable virus  make changes in executable program by just inserting its codes with them.
  •   Memory resident viruses:
As its  name  emphasize it is a virus that resides in memory all the time .
For Example: An intelligent  memory  resident virus can modify the data from operating system RAM.

Working of viruses
 
After becoming active in the memory virus start monitoring different activities of the system ,such as the disk read /write operation.never press the CTRL+ALT+DEL key combination to reboot a virus defected system , many time  this key combination makes the virus active .
 
List of common computer viruses
 
   1. Bad Boys.
   2. Boot Killers.
   3. Dark Avenger.
   4. Friday 13th.
   5. One Half.
   6. Ping Pong.
  
2. Worm viruses:

worm means ( write one read many)computer worm is a standalone malware computer program that replicates itself in order to spread to other computers. Often, it uses a computer network to spread itself, relying on security failures on the target computer to access it. Unlike a computer virus,
it does not need to attach itself to an existing program.

Worms normally move around and infect other machines through computer networks. Using a network, a worm can expand from a single copy incredibly quickly. The Code Red worm replicated itself more than 250,000 times in approximately .Worms normally move around and infect other machines through computer netwoWorms normally move around and infect other machines through computer networks.

 The Code Red worm had instructions to do three things:

  • Replicate itself for the first 20 days of each month
  • Replace Web pages on infected servers with a page featuring the message "Hacked by Chinese"
  • Launch a concerted attack on the White House Web site in an attempt to overwhelm it.


3. Trojan horses

 How Do Computers Get Trojan Horses?

 Most trojans are introduced through careless downloading: email or instant messenger attachments   and peer-to-peer files are common culprits. The user clicks on a file, not noting that it has an .exe or other executable file suffix.The program loads and takes root, slowly weeding through the operating system and software.

Some trojans are so advanced that they can tap into an address book, email each person, and attach itself to the outgoing mail.

Trojans can also transmit through networks, especially ones that don't have effective firewall or anti-virus protection. If one trojan is opened from several terminals, the infestation can quickly spread to servers and critical files. From there, thieves can remotely download client credit card information.
Several security breaches with thousands of compromised names have made headlines in the last few years alone.

Cyber security:

Tips to combat viruses, Worms and Trojan Horses on Your Computer

1. Keep the operating system updated

The first step in protecting your computer from any malicious there is to ensure that your operating system (OS) is up-to-date.
This is essential if you are running a Microsoft Windows OS. Secondly, you need to have anti-virus software installed on your system and ensure you download updates frequently to ensure your software has the latest fixes for new viruses, worms, and Trojan horses.
Additionally, you want to make sure your anti-virus program has the capability to scan e-mail and files as they are downloaded from the Internet, and you also need to run full disk scans periodically. This will help prevent malicious programs from even reaching your computer.

2. Use a firewall

You should also install a firewall. A firewall is a system that prevents unauthorized use and access to your computer.
A firewall can be either hardware or software. Hardware firewalls provide a strong degree of protection from most forms of attack coming from the outside world and can be purchased as a stand-alone product or in broadband routers. Unfortunately, when battling viruses, worms and Trojans,
a hardware firewall may be less effective than a software firewall, as it could possibly ignore embedded worms in out going e-mails and see this as regular network traffic.

For individual home users, the most popular firewall choice is a software firewall.  A good software firewall will protect your computer from outside attempts to control or gain access your computer, and usually provides additional protection against the most common Trojan programs or e-mail worms. The downside to software firewalls is that they will only protect the computer they are installed on, not a network.

3. Keep viruses away

1. do not use pirated software.
2. get software from reputed companies.
3. run virus scanner.
4. always keep current version of antivirus software.  


4. List of few Anti-viruses 

1. McAfee
2. Quick Heal
3. Norton
4. AVG
5. K7 total security


Thanks for reading if you have any question add in comments section.