The information age, translated into the exponential use of the Internet to do countless daily things, has brought great advances to humanity, which has led to the improvement of the standard of living of many people worldwide. Let’s get to know these computer security standards , below. Computer Security Standards
Computer Security Standards
If we do not abide by computer security regulations on the network that are designed to protect the storage, processing and transmission of digital information, we will face serious difficulties. There are many drawbacks to which the netizen or user would be exposed if they do not comply with the guidelines that were created for the use of the networks. Computer Security Standards
Basically, all the technological tools that we use today and that contribute to the well-being of society, represent a sample of the computer science advances that have been taking place in recent decades. The services that we have today, such as financial, labor, health, online education, among others, are based on computer systems that use computers with hardware and software connected to each other. In turn, interconnected with customers through communication networks.
Although the world of technology is great, it is still, in some way, vulnerable to attacks or sabotage by unscrupulous people for dark and unknown ends. Nor is it exempt from suffering failures that expose our data and systems. To prevent the risk of being attacked, it is important that we know a little more about them.
Types of computer attacks
The user of networks and computer systems must keep informed of new trends in the use of these apartments and services. There are many aspects that must be taken into account for optimal use of networks and the internet in general if it is applied for work and responsibility and quality are sought. Let’s see below what are the types of computer attacks that can be evaluated or presented in the computer security regulations.
In this case, what happens is that a cut appears in the service that is being used. We can put as an example when the web says it is not available, among others.
The attacker manages to access our communications and copies the information that we were transmitting. In the task manager article you can find some useful tools.
The attacker modifies the information, which may be rendered useless. At other times, it can even eliminate it altogether. This type of attack is considered the most harmful due to the loss of information that it entails.
The attacker pretends to be the transmitter of the information and appropriates our communication, obtaining valuable information fraudulently.
Therefore, in order to prevent or avoid such damage, ensure the privacy of information, and avoid computer fraud and information theft, it is important that we follow the computer security regulations detailed below:
1. First of all, we must start with local security: our PC is the first thing we must take care of.
Generally, we store data and information on the hard drive of our PC, which we use on a daily basis. Well if it is for private use in our homes or in our work, no one else has access, but us.
Starting from the assumption that we have a fixed or portable PC with the latest advances such as Wi-Fi, infrared port, bluetooth port, USB ports and Internet connection via internal network or via modem, we must recognize that the possibilities that we suffer an attack on our information are higher than we want, since if these devices are permanently open and operational, it is not difficult for someone to have access to it.
For example, if we are in our office, where there are usually computers arranged in a certain proximity, and one of the devices is operating simultaneously on both PCs, it is very easy for them to tune in and be willing to communicate between the two. Therefore, it is highly recommended that all these types of devices are normally closed and inoperative, and are only enabled when necessary, always taking due precautions.
2. Users and passwords are other important aspects to consider when we talk about taking care of data or elements that we have on the network, since 90% of computer attacks come from them. There are programs specially designed to access our information through through the usurpation of our users and passwords.
These consist of testing words that are in a dictionary until they match ours, that is, they explore all possible combinations of words in order to find the ones they are looking for.
Preventing this type of attack is quite simple if the following computer security rule is followed: choose words that are not in the dictionary, that is, that do not have any type of meaning, that are long enough and that are, preferably, accompanied by symbols and characters, such as ^ and &. Similarly, you need to change passwords frequently.
We prevent this type of attack by preventing the password that we enter in a web page from being remembered every time it is visited, since this makes it easier for any intruder to enter that page directly with our identity and privileges.
3. Within the field of computing, there are certain protocols that allow information to be shared via the Internet. One of them is NetBios, through which files and printers are shared.
Few people pay attention to this protocol, but it is important to know that unless we are on an Intranet or Extranet, it does not need to be enabled. If we take this security measure, we will prevent inadvertently sharing files on our disk.
In Windows XP it is quite easy to disable it.
How do we do it?
Control Panel> Network Connections> Network File and Printer Sharing. Disabling it does not affect other users, since these are individual, but it must be clarified that, by removing it, you can continue to share files if workgroups and domains are created. Finally, in the event that NetBios is open, using a password prevents intrusion from being so easy.
4. Emails are another of the main causes why, even with the existence of advances from the information age, computer attacks continue to occur.
This is due, firstly, to the famous secret question-answer. We must not forget that, many times, the attack comes from people close to us, who know many of our details, and for whom it is relatively easy to guess our response.
On the other hand, it is important to note that there are two types of mail: POP mail and Web mail. POP is downloaded to your hard drive, and the Web is viewed over the Internet, making it more susceptible to intrusion from outsiders. Between the two, it is the most widely used.
Regardless of what type of email we are using, it is necessary that we analyze all the files received, even before opening them, and even if they come from someone we know. Viruses use the contact directory to send replicas and thus infect a larger number of users.
In addition, all those emails that are suspicious, if we do not know the sender or contain a subject that can be classified as spam (or impersonation), we must send them to the trash available in our email. At the end, let’s not forget to empty the trash
Finally, although it sounds repetitive, it is best to avoid the use of simple and common passwords to enter our mail, as well as to prevent possible identity theft by recognizing our answers to secret questions.
Learn more computer security regulations!
5. It is also recommended to use antispam filters, which check incoming email addresses with others that are on the spammers list, and if they match, block them, thus preventing unwanted files from being downloaded to our PC.
There are many antispam programs on the market, most of them work well. Also, their main advantage is that using them is faster than blocking the sender.
6. On the other hand, it is important that every time we see a suspicious file, we scan it to pass it through the antivirus. This is a computer program specifically designed to detect and remove viruses.
Of course, for the antivirus to work it needs to be active and up-to-date. Many viruses stop antivirus programs and leave our computer defenseless against other attacks. In addition, new viruses appear every day and in order to protect ourselves from them, our antivirus needs to know the signature, that is, the characteristics of those viruses.
Additionally, it is advisable to program the antivirus so that it periodically checks all the contents of the PC.
7. If we use USB devices to store or transmit information to and from our computer, we must not forget to scan it through an antivirus program that meets the conditions described above. These small, but very useful technological tools tend to easily infect our PCs.
What other computer security standards should we follow?
8. There are also so-called Trojans, malicious code programs that serve as a bridge between the attacker’s PC and our computer.
Antiviruses often fail to detect this type of attack, which is why it is essential to have another defense mechanism, such as firewalls. These constitute a kind of virtual wall between the computer and the network.
A firewall is software designed to block unauthorized communication inputs to our computer, while restricting the output of information, thus guaranteeing the security of our communications via the Internet.
Installing this type of software is necessary, especially if we have a permanent connection to the Internet and our IP address is fixed.
9. In addition, it is essential that we pay attention to the completions of the files that we receive.
Malignant files with endings such as: .exe,: com, .pif, .bat, .scr, .info are very frequent, which cause damage to both data and equipment, in some cases, irreparable. Nor should we open files with a double extension, such as: .txt.ybs. However, under normal conditions, we never need these types of files.
Find out how!
We can do this by clicking the Start button> Control Panel> Appearance and Personalization> Folder Options> View> Advanced Settings, and finally you can uncheck a box that says: Hide file extensions for known file types.
10. IP address and privacy can also be a risk factor within the network.
The IP is randomly assigned by the network access provider, and acts as the identity document of the PC. Generally, those who carry out cyber attacks begin by tracking that address.
There are two types of IP address: static or fixed, and dynamic. The former come from a server that takes us to the corresponding web through DNS, while the latter do so through modems. Dynamic IPs change every time we connect, which makes them more secure compared to fixed IPs.
However, the main disadvantage of a dynamic IP, generated by a traditional modem, by impulses or a telephone line, is that it can come with programs that divert the Internet connection through special rate numbers, which increases the cost of the normal connection. Computer Security Standards
In these cases, it is best to hide the IP through proxies or anonymous browsing websites, which provide a safer way to surf the net. Computer Security Standards
Update all your programs
11. Security patches are updates that software manufacturers make available to us, in order to help us correct certain vulnerabilities observed in the most widely used computer programs. Among them we can mention Internet browsers, word processors, mail programs, etc. Computer Security Standards
These vulnerabilities are generally easy targets for computer virus writers. Hence the importance of frequently updating our applications, through the use of these security patches.
12. Another way to prevent computer attacks through the network is to always ensure that we install only legal software from known and safe sources on our computer.
So-called pirated programs or applications are a major source of virus spread. In addition, they represent a violation of the law, they represent a violation of the law Computer Security Standards
You should also avoid downloading free files from unknown websites, as these are often a potential source of virus spread. If we do, we must make sure to scan these files with an antivirus program. Computer Security Standards
13. At all costs we must avoid entering suspicious links or links of dubious origin, whether they come from emails, chat windows or messages from social networks, any of which serve as screens for malicious intrusions. Computer Security Standards
Let’s not forget that it is our responsibility to also protect our social networks, and the content we publish on them.
14. Another important risk factor is the websites of dubious reputation, as they tend to promote advertising in a deceptive way, which fills our computer with useless information. They are also an important source of virus spread in computer security regulations.
Beware of instant messaging
15. The computer security regulations tell you that both on instant messaging sites and on social networks, we must only accept known contacts. This way we avoid intrusions by strangers who can access our personal information and become computer threats.
16. If at any time we are asked to fill in sensitive personal information, in forms from websites, it is advisable to first verify the legitimacy of the site. This can be done by checking the domain of the page and the use of the HTTPS protocol of the same. Computer Security Standards
17. Finally, one of the easiest recommendations to follow is to make backup copies every so often.
In this way, in the event of a virus attack or intrusion, the loss of information will be much less, since we can restore it quickly and reliably. Computer Security Standards
Sometimes, as much as we try to protect ourselves from cyber attacks, this is not entirely possible. Therefore, it is important that we learn to recognize if our computer is infected by viruses.
Symptoms of virus infection
Here are the main symptoms:
- The computer is slow. Although the slowness of computer equipment can be due to various factors, one of the main reasons is that it has acquired viruses or virtual threats. The execution of the tasks entrusted by the virus makes the PC work slower than normal because it requires more resources than usual. Computer Security Standards
- Applications are not responding or programs have stopped working. It is due to the direct attack of some malware on certain applications or programs, which prevents their normal operation.
- Internet connection fails. When the Internet is slow or does not connect, it may be because some malware is connected to a URL, or is opening separate connection sessions, thus reducing the available bandwidth for the computer.
- Unsolicited windows or pages open when there is an Internet connection. Some viruses have the main function of redirecting Web pages, without the user’s will, to others that are replicas of legal pages. Computer Security Standards
- Personal files disappear. The loss of information or the involuntary movement of files or documents from one place to another are a clear sign that our PC is infected by viruses.
- The antivirus is uninstalled and the firewall disappears. When all the security systems that had been installed are disconnected for no other apparent reason, without a doubt, our team contracted one or more viruses.
- The language changes. When the language of programs or applications installed on our computer changes, without us having done something to make it happen, it is a clear sign of virus infection.
- One last and final sign that our computer has contracted a virus is simply when it begins to act on its own.
What to do if our PC has been infected by a virus?
In computer security regulations we explain that the first thing to do is verify that the antivirus program is active and up-to-date, and proceed to run the comprehensive analysis of the PC that we have. If this does not remove the infection, we should try a third-party program. Computer Security Standards
If, even having used a second program to disinfect our equipment, we still have the virus active, we must definitely remove the Internet connection, either by disconnecting the cable or turning off the device that provides Wi-Fi.
After this, it is advisable to find the location of the infected file. This can be a complex or quite simple task, depending on the degree of complexity of the malware and the methods used to encrypt the malicious code. Computer Security Standards
If it is a low complexity virus, it is most likely that we can identify and find it ourselves. Since most of this type of malware seeks to take control of the system startup, we must look for it in an autorun folder in Windows, or find the link to it in the automatic execution keys of the Windows registry.
After finding the infected file, we must write down its name, as we will need it for subsequent analyzes.
Finally, we can consult with the specialized technical service about the virus that we find, or we can participate in specialized forums on this matter, in order to seek advice and help on this matter. Similarly, we can search the Internet for relevant information about the virus, where we will surely learn how to eliminate it.
Evolution of computer security
Unfortunately, there has not always been a real concern about adhering to computer security standards on the network. As can be seen throughout its evolution, in the early years the value of information was unknown. Therefore, the security measures were inadequate and practically nil. Computer Security Standards
Later, in the 1980s, realizing that few computer security measures were available, the sale of antivirus began. Ten years later, there was the rise of the Internet, which led to greater problems with the handling of information. It was at this time that it became common to store information on removable devices.
Later, with the arrival of the year 2000, computer attacks also arrived. With the massification of social networks, more ferocious attacks began to take place against all kinds of information, including online fraud.
Finally, at present, there has been a lot of awareness in this regard, and excellent measures are being taken in security management. Among them, the existence of legislation on the protection of information. As well as, greater control related to information privacy, and the use of information encryption tools.
As the experts say: information is power! Therefore, it is necessary to take care of it and protect it, of course, each one from their possibilities and particularities.
Let’s not forget that: Computer Security Standards
- Our conversations are personal. Outsiders shouldn’t be able to hear them.
- Our messages are private. Only we should have access to them.
- Our personal information belongs only to us.
- A purchase is of interest only to the seller and the buyer.
- Companies must take care of their image, preventing attacks by which other people deceive their customers and users.