When a device connects to a network and begins communicating with other computers, it is essentially taking a risk. Internet security involves the protection of a device's internet account and files from intrusion of an unknown user. Some apparently useful programs also contain features with hidden malicious intent. Such programs are known as Malware, Viruses, Trojans, Worms, Spyware and Bots.
Malware is the most general name for any malicious software designed for example to infiltrate, spy on or damage a computer or other programmable device or system of sufficient complexity, such as a home or office computer system, network, mobile phone, PDA, automated device or robot.
Viruses are programs which are able to replicate their structure or effect by integrating themselves or references to themselves into existing files or structures on a penetrated device. They usually also have a malicious or humorous payload designed to threaten or modify the actions or data of the host device or system without consent. For example by deleting, corrupting or otherwise hiding information from its owner.
Trojans (Trojan Horses) are programs which may pretend to do one thing, but in reality steal information, alter it or cause other problems on a system such as a computer or programmable device. One of the most insidious types of Trojan horse is a program that claims to rid a device of viruses but instead introduces viruses onto the device. Trojans may also allow a hacker remote access to your system.
Spyware includes programs that surreptitiously monitor keystrokes, or other activity from your device, and report that information to others without consent.
Worms are programs which are able to replicate themselves over a (possibly extensive) computer network, and also perform malicious acts that may ultimately affect a whole society/economy.
Bots are programs that take over and use the resources of a computer system over a network without consent, and communicate those results to others who may control the Bots.
The above concepts overlap and they can obviously be combined. The terminology, along with the dangers involved, are constantly evolving. Antivirus programs and Internet security programs are useful in protecting a computer or programmable device/system from malware.
Create Strong Passwords
Strong passwords are important for protecting your online transactions. A strong password is a password that is virtually impossible for a hacker to figure out or crack using brute force methods. A good, strong, password should consist of many, if not all of the following:
* Add length with symbols - Put a symbol at the end.
* Add length with punctuation - Put a punctuation mark at the beginning.
* Add length with numbers - Put two numbers that are meaningful to you between the sentences.
* Add complexity - Make only the letters in the first half of the alphabet uppercase.
Protect your passwords from prying eyes! The easiest way to "remember" passwords is to write them down. It is okay to write passwords down, but keep them secure.
Cyber criminals use sophisticated tools that can rapidly decipher passwords!
Avoid creating passwords using:
Dictionary words or phrases in any language.
Words spelled backwards, common misspellings, and abbreviations.
Sequences or repeated characters (eg 1234, 222, abcd, or adjacent letters (qwerty).
Personal information - Your name, birthday, driver's license, or similar information.
For those that can not afford expensive personal computer security subscriptions [Free PC Security Software!] should provide you with sufficient protection against intrusion and unauthorized use of your resources.