Search for:

Posted on March 12th, 2013, by

The Internet transformed a way of communication, but also created various threats towards the security of the computer users. Hackers are constantly carrying out attacks on unprotected computers to get any useful information contained on them. An unprotected computer is kept under constant threats of attacks carried out by malware (malicious software), and especially spyware (spyware software).

That is why protecting your computer and confidential information is one that it should be taken very seriously.
Thus, this paper introduces online security. It presents the definition of online security and the measures necessary to ensure the security of the computer systems.
To start with, online security is a set of computer security particularly connected with the Internet.

Its main purposes are to establish various measures and rules in order to use them against different attacks via the Internet. “Internet-connected computers that are hacked can be turned into “zombies,”¯ which are used to launch further attacks. Tight firewalls and up-to-date antivirus programs will help keep you safe”¯ (“The Biggest Online Threats,”¯ 2007).
Measures necessary to ensure the security of the computer systems include the following ones:

1. Antivirus software;
Do not forget to install antivirus software. It will help prevent Internet attacks, and protect against various viruses and worms. The program will scan your system. In case of viruses or worms, it will remove them. It is recommended to conduct a full system scan at least once a week. In most such programs, there is also a function of automatic scanning, all you need for this, select a specific day and time.

2. Firewall;
Firewall is a ring of security around your data and applications installed on your system. A firewall creates a line of protection for your system and blocks unauthorized access to your computer. The installation of a firewall is an important fact in security for any connection: dial-up, broadband or wireless network.

3. Do not open any files attached to emails;
Hackers and malware developers often use e-mail for the distribution of different viruses. They attach some application to a message, revealing that you activate the virus. This virus gets into your system and causes harm. In particular, such viruses steal addresses from your contact book e-mail. This system is used by spammers to send promotional advertisements. Therefore, it is not recommended to open attachments that are attached to an email. Otherwise, check your application for the virus or worm. If found, remove immediately with a letter and put a sender on a blacklist.

4. Backup data;
It is recommended to create a backup copy of computer data stored on the hard drive of your computer daily or even weekly. In case of data loss, you will be able to use a backup copy without any problem and restore them to continue their work.

5. Software upgrade;
Developers of software applications, as well as various anti-virus programs, often find loopholes in the security of their programs. To block these errors (also called bugs), they release updates for their programs. These updates are important because they contain not only the security fixes, but also an updated anti-virus database. Therefore, it is advisable to periodically check updates up for installed programs.

6. Free software;
Do not trust sites that offer free software download. In most cases, these programs contain adware. Once you install the so-called “free”¯ software, you will start to appear different windows with advertising or this program will monitor your online activities to learn what sites you visit or what products you prefer to purchase. After that, this “free”¯ software will send this information to their developers.

In addition, it is very important to use secure passwords. “People tend to use the same one or two passwords for everything related to their job-to turn on laptops, access online databases, access critical functions,”¯ says Ms. Ross of the Nonprofit Technology Network. “That’s a big vulnerability”¯ (Blum, 2010).

Taking the above-stated information into account, it is possible to conclude that it is necessary to conduct preventative security measures in order to prevent your computer against unauthorized computer access. Performing them, you can save yourself from unnecessary problems.











Blum, D. E. (2010). A San Francisco Technology Charity Gets a Lesson in Online Security. Chronicle of Philanthropy, 22 (7), T-2.
The Biggest Online Threats. (2007, December 10). Time, 170 (24), 22-23.

Posted in Term paper writing | Tagged | Leave a comment

Leave a comment

Your email address will not be published. Required fields are marked *