Defensive computing (“protection of the computer”) (from the English - “protective computing”) is a form of user interaction with the computer that can reduce the risk of problems associated with its performance. The main objective of this method is that, despite any adverse operating conditions of the computer system or any errors made by users, the system is in a state of expectation and preparedness for possible problematic situations until they occur. This can be achieved through a commitment to a variety of general guidelines, as well as the application of certain computer technologies.
Computer protection strategies can be divided into categories: network security and data backup and recovery .
Content
Network Security
When accessing the Internet and other networks , users endanger their computers. Using any of these connections allows other users to access his system and important information. Users seek to reduce the risk associated with access to their network by applying certain strategies.
Firewall
A firewall is a set of security measures that protects a computer from malicious incoming and outgoing traffic on the Internet and prevents unauthorized access to a computer system. [1] These security measures are combined in the form of special software that works autonomously on separate computer systems, or externally, through software in routers and modems .
The firewall will not protect your computer from all transmitted harmful or unauthorized incoming traffic. The purpose of protecting your computer is to find and use a quality firewall that filters both inbound and outbound traffic. [2]
Antimalware Software
The main way computer protection is undertaken by most users is to install and use anti-malware software. Firewalls cannot fully protect your computer. Some malware may go through the firewall and infiltrate the system. Anti-malware software, such as anti-virus , anti-phishing, and email filtering software, provides some protection against malicious software that resides on the computer. The total amount of malware located on the Internet is constantly increasing. [3] It is important for users to use anti-malware software that is easily and efficiently updated to combat new types of malware. [2]
Skepticism
A skeptical attitude to the data that a user receives over the Internet is an important aspect of computer protection. [4] Malicious software can exist in many different forms, and many of them mislead users and even some anti-malware software. Protecting users are seriously thinking about the information they want to access in order to reduce the ability to download and distribute malware. Protection includes scanning email applications before opening them and manually filtering incoming emails from suspicious mailboxes. Users should know the subject and headings of emails from any recipients, as they may actually contain malware or spam . Spam can mislead users with false advertising, which leads to identity theft. [2] Users can scan files that they download before opening them. Also, configure your computers to show the extension of potentially dangerous files that appear to be safe. [4] Skepticism also needs to be given to websites visited by users. As with emails, false advertisements can attract users. In addition, malware can be downloaded to a computer after visiting a website and infect it without the knowledge of the user.
Backup and Restore Procedures
Despite the user's efforts to protect the computer, the loss of important data can occur not only due to malware, but also due to power outages, hardware failure, and general misuse. Despite the fact that data loss cannot be completely prevented, users can take measures to minimize the amount of lost data and restore the system to its original state.
Recovery
Some operating systems have the ability to restore a computer to a certain state. If this option is not available, the user can get the appropriate system recovery software. The user can recover any lost or modified files in the event of a system failure or serious data loss, and delete any malicious files that were not previously. [five]
File Backup
Regularly backing up important files is the main way to protect against inadvertent data loss. Users can make multiple copies of important data and store it either on the same computer or on another device, such as a CD or external hard drive. [5] Users can also upload important files to the Internet if they have access to online storage services.
Ways to protect data
- Copy important files, documents, and emails regularly.
- Do not use an administrator account for everyday activities.
- Update software, antiviruses with the advent of new versions.
- Use different passwords.
- Disable the auto run option on USB flash drives. Some viruses, especially worms , spread automatically through USB sticks. [6]
- Always connect to the Internet through a firewall.
- When in doubt, do not take action on the file.
See also
- Phishing
- Computer program
- Software
- Skepticism
- Computer worm
- Computer security
- Air gap
Notes
- ↑ http://www.cs.unm.edu/~treport/tr/02-12/firewall.pdf , A History and Survey of Network Firewalls
- ↑ 1 2 3 https://www.cnet.com/news/the-pillars-of-defensive-computing/ , The Pillars of Defensive Computing
- ↑ https://www.washingtonpost.com/wp-dyn/content/article/2008/03/19/AR2008031901439.html , Antivirus Firms Scrambling to Keep Up
- ↑ 1 2 http://www.melbpc.org.au/pcupdate/2206/2206article6.htm Archived on July 24, 2006. , How To Protect Yourself From Virus Infection
- ↑ 1 2 https://www.microsoft.com/en-us/security/default.aspx , How to Decide what Data to Back Up
- ↑ http://news.cnet.com/8301-13554_3-10027754-33.html , Be safer than NASA: Disable autorun
Links
- Defensive Computing Blog by Michael Horowitz at ComputerWorld.com
- Defensive computing priorities by Michael Horowitz December 2009