Internet Security: Basic Rules

What kind of issues does Internet security form? Perhaps the intrigues of hackers are just spectacular shots from a movie, but in reality the network space is not as hostile as they are trying to inspire us with blockbuster scripts? When should Internet safety rules be followed especially carefully?

Hackers Online

The reality is that hackers do not sleep. Their interest is fueled, first of all, by the still growing commercialization of virtual space. People use virtual bank accounts, pay for purchases with credit cards, and exchange currency. Security of payments on the Internet is a very relevant aspect.

Internet security

Of course, there is a significant percentage of hackers acting on the basis of personal ambitions, in order to prove to themselves or friends - here, I’ll definitely hack this e-mail. When it comes to the hacking industry, there are segments related to business wars. Talents of “crackers” are used by corporations in order, for example, to take hold of the secrets of competitors.

However, even ordinary users who are far from big business may be uncomfortable due to the fact that Internet security problems are very relevant now. And this is not necessary due to the risk of losing control of financial transactions. This can be expressed, in particular, in the fact that a hacker can turn another user's PC into a hotbed of aggressive advertising or gain access to his confidential personal data. All this, of course, is unpleasant.

How to increase safety on the Internet? We’ll talk about this today.

Hacker toolkit

But first, consider what tools hackers endanger the security of the Internet for users. Among the main ones are the same ones that have been used for many years. These are viruses, trojans, various kinds of "spyware" software. Using various kinds of malicious codes, a hacker can, firstly, take possession of the user logins and passwords for e-mail, bank client, credit card information, etc.

Internet Safety Rules

In general, the security of personal data on the Internet is one of the most relevant due to the incredibly high activity of crackers engaged, as a rule, financially. There are, of course, other areas of interest to hackers. As we said above - this is personal data. But almost always it comes down to extracting some financial benefit - through advertising, as an option, mechanisms.

Now let’s look at the channels through which viruses infect PCs or Trojans, or directly gain access to personal data through logins and passwords. In what aspects of using a computer and the Internet should PC owners be especially careful?

I hear from the impostor

One of the most commonly used methods by hackers to gain access to PC passwords and resources is to contact users on behalf of a well-known Internet service, blog, postal service, bank, trading network or even provider. An attacker, as a rule, writes a letter drawn up in extremely diplomatic form, where he asks for a “confirmation of identity” or under another plausible excuse to indicate a username and password. Externally, an e-mail message in terms of design can be hung with real logos of the resource that the hacker declares to belong to. And the domain used in the email address can be very similar to the original one.

Internet payment security

In addition to this method, one is used in which there is no request in the letter to indicate the username and password, but there is a polite request to follow the link for the purpose of the same "confirmation of identity". In a similar way, advertising messages can come in of an enticing nature. Of course, all of them are a threat to Internet security. It is impossible to respond to such appeals. By clicking on the link, the user will almost certainly download malicious code, the purpose of which can be very different, as a rule - transferring files with logins and passwords from a computer.

Resist the temptation

Hackers may use a different scenario. Technologically, it is somewhat similar to the method of applying links to "confirmation". However, the long-awaited click is made by the user not because of the inviting appeal to e-mail, but because of the temptation to study an interesting advertising offer that popped up on the screen, or, which is also common, an offer from some elegant lady to "get to know better" by means of someone who came up from screen window. Click - and the user downloads a virus to his PC. Therefore, Internet safety techniques based on immunity to such temptations are the most important factor in the safety of personal data.

Free cheese

The Internet is often used as a free channel for watching movies, clips, downloading programs. Even in cases where the original version of the media or application is commercial, the user, nevertheless, is looking for a site where you can get access to films and distributions of programs for free. It is worth noting that a few years ago such resources were present on the Internet in large numbers, and on them it was really possible to find a distribution of expensive software with a free key or activator as a gift. The same thing with movies.

Internet security measures

Today the situation has changed. Russian legislation has been tightened in terms of control over pirated IT versions of products and films, and mechanisms have been improved by which providers can detect portals that contain unauthorized copies of programs and media files. A lot is being done to increase user security. And anonymity on the Internet is minimized - to stop attempts to upload pirated content.

If before there were no problems finding a pirated version of the blockbuster even before it was released on cinema screens, today even after a few months have passed since the release of the film, it can be very difficult to find a portal where it would be uploaded for free. Internet security is now actually at the state level. Actually, what does this mean?

With a high probability - that even if the user manages to find a site where there is a pirated version of the desired movie, the files to be downloaded will be infected with viruses. The logic is simple. If such a site operated without violating Internet security (that is, specializing, as it was several years ago, in the distribution of unlicensed content), the hosting provider would have calculated and blocked it a long time ago.

How to ensure internet security

Today’s users should forget that on the Internet today is a “free” cheese. And therefore, do not trust or check portals that seem to have a free copy of your favorite movie. Moreover, now there are many options in order to view or even download the legal version of media inexpensively, at least cheaper than going to the movies. As for the programs - most commercial applications today usually have more than one competitive free alternative.

Gift from a friend

Of course, the option to catch a virus or trojan exists not only thanks to virtual channels. It often happens that a user complies with the above Internet security rules strictly, but his computer is somehow inexplicably infected with malicious code. The most likely reason for this is that the virus inadvertently brought a friend to a flash drive. Or, using the media to print text or photographs in the cabin, the user inadvertently "caught" the virus from there.

Internet privacy

In this case, it’s really hard to predict whether there is a surprise of this kind on the USB flash drive brought upon the fact of using it on another PC. Therefore, the user needs to possess the skills of not only passive protection against threats (in the form of avoiding contact with suspicious online content), but also some active tools. Which ones?

Antiviruses

The most necessary type of software in this case is antiviruses. This type of IT-products is now relevant as never before. It is extremely undesirable to use a modern computer without a pre-installed good antivirus. What are the quality criteria for this kind of application? Experts prefer to pay attention to what the market is talking about. It, unlike many other segments, in this case is far from monopolistic trends: the competition between IT companies producing antiviruses is very high. And therefore, if some company is a leader, then this status most likely was given to it for a reason.

And therefore, while improving security measures on the Internet, the user should pay attention to the most famous anti-virus brands - Kaspersky, ESET, Symantec, DrWeb. Experts recommend not saving on such programs. Yes, a license costs about $ 50. However, in return, the user gets a really good, effective tool to combat malicious codes.

Internet Security Threat

Firewalls

In addition to antiviruses, it is highly advisable to set firewalls. These programs are designed to filter the access of applications installed on a PC to the Internet (as well as to control access to a computer by actors in a virtual space). That is, if, for example, the trojan nevertheless skipped past the antivirus (yes, it can be), then with a qualitatively working firewall it is highly likely that it will not be able to transfer the logins and passwords found on the PC to the hacker. The program will block attempts to send files to the Internet.

Regarding firewalls: experts also recommend not saving and buying commercial versions of such programs, or even better - integrated products in which the functions of the antivirus and firewall are very well combined. Among them are Internet Security from Kaspersky or Smart Security from Slovak competitors in Russia - ESET.

The browser will protect us

Internet access is through a browser. Accordingly, the main channel for malicious code to enter the PC is the window of this application. How to secure online using a browser? Some experts recommend sticking to the concept of “what shouldn't be done”. Let’s try to orient ourselves on it. Thus, using a browser, the user should not:

- save logins and passwords inside the program (even if she herself suggests doing this);

- neglect the browser update function;

- include, without need, various kinds of extensions, scripts, scripts.

Actually, everything is clear on the first point. The passwords and logins that the trojan finds on the PC are obviously written by the browser to some kind of file. If it is not there, then the malicious code will not be able to transfer anything to the hacker. It is extremely important to comply with this rule if the user wants to ensure the safety of payments on the Internet.

Updating the browser is important from the point of view that the manufacturer every time improves the internal system of protecting the software from low-level hacking mechanisms, as well as from malicious codes that, for one reason or another, cannot be detected by antiviruses.

Actually, the samples of hacker software in question are focused on the so-called “holes” in browsers that arise due to the excessive enthusiasm of users for installing marked extensions, scripts and scripts. You can almost always get by with the default options. There are absolutely no good reasons to include additional ones, to the delight of hackers.

Step into the camp of competitors

Many IT experts have recognized that the Windows operating system, by virtue of its architecture, is much more susceptible to virus threats when compared with alternative platforms. First of all, such as Linux and Mac. At least, according to many experts, the number of viruses created for these operating systems is several times less than those written for Windows. The main argument here is a relatively small share of alternative platforms on the market. And so hackers are not particularly interested in writing viruses for these OSs. Which, in addition, according to a number of experts, are really better protected from malicious codes.

The question is, why users are not massively switching from Windows to Linux and Mac? Regarding each OS, there is a reason. If we talk about Linux, then this operating system is significantly more difficult to use. If in Windows drivers and software are installed using automatic algorithms embedded in the OS, then in Linux you have to install some programs almost manually. This does not suit many users, and they prefer to own an OS that is simpler. Although Linux is completely free. These are the principles of its creators, those who turned this amateur-created OS into a global project. By the way, there are so many versions of Linux with different designs and control interfaces, among which users can always find comfortable for themselves. But, most importantly, for many of the IT professionals who help develop this project, Internet safety is the most important priority.

Regarding the Mac, the reason is different - it consists just in price. Computers based on this OS are significantly more expensive than those on which Windows and Linux can be installed. They represent Apple's platform, implemented on a different technical basis than PCs related to the IBM PC architecture , compatible with Windows and Linux.

However, if using a computer comes down to working with the Internet, office documents, simple graphic files, and there is no particular need to run games, then you can pay attention to Linux. Note that programs for this OS, in which it is possible to use the above functions, as a rule, do not belong to the category of those that must be installed manually. Almost all modern browsers have a Linux version that is in no way inferior to Windows distributions. There are many office applications, the functionality of which is generally comparable with Word, Excel and the programs supplementing them.

Source: https://habr.com/ru/post/C189/


All Articles