Computer security


 

Contents:

Introduction: 1

1.1: Why is computer security so important?. 2

1.2: ADVICE for computer uses: 2

1.3: Be Careful About Programs You Download and Run. 2

2.0: Avoid Pirated and Cracked Software. 3

2.1: Beware Phishing and Social Engineering: 3

2.2: Who is the hacker: 4

2.3: What are the hacker's goals?. 4

3.0: That reason we need to protect our computer or our account To protect you computer you must following these points : 5

3.1: What is the antivirus software?. 5

Top 10 antiviruses software : 6

4.0: What is the password?. 6

5.0: Advantages and disadvantages of password?. 7

5.1: Advantages: 7

5.2: Disadvantages: 7

6.0: How to create a strong password?. 7

6.1: The four characters classes. 7

7.0: Examples for bad password and good password. 8

7.1: Bad password: 8

7.2: Good password: 8

In conclusion: 8

Question: 9

References: 10

Introduction:

Information and Computer Security (ICS) contributes to the advance of knowledge directly related to the theory and practice of the management and security of information and information systems. It publishes research and case study papers relating to new technologies, methodological developments, empirical studies and practical applications.

Frist, the computer play a big role in our live. Every think around you work by computer like, laptop, tablet, and smart phone… so the most important thing in computer world is security wish mean we should to know how to protect our computer.

 

1.1: Why is computer security so important?

  • Prevention of data theft such as bank account numbers, credit card information, passwords, work related documents or sheets, etc. is essential in today’s communications since many of our day to day actions depend on the security of the data paths.
  • Data present in a computer can also be misused by unauthorized intrusions. An intruder can modify and change the program source codes and can also use your pictures or email accounts to create derogatory content such as pornographic images, fake misleading and offensive social accounts.

1.2: ADVICE for computer uses:

Be Careful about programs you download and run.

Avoid pirated and cracked software.

Beware of Phishing and Social Engineering.

Don’t Reuse Passwords.  

1.3: Be Careful About Programs You Download and Run.

His one may seem obvious, but so much of the malware Windows users encounter seems to be as a result of accidentally downloading and installing bad software. Be careful about the programs you download and run. Only download and run trustworthy software.

 Get the software from its official website if you want to download VLC, download it from VLC’s official website. Don’t click a “Download VLC” banner on another website and download it from someone else that may bundle malware or adware along with it.

2.0: Avoid Pirated and Cracked Software.

 

When you acquire pirated or cracked software from peer-to-peer networks or shady websites, you are taking a big risk. By running an .exe file from such locations, you trust the distributor to not do anything harmful. Software-cracking groups make worse yet, the cracks you may need to run to make such software work properly. You can’t know if they’ve included malware or not.

Downloading pirated software and cracks is just a bad idea from a security standpoint. We have probably all seen people download files from peer-to-peer networks and become infected as a result.

Downloading unauthorized software is much riskier than pirating music or videos — software is machine code that can be tampered with. A video is just a media file that can play or not play — although untrustworthy individuals often try to disguise malicious programs as videos so less-experienced users will run them.

2.1: Beware Phishing and Social Engineering:

Browsers and email clients try to protect you from phishing attacks, but they’re not perfect. A phishing attack is the web equivalent of someone calling your phone, claiming to be your bank, and asking for your credit card number. Your bank would never call you and ask for this information, just as they would never email you and ask you to send the information in an email.

Be very careful when disclosing personal information online. Ensure you disclose it only to legitimate individuals and websites. To access your bank’s website, go directly there — don’t click a link in an email that claims to be from your bank, but may actually direct you to an imposter site.

2.2: Who is the hacker:

People who want to damage a company or organization create some malware. If a virus can tie up an organization’s network, it can cost them serious amounts of money. A disgruntled employee or someone else with a specific agenda might create this. (The Hackers)

A hacker is someone who seeks and exploits weaknesses in a computer system or computer network. Hackers may be motivated by a multitude of reasons, such as profit, protest, challenge, enjoyment, or to evaluate those weaknesses to assist in removing them. The subculture that has evolved around hackers is often referred to as the computer underground. In addition, the best group of hacking is anonymous hackers.

2.3: What are the hacker's goals?

Entertainment.

Bragging rights.

Stolen Goods.

Power from stolen information.

Stealing your information.

Damage your computer and files.

3.0: That reason we need to protect our computer or our account To protect you computer you must following these points :

 

Install quality antivirus

Keep anti-malware applications current

Perform daily scans

Disable auto run

Disable image previews in your mail

Don't click on email links or attachments

Surf smart

Don’t download random files

Don’t use pen drive full with virus

3.1: What is the antivirus software?

Anti-virus software is a program or set of programs that are designed to prevent, search for, detect, and remove software viruses, and other malicious software like worms, Trojans, adware, and more.

Top 10 antiviruses software :

4.0: What is the password?

A secret word or phrase that must be used to gain admission to a place.

"If you don't know the password you can't come in"

A string of characters that allows access to a computer, interface, or system.

"Each user has a password in order to log on to the network"

5.0: Advantages and disadvantages of password?

5.1: Advantages:

Easy to memorize.

You can change it easily.

Freedom to select.

Protect your information.

Respect of privacy.

5.2: Disadvantages:

  loss your password.

6.0: How to create a strong password?

Easy for users to remember.

They contain number or letter sequences
or letter-to-number substitutions, such as
E for 3 or O for zero.

Contain characters from three of the four classes of characters.

6.1: The four characters classes

Capital letters (A, B, C).

Small letters (a, b, c).

Numbers (1, 2, 3).

Symbols (!, @, &).

7.0: Examples for bad password and good password

7.1: Bad password:                                  

123456.

ahmed.

Mobile number(05……..).

ID number (1…….).

7.2: Good password:

A6med@501.

1015@Ahme0.

Snap@Ahmed&1015.

TTCahmed*012.

In conclusion:

Computer security very important to protect our information in the internet. Because the internet like big world flue whit good things and the bad things or risks that, damage your computers and files. If you want, protect your computer from hackers and malware. You must install antivirus program and be careful when you use the internet to be safety.

Question:

1: In your opinion, why is computer security so important?

…………………………………………………………………………………………………………………………………………………………………………………………………………………………

2: In your opinion, who is the hacker?

…………………………………………………………………………………………………………………………………………………………………………………………………………………………

3: What are the hacker's goals?

…………………………………………………………………………………………………………………………………………………………………………………………………………………………

4: In your opinion, what is the best antiviruses programs? And way?

…………………………………………………………………………………………………………………………………………………………………………………………………………………………

5:According to the subject, What is the password?

…………………………………………………………………………………………………………………………………………………………………………………………………………………………

6: Write 2 example of good and bad password?

Good password

Bad password





(Share your answer with your partner)

References:

1: https://www.americanexpress.com/uk/content/security/phishing/

2: https://www.usa.gov/common-scams-frauds

3:  Parker, D. B. (1981). Computer security management (p. 308). Reston, VA: Reston Publishing Company.

4: Landwehr, C. E. (1981). Formal models for computer security. ACM Computing Surveys (CSUR), 13(3), 247-278

           









I BUILT MY SITE FOR FREE USING