All

Basic Internet Security

Internet Security

Introduction, types of attacks

The universalization of the Internet and networks, and the great boom it has experienced thanks to the proliferation of broadband, poses a great challenge for home users who want to keep their computers safe. Recently, the number of attacks is increasing, also through new techniques via the Internet, such as:

  1. Virus: Malicious code that is installed on the computer and performs some action, often destructive.
  2. Trojans: Viruses hidden within other file types.
  3. Spyware: Spyware. Code that collects habits of users, in order to sell this information to advertising companies to send spam ( spam ).
  4. Phishing: Type of scam, in which through links it is sent to the user to counterfeit pages of banks, which simulate the real ones in order to deceive the user, collecting the bank details you enter.
  5. Scam: Emails that incite the user to make easy money, when in fact it is intended to scam.
  6. Malware: In general all types of code programmed to perform a malicious action, such as those mentioned or others ( keyloggers, logic bombs …).

All of these endanger the safety and privacy of citizens. It should be noted that among the data that we may have on the computer and transmit over the Internet, there may be passwords, bank details, personal data, emails or others, which may be used by scammers or other criminals.

What should be done to avoid these dangers?

Operating system :

Always keep your computer’s operating system up to date, especially with the latest critical security updates. Also try to do the same with all installed programs and device drivers .

Programs :

Install and activate protection programs, such as:

  • Antivirus and antispyware, prevent the entry and installation of viruses, Trojans and spyware.
  • Firewall, firewall, controls the output and input ports of the computer.
    It is essential to configure them so that they are updated frequently; it must be borne in mind that new types of attacks appear on the Internet every day, which these programs must be able to recognize.

Users :

Normally use the computer within a standard user account, without administrative privileges. If this type of account does not exist, create it through the system options. Just log into an administrator type account to make changes to the operating system, configuration, or install / uninstall programs and devices.

Passwords :

Despite the upheaval this may represent, we must try to use different passwords for each service we use. These should be at least eight digits long, also combining different types of characters (uppercase / lowercase letters, numbers or symbols), and changing them regularly. Do not leave passwords blank or default. nor generate them based on personal facts or data (name and surname, initials, dates of birth, registrations, pets, telephone numbers, etc …).

Do not reveal passwords to anyone, not even over the phone, even if they seem trustworthy. Never send them by mail or SMS, or write them on paper.

Wireless connections :

Increasingly used, these are more vulnerable than cable connections, because data travels in waves through space and allows easier access by any receiver in the area. of influence.

Although it is not an easy task for a common user (the help of a professional would be advisable), it can be broadly summarized in three tips:

In the wireless router settings , disable the option to publish the SSID (network name / identification) name.

Also on the router, enable the MAC address filter, and record only the IPs (numeric address that identifies each machine or device) of the computers that will access the network.

For the router and the computer, enable encryption by the system (WPA-PSK or higher), which encrypts the data circulating on the network.

If we use public networks, in which we do not have this control, we must assume that our computers are more vulnerable. It is good to inquire near the provider about security and the correct settings.

Safe behaviors and habits in the use of computers Instant messaging, chats: These are communications that travel without encryption, so it is relatively easy to filter and access. It is just as easy to impersonate someone on the Internet in order to deceive friends and access confidential information. The same common sense should be applied as in any other environment. Just as we wouldn’t talk about our habits or intimacies with a stranger walking down the street, we need to do the same in the realm of the Internet. Just as we would not let a stranger into the house, we should not accept — let alone execute — files sent to us by a stranger.

If any of our friends or acquaintances through these communications show strange behavior (by asking a lot of questions or making unusual comments), log out of instant messaging and try to locate them by other means (in person, by phone). ..).

Email: Similar to above. Do not open messages from senders and unknown subjects, delete them later, and do not open any files they contain. The same in the case of spam(spam). In these cases, never respond to the sender or tap on any link it contains, including if that link is presented as a way to remove us from an alleged recipient list.

Internet shopping: Always buy in establishments of proven quality and seriousness. These must be secure sites, and the web address of the transaction pages must begin with ‘https : //’. Never email your credit card number.

Web browsing: Be wary of unclear advertising links or ads, and even more so of pop-ups that suddenly appear in your browser. Sometimes, the latter simulate messages displayed by our own computer, in order to deceive us and click on a link.


Source: Andorra Police

Next Post

Alert of kidnapping and encryption of computer data (Ransomware)

Wed May 6 , 2020
Alert of kidnapping and encryption of computer data Ransomware One has to remember the danger of the propagation of malicious software that once executed, encrypts the content of the computer and connected peripherals. Offenders demand payment in exchange for obtaining the decryption key. The procedure used is to claim a payment in virtual currency (Bitcoins) so that its recipient cannot […]
Cyber Crime,Cyber Security,Cyber Law

You May Like

Recent Updates

%d bloggers like this: