Tuesday, August 16th, 2022 19:43:30

A Guide To Protect Your Computer

Updated: May 28, 2011 5:08 pm

Open any newspaper and you may possibly read about a break in security. It is interesting to note that even with a lot of talk about network security, many companies still do not report about security breaks. The reasons behind it are that companies want to keep away from wrong kind of publicity and many of them do not even know when a break has occurred. Frankly speaking, many companies are doing nothing in this direction; and if at all they are doing something, they are not doing it in the right way. In this backdrop, the book, which contains 20 chapters, is very useful. In one chapter, the book determines what systems sense incoming network traffic and are reachable from the internet using a variety of tools and techniques. The writer also defines how one can bypass firewalls to scan system that are being blocked by filtering rules. Further, everyday new viruses threaten to damage your system or destroy your data. To protect your system from these malicious programmes, you need to install an antivirus software on your computer. Antivirus software is a type of programme that searches the hard disk and all removable media (such as CDs, pen drives, etc.,) for known viruses. Describing types of spoofing—IP spoofing and e-mail spoofing—the book suggest protection against sourcing routes. Defining a DOS attack, the book reveals that it is the attack by which a person can slow down a system, or make it unusable by overloading the system so that no one else can access. It can be an accidental or deliberate attack and organisations should be protective against these attacks.

                Many companies think “since no one knows about my network, why do I need security?” But contrary to this logic, everyone, be it an individual working with a computer at home or in a cafe or an employee in a company office, is susceptible to these kinds of attacks from time to time. Most of the people think about security as an afterthought like putting firewall, but this too is not efficient enough for today’s world. So, the main aim of a company should not only be the prevention of attacks, but also their detection. Companies try to build security systems that prevent them from as many attacks as possible, but all attacks cannot be prevented. In such cases, the security should be in such a way that, if an attack is not prevented, it should at least be detected before it causes any harm to the system network.

                The point emphasised in this book is that there is no way to fully protect a network, unless one knows what he is up against. Only by knowing how attack works and what all an attacker does to compromise with a machine, a person or an organisation can properly protect machine. The book also helps an individual close up all possibilities and protect one’s computers and makes one aware of the tools that are available and how easy they are to use and emphasises what the user must do to have a secure network. With useful resources and step-by-step instructions on various hacking techniques, this book contains up-to-date information, covering essential topics. In fact, the book gives you enough information to use on a search engine to find more details or even the code. Since many exploits are described, one can make intelligent decisions about what approach might be the most appropriate for particular goals. At the same time, defenders will learn about the myriad approaches which should be taken to attack systems.

 By Ashok Kumar

Comments are closed here.

Archives

Categories