By Serena Liu

Safeguards for your computer

Computers are essential in our everyday life. With a computer connected to the internet, people can have access to almost everything, even other people's personal information. Hackers are able to steal people's bank accounts, and viruses can freeze computers and destroy data. As unethical usages of computers have began to emerge, so have various security systems and safeguards. To prevent you from experiencing those unethical usages of computers, this website will introduce you to the top three safeguards that you can use, along with their purpose and disadvantages.



By Bruno Pedrozo - Feito por mim, CC BY-SA 3.0, Link

Number one: FIREWALL

The word "Firewall" was first used by firefighters to describe a barrier to prevent the spread of fire. (3) As the name indicated, Firewalls on computers also act as a barrier that prevents malware sources from entering your computer. It controls the traffic between your trusted, local network and the untrusted network, the internet. (1) As a result, only files that are accepted by the firewall will be able to enter our computer, while others are rejected or dropped. Firewalls can identify a package by looking at its heading, which is a description of the package, its connections, which is how the package links to other packages or websites, and the source that the package is coming from, which can be the type of the website or its IP address. (2) You can alternate the firewall settings yourself according to your situation, and depending on your settings, the firewall can take different actions towards packages coming in to your computer. It can accept the package and let it in, reject the package and reply "unreachable", or drop the package without sending any reply. Firewalls can also control outgoing traffic being sent from your computer, so is also important to set your outgoing settings to insure that you can send files out properly. (3) Generally, a Firewall is very useful in preventing problems from entering your computer, but it can also make mistakes. A common mistake is that a Firewall might block some completely safe packages from entering, and the user would have to change the settings or turn off the firewall temporarily.

Number two: ANTI-VIRUS SOFTWARE

While a Firewall prevents problems from entering your computer, Anti-virus software deals with problems that are already in your computer. It was first designed only to target viruses, but it can now target and destroy other malware on the computer. (5) There are three methods used by anti-virus software: Signature-based detection extracts a signature from previously found malware files and stores them in the database of the anti-virus software, so they can be easily identified also in the future; Heuristic-based detection can also identify viruses that have similar signatures from the ones in their database, but have the risk of making false-positive matches, or identifying a safe file as a malware and destroying it; Behavior-based detection protects the computer from suspicious behavior, such as unauthorized changes to the system, but it also has the highest risk of false positives. (6) Normally, anti-virus software identifies problems through real-time protection, which means it monitors all activity on the computer in real-time, so it can identify and solve the problem as fast as possible. However, you can also run a scan yourself to scan specific files in detail. After all, the biggest problem with anti-virus software is false-positive matches. For example, some anti-virus software programs on Microsoft Windows can even delete essential files used in the Windows operating system. (5) Click here for more information on how to avoid risks when using anti-virus software.

Number three: PASSWORD MANAGER

Firewall and Antivirus software can protect you from viruses or problematic files that can crash your computer, but they can't prevent someone from stealing your personal information if they know your password. It is critical to use effective and secure passwords on your accounts so hackers won't be able to steal your personal information. In general, you shouldn't use passwords that are too short, too easy, or too obvious to break. For example, every new character added to your password can make it exponentially harder for hackers to hack, as shown in the pictures.


It is also important to avoid common words, names, or simple patterns in your password because it will be very easy to guess, like your dog's name or "123456789". In addition, passwords should not be reused thereby making it difficult for hackers to access your bank account even if they hacked your game account. (10) Well, people always find it hard not to repeat their passwords and that why they should use a password manager. A password manager can help you to create strong passwords and store them for all your accounts, so you only have to remember the master password that you use to log into your password manager. (9) As you can see, it is very important to pick a reliable password manager because it stores all your passwords, so here is some advices on choosing your password manager.

Conclusion:

Quiz Time!

  1. What are the three actions a firewall can take towards packages coming in to your computer?
  2. List the methods an anti-virus software uses to detect malware files.
  3. What does a password manager do?
Answers

Bibliography

  1. "Firewall (Computing)." Wikipedia, Wikimedia Foundation, 24 Jan. 2018,
        en.wikipedia.org/wiki/Firewall_(computing).
  2. Cobb, Michael. "What is firewall? - Definition from WhatIs.Com." SearchSecurity, Margaret Rouse,
        searchsecurity.techtarget.com/definition/firewall.
  3. Anicas, Mitcheel. " What is a Firewall and How Does It Work?"DigitalOcean, 20 Aug. 2015,
        www.digitalocean.com/community/tutorials/what-is-a-firewall-and-how-does-it-work.
  4. Pedrozo, Bruno . "File:Firewall.png." Wikimedia Commons , 5 Oct. 2007,
        commons.wikimedia.org/wiki/File%3AFirewall.png.
  5. "Antivirus software." Wikipedia, Wikimedia Foundation, 30 Jan. 2018,
        en.wikipedia.org/wiki/Antivirus_software.
  6. Parker, Carey. "The Pros & Cons of Anti-Virus Software." Firewalls Dont Stop Dragons, 10 Oct. 2017,
        firewallsdontstopdragons.com/the-pros-and-cons-of-anti-virus-software/.
  7. Criddle, Linda. "What is Anti-Virus Software?" Webroot ,
        www.webroot.com/us/en/home/resources/tips/pc-security/security-what-is-anti-virus-software.
  8. Nick. "Free antivirus software: protect your PC - MoneySavingExpert." MoneySavingExpert.com, 15 May 2017,
        www.moneysavingexpert.com/utilities/free-anti-virus-software.
  9. Hoffman, Chris. "How to Create a Strong Password (and Remember It)." How-To Geek, 29 May. 2015,
        www.howtogeek.com/195430/how-to-create-a-strong-password-and-remember-it/.
  10. Pozadzides, John. "How I'd Hack Your Weak Passwords." Lifehacker, 16 Dec. 2010,
        lifehacker.com/5505400/how-id-hack-your-weak-passwords.
  11. Xkcd: Password Strength,
        xkcd.com/936/.