Join the God Side, Jesus is Coming…….

Source: US-CERT

What is cyber security?

It  seems  that everything relies on computers and the Internet now —
communication   (email,  cellphones),  entertainment  (digital  cable,
mp3s),  transportation  (car  engine  systems,  airplane  navigation),
shopping  (online  stores, credit cards), medicine (equipment, medical
records),  and the list goes on. How much of your daily life relies on
computers?  How  much of your personal information is stored either on
your own computer or on someone else’s system?

Cyber  security  involves  protecting  that information by preventing,
detecting, and responding to attacks.

What are the risks?

There  are  many  risks,  some  more  serious than others. Among these
dangers  are viruses erasing your entire system, someone breaking into
your  system and altering files, someone using your computer to attack
others,  or  someone  stealing your credit card information and making
unauthorized  purchases. Unfortunately, there’s no 100% guarantee that
even  with  the  best precautions some of these things won’t happen to
you, but there are steps you can take to minimize the chances.

What can you do?

The  first  step  in protecting yourself is to recognize the risks and
become familiar with some of the terminology associated with them.
Hacker,  attacker, or intruder – These terms are applied to the people
who  seek  to  exploit weaknesses in software and computer systems
for their own gain.

The  results can range from mere mischief (creating a
virus with no intentionally negative impact) to malicious activity
(stealing or altering information).

Malicious  code  –  This  category  includes code such as viruses,
worms,  and  Trojan  horses.

* Viruses  – This type of malicious code requires you to actually do
something  before  it  infects your computer.

* Worms  – Worms propagate without user intervention.

* Trojan  horses – A Trojan horse program is software that claims to
be  one  thing  while in fact doing something different behind the

This   series   of  information  security  tips  will  give  you  more
information about how to recognize and protect yourself from attacks.


Leave a Reply

Fill in your details below or click an icon to log in: Logo

You are commenting using your account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s

Tag Cloud

%d bloggers like this: