Computer Security Attack

How to deal with computer security attacks?

Computer security outlines the threats that data and information in any information system are exposed on day to day basis. Internet security risks are the dangers that user’s and data face as a result of suing the Internet. Some of the security threats range from identity theft, virus infection, information altering and browser scripting.

Common Internet security risks and tips to safeguard against them are discussed in the following points.

  • Common Internet security risks

  • Safeguarding against the threats

  • Precautionary measures


Common Internet security risks


Internet has become the backbone for information interchange and has become a doorway through which users have been open to attacks from malicious users. Discussed herein are common Internet attacks that may help a user to be on the lookout for the safety of his data and system as a whole.

Hackers are individuals who gain access to someone’s system and take absolute controls of it remotely without the user’s knowledge. They are able to do this by using spywares that are launched into the user’s system after running an adware contain the malicious program or installing a program such as file sharing programs e.g. Kazaa or e-mail attachments. When the user runs these files, they install the spywares without knowing in their systems, in return the spywares open a back door i.e. port 8080 and is the gateway that the hacker uses to gain access into your system. Damages that can be inflicted in the system by the hacker include IP spoofing. In addition, they may be able to perform DNS poisoning where by the DNS server information falsified causing traffic to be diverted.

Password cracking is another common Internet security where the attacker tries to figure out the passwords of a user or administrator on a network and gain unauthorized access. Denial of service may also occur where by the user is denied access to some Internet resources. This can be done through ping broadcast.

Safeguarding against the threats


Installing firewalls in addition to the Windows® Firewall should be the first step. The firewall functions in filtering out data packets in and out of the network. In addition, it manages the users on the network unauthorized access, especially in a WLAN will be restricted to the allowed users. Having an antivirus program and antispyware will help in detecting and cleaning installed viruses as well as detecting future viruses. Automatic updates for these programs should also be enabled to equip them with the latest file information.
Precautionary measures

In addition, the user can try and put measures in place that will protect him from being a potential victim. These include restricting use of his system to certain users. Avoiding installing unnecessary programs i.e. adware that they don’t need. In addition they also need to be in the habit of checking for installed programs that initiate at run up that they did not install and remove them.
iYogi's Digital Home Plan

We offer comprehensive support for your PC, connected devices, peripherals and over 500 software applications including:

  • Diagnostic & repair for your technologies.
  • Troubleshooting software errors.
  • Updating drivers and security to protect against online threats.
  • Connecting to the Internet, devices and peripherals.
  • Optimizing your PC's speed and performance.

Enjoy instant and unlimited access to great tech support, all year around. We promise the lowest wait-time and the highest resolution rate in the industry. The experienced and skilled technicians of iYogi are on call 24x7 to provide you support for resolving any tech issue that you are struggling with.

iYogi’s tech experts can provide support for all the major brands of laptops, like Dell, ASUS, Toshiba, Compaq, Lenovo, Dell, etc.