Computer Security
Posted On: October 15, 2018 in: Security
Managing Your Information Security Risks
Along with personal computers, tablets and smartphones have become an indispensable tool in many people’s work and personal lives. But with the convenience and efficiency computers add to everyday tasks comes risk. Simply put, your device’s connection to outside networks creates an opportunity for criminals to access your sensitive data. For this reason, Park Bank encourages vigilance in protecting your private information.
The Department of Homeland Security is leading the way with the STOP. THINK. CONNECT. global online safety awareness campaign to help digital citizens stay safer and more secure online. Park Bank supports and encourages this campaign - that all Internet users be more vigilant about practicing safe, online habits; ensure that Internet safety is perceived as a shared responsibility at home, in the workplace, and throughout our communities; and transform the way the public and private sectors and the U.S. federal government collaborate to make cybersecurity a reality.
For more information about the STOP. THINK. CONNECT. campaign, and for tips and advice related to online safety habits, visit https://stopthinkconnect.org/tips-advice/general-tips-and-advice.
Awareness of the multiple forms security threats take is the first step in building your defenses. Most people understand the potential damage caused by computer viruses – malicious programs buried within other applications that are able to replicate themselves and spread through networks. But there are many more types of “malware” available to fraudsters intent upon mischief, or worse, theft.
Viruses
More than any other kind of malware, viruses are one of the biggest threats computer users are facing today. Viruses are malicious programs buried within an existing program that have the ability to replicate themselves and spread from computer to computer. Viruses can generate everything from relatively harmless prank messages to commands that destroy valuable programs and data. A virus may activate immediately or lay dormant for over a year before attacking its host system. Simply opening an innocent looking email attachment may be enough bring your computer to a halt.
Backdoors or Trapdoors
A hidden bypass to a program's security area, a backdoor or trapdoor may be created by a programmer to expedite troubleshooting or for some other innocent purpose. But once discovered, the technique may be used by an attacker to damage, destroy or steal data. A program with a known backdoor or trapdoor may itself be considered malware.
Spam
Spam is unsolicited email received, usually from people you don’t know, that may contain advertisements, get rich quick schemes, offensive material, etc. Besides being a nuisance, unwanted email can be used by attackers as a tool for leading unsuspecting recipients to web sites where viruses, worms, spyware and other types of malware can be installed on their systems. Never respond to spam emails! If you do, you are confirming that your email address is “live” and could be subject to more unsolicited emails. The best way to deal with spam email is to ignore and delete it.
Spyware
Spyware is software that is unknowingly installed on a computer to collect information about a user's web-surfing habits. Some spyware is relatively harmless, designed to generate data about shopping, viewing or other habits without revealing the identities of individual users. Malicious spyware, however, may be used to capture web browsers in order to change their home pages, receive waves of pop-up ads or ignore user navigation commands.
Botnets
Botnets are a large number of “zombie” computers that are infected by a virus or malware and commanded by an attacker. Botnets can be used to launch spam email campaigns, viruses or DDoS (distributed denial of service) attacks on web sites for either amusement or extortion purposes. A zombie computer is a compromised computer connected with the Internet that is used under remote direction. Typically, the owners of these zombie computers are not aware that their system is being used for this type of activity.
Keyloggers
This is a hidden program that captures and records every computer key stoke entered by a user. Once the keystrokes are logged, they are tucked away in the computer for retrieval at a later date, or sometimes the information is transported directly to the intruder. This is highly useful to an intruder because it will help them find passwords and other useful information that will enable them to attack and compromise a system.