International Computer Security Day raises awareness

By David Agan, Public Affairs OfficeDecember 2, 2010

FORT RUCKER, Ala. -- The world observed International Computer Security Day Nov. 30.

The event began in 1988, with the goal of raising awareness of computer-related security issues and to remind people to protect their computers and personal data.

Taking some time to learn about basic computer security concepts can go a long way to ensure your private information remains safe and secure and your computer continues to function properly.

"Without computer security, your computer and the network it's attached to are vulnerable to viruses, worms and other types of malicious code," said Shane Jones, Fort Rucker Network Enterprise Center, information security analyst.

Threats

There are various threats to personal and government computers people should be aware of:

Computer viruses

Viruses are programs that can copy themselves to a computer and then spread from one computer to another over a network or the Internet. They can also be spread via removable media, such as CD or USB drives.

There are different types of viruses. Some can be a nuisance, forcing your Internet browser to display an unending series of popup windows. Others, however, can maliciously delete your personal files, system files and even destroy your operating system. Many times, a computer will "catch" a virus via an untrusted Web site or by opening an e-mail attachment.

Malware

Short for malicious software, it is a general term used by computer professionals to describe software that secretly accesses a computer without consent.

Some examples of malware include Trojan horses, rootkits, spyware and keystroke loggers. They can steal data, record online passwords and even take control of a computer for large-scale attacks on other systems and networks. Malware makes it way to a computer in a number of ways. Many times it is by installing software from untrustworthy sources (screensavers, for example) but malware can sometimes come bundled with software from reputable vendors.

Social Engineering

This form of computer access is a bit different from the previous threats. It involves manipulating people into performing actions or giving out information, rather than by using technical means to extract information.

In terms of computer security, phishing is frequently used to obtain private information. A phisher may send an e-mail that seems to come from a business, such as a credit card company or bank, requesting verification of personal details (e.g. Social Security Number, date of birth, password).

It may contain a link to a Web site that also seems legitimate. However, the Web site is run by criminals aimed at identity fraud.

Protect yourself

Fortunately, it is relatively simple to protect your identity and computer from harm. People can start by installing anti-virus and anti-malware programs.

"Educate yourself. The Internet Storm Center (http://isc.sans.edu) lets you know what's going on in terms of malware, viruses and other current attacks," said Shawn Foist, Fort Rucker NEC network security manager.

Anti-virus software can detect and eliminate threats before a threat can infect a system. Anti-malware programs provide real-time protection against the installation of malware as well as detection and removal of any existing instances of malware on computers. Be warned: people should never install free software claiming to be anti-malware or anti-spyware unless it is verified to be from a legitimate source, as it could be malware itself. Some reputable sources for anti-virus and anti-malware software include Symantec, McAfee and Microsoft.

"Symantec and McAfee are great sources for information on ways to keep your computer safe and protected," said Foist.

One of the best ways to protect computers and online information is by using a strong password. It is never advisable to use nicknames, phone numbers, birthdays, pet names, the name of a child, or any word that can be found in a dictionary. Choosing a good password is easy. Use at least eight characters with at least one special character (#, *, !, @, etc.) and at least one number. You should also change your password often and never give it to anyone. Finally, if you can avoid it, you should never write your password down. If you do have to write it down, do not label it as 'my password' and keep it in a safe location.

Finally, always make backups of important computer files. Whether it is as simple as copying files to a CD, DVD, or external hard drive or utilizing an online backup services available via the Internet, a backup can reduce the harm caused by viruses, malware and other threats to computer systems.