SlideShare una empresa de Scribd logo
1 de 7
LOGO




       Detect, Protect, Dis-
              infect

           SafeSpaceOnline
 Consumers Online Face Wide Choices in Security
  Products

  With new threats to computer security and data
  integrity a regular feature of the evening news, a
  panoply of products that promise to detect, protect, and
  dis-infect are being marketed to consumers. Intrusion
  detection systems, firewalls and anti-virus software are
  critical to online security, but the Federal Trade
  Commission, the nations consumer protection agency,
  says computer users from grade school kids to
  grandparents need to know exactly why they need
  online security products and what they're buying.
  .
Why the Need
Computers talk to each other over the Internet by
sending data through their communications ports. If a
port is open, it listens for communications from the
Internet. A computer has thousands of ports: which
ones are open depends on the software the computer
is running. Hackers can eavesdrop or scan the ports to
determine which are open and vulnerable to
unauthorized access.
Detection
An intrusion detection system (IDS) monitors incoming
Internet traffic, much like a security camera watches
your front door to see who might be trying to come in.
When the IDS detects a suspicious pattern, it sends an
alert (and creates a record) that an intruder may be
trying to break in to your computer. Some IDS alerts
but not all show a pop-up message on your screen. An
IDS alone cannot prevent an unauthorized entry into
your computer; only a firewall can do that.

                     Protection
    Firewalls block hackers access to your computer by
    creating a barrier like a wall between your ports and
    the Internet that allows you to control the data that
    comes and goes through your ports. Your firewall
    protects your ports even if you don't have an IDS.
    Sometimes a firewall is bundled with an IDS. If not,
    and if you want an IDS, be sure its compatible with
    your firewall.
Dis-infection
Anti-virus software detects and deletes viruses that
are in your computer. Viruses often attach
themselves to your computer through email
attachments and floppy disks. That means a firewall
cant catch them. Similarly, an IDS wont alert you
when a virus is attacking your computer. Look for
anti-virus software that recognizes current viruses,
as well as older ones; that can effectively reverse
the damage; and that updates automatically.
 By: Robert Rogers
LOGO




       Read more at SafeSpaceOnline.com

Más contenido relacionado

Destacado (7)

How to give a presentation
How to give a presentationHow to give a presentation
How to give a presentation
 
Universidad UGMEX
Universidad UGMEXUniversidad UGMEX
Universidad UGMEX
 
FOROS VIRTUALES COMO ESTRATEGIA DE APRENDIZAJE EN UNIVERSIDADES.
 FOROS VIRTUALES COMO ESTRATEGIA DE APRENDIZAJE EN UNIVERSIDADES. FOROS VIRTUALES COMO ESTRATEGIA DE APRENDIZAJE EN UNIVERSIDADES.
FOROS VIRTUALES COMO ESTRATEGIA DE APRENDIZAJE EN UNIVERSIDADES.
 
SCPI Notapierre acquisition en VEFA
SCPI Notapierre acquisition en VEFASCPI Notapierre acquisition en VEFA
SCPI Notapierre acquisition en VEFA
 
RHF Achievements
RHF AchievementsRHF Achievements
RHF Achievements
 
Foro y tipos de foros
Foro y tipos de forosForo y tipos de foros
Foro y tipos de foros
 
Quick Introduction to OpenStack Neutron and SDN feat. MidoNet
Quick Introduction to OpenStack Neutron and SDN feat. MidoNetQuick Introduction to OpenStack Neutron and SDN feat. MidoNet
Quick Introduction to OpenStack Neutron and SDN feat. MidoNet
 

Último

Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...
Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...
Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...
panagenda
 
Structuring Teams and Portfolios for Success
Structuring Teams and Portfolios for SuccessStructuring Teams and Portfolios for Success
Structuring Teams and Portfolios for Success
UXDXConf
 
Breaking Down the Flutterwave Scandal What You Need to Know.pdf
Breaking Down the Flutterwave Scandal What You Need to Know.pdfBreaking Down the Flutterwave Scandal What You Need to Know.pdf
Breaking Down the Flutterwave Scandal What You Need to Know.pdf
UK Journal
 

Último (20)

1111 ChatGPT Prompts PDF Free Download - Prompts for ChatGPT
1111 ChatGPT Prompts PDF Free Download - Prompts for ChatGPT1111 ChatGPT Prompts PDF Free Download - Prompts for ChatGPT
1111 ChatGPT Prompts PDF Free Download - Prompts for ChatGPT
 
Extensible Python: Robustness through Addition - PyCon 2024
Extensible Python: Robustness through Addition - PyCon 2024Extensible Python: Robustness through Addition - PyCon 2024
Extensible Python: Robustness through Addition - PyCon 2024
 
Measures in SQL (a talk at SF Distributed Systems meetup, 2024-05-22)
Measures in SQL (a talk at SF Distributed Systems meetup, 2024-05-22)Measures in SQL (a talk at SF Distributed Systems meetup, 2024-05-22)
Measures in SQL (a talk at SF Distributed Systems meetup, 2024-05-22)
 
How Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdf
How Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdfHow Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdf
How Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdf
 
Google I/O Extended 2024 Warsaw
Google I/O Extended 2024 WarsawGoogle I/O Extended 2024 Warsaw
Google I/O Extended 2024 Warsaw
 
Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...
Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...
Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...
 
AI revolution and Salesforce, Jiří Karpíšek
AI revolution and Salesforce, Jiří KarpíšekAI revolution and Salesforce, Jiří Karpíšek
AI revolution and Salesforce, Jiří Karpíšek
 
Microsoft CSP Briefing Pre-Engagement - Questionnaire
Microsoft CSP Briefing Pre-Engagement - QuestionnaireMicrosoft CSP Briefing Pre-Engagement - Questionnaire
Microsoft CSP Briefing Pre-Engagement - Questionnaire
 
Intro in Product Management - Коротко про професію продакт менеджера
Intro in Product Management - Коротко про професію продакт менеджераIntro in Product Management - Коротко про професію продакт менеджера
Intro in Product Management - Коротко про професію продакт менеджера
 
AI presentation and introduction - Retrieval Augmented Generation RAG 101
AI presentation and introduction - Retrieval Augmented Generation RAG 101AI presentation and introduction - Retrieval Augmented Generation RAG 101
AI presentation and introduction - Retrieval Augmented Generation RAG 101
 
ASRock Industrial FDO Solutions in Action for Industrial Edge AI _ Kenny at A...
ASRock Industrial FDO Solutions in Action for Industrial Edge AI _ Kenny at A...ASRock Industrial FDO Solutions in Action for Industrial Edge AI _ Kenny at A...
ASRock Industrial FDO Solutions in Action for Industrial Edge AI _ Kenny at A...
 
Integrating Telephony Systems with Salesforce: Insights and Considerations, B...
Integrating Telephony Systems with Salesforce: Insights and Considerations, B...Integrating Telephony Systems with Salesforce: Insights and Considerations, B...
Integrating Telephony Systems with Salesforce: Insights and Considerations, B...
 
Powerful Start- the Key to Project Success, Barbara Laskowska
Powerful Start- the Key to Project Success, Barbara LaskowskaPowerful Start- the Key to Project Success, Barbara Laskowska
Powerful Start- the Key to Project Success, Barbara Laskowska
 
Introduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdf
Introduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdfIntroduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdf
Introduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdf
 
Simplified FDO Manufacturing Flow with TPMs _ Liam at Infineon.pdf
Simplified FDO Manufacturing Flow with TPMs _ Liam at Infineon.pdfSimplified FDO Manufacturing Flow with TPMs _ Liam at Infineon.pdf
Simplified FDO Manufacturing Flow with TPMs _ Liam at Infineon.pdf
 
Syngulon - Selection technology May 2024.pdf
Syngulon - Selection technology May 2024.pdfSyngulon - Selection technology May 2024.pdf
Syngulon - Selection technology May 2024.pdf
 
Structuring Teams and Portfolios for Success
Structuring Teams and Portfolios for SuccessStructuring Teams and Portfolios for Success
Structuring Teams and Portfolios for Success
 
Breaking Down the Flutterwave Scandal What You Need to Know.pdf
Breaking Down the Flutterwave Scandal What You Need to Know.pdfBreaking Down the Flutterwave Scandal What You Need to Know.pdf
Breaking Down the Flutterwave Scandal What You Need to Know.pdf
 
Overview of Hyperledger Foundation
Overview of Hyperledger FoundationOverview of Hyperledger Foundation
Overview of Hyperledger Foundation
 
What's New in Teams Calling, Meetings and Devices April 2024
What's New in Teams Calling, Meetings and Devices April 2024What's New in Teams Calling, Meetings and Devices April 2024
What's New in Teams Calling, Meetings and Devices April 2024
 

Detect, protect, dis infect

  • 1. LOGO Detect, Protect, Dis- infect SafeSpaceOnline
  • 2.  Consumers Online Face Wide Choices in Security Products With new threats to computer security and data integrity a regular feature of the evening news, a panoply of products that promise to detect, protect, and dis-infect are being marketed to consumers. Intrusion detection systems, firewalls and anti-virus software are critical to online security, but the Federal Trade Commission, the nations consumer protection agency, says computer users from grade school kids to grandparents need to know exactly why they need online security products and what they're buying. .
  • 3. Why the Need Computers talk to each other over the Internet by sending data through their communications ports. If a port is open, it listens for communications from the Internet. A computer has thousands of ports: which ones are open depends on the software the computer is running. Hackers can eavesdrop or scan the ports to determine which are open and vulnerable to unauthorized access.
  • 4. Detection An intrusion detection system (IDS) monitors incoming Internet traffic, much like a security camera watches your front door to see who might be trying to come in. When the IDS detects a suspicious pattern, it sends an alert (and creates a record) that an intruder may be trying to break in to your computer. Some IDS alerts but not all show a pop-up message on your screen. An IDS alone cannot prevent an unauthorized entry into your computer; only a firewall can do that.
  • 5. Protection Firewalls block hackers access to your computer by creating a barrier like a wall between your ports and the Internet that allows you to control the data that comes and goes through your ports. Your firewall protects your ports even if you don't have an IDS. Sometimes a firewall is bundled with an IDS. If not, and if you want an IDS, be sure its compatible with your firewall.
  • 6. Dis-infection Anti-virus software detects and deletes viruses that are in your computer. Viruses often attach themselves to your computer through email attachments and floppy disks. That means a firewall cant catch them. Similarly, an IDS wont alert you when a virus is attacking your computer. Look for anti-virus software that recognizes current viruses, as well as older ones; that can effectively reverse the damage; and that updates automatically. By: Robert Rogers
  • 7. LOGO Read more at SafeSpaceOnline.com