2. INDEX
● Computer security. What should we protect ourselves?
● Active and passive security
● Malware and threats Silent
● Malware and silent threats
● Computer security software
● Web Security
● News related to cybersecurity or computer attacks
3. Computer security. What should we protect ourselves?
Use strong passwords.
Separate work from personal.
Keep the router in good condition.
Security tools.
Everything updated correctly.
Securing Io devices.
Protect wireless networks.
Opt for a VPN.
4. Active and passive security
Active security is
responsible for preventing
computer systems from
suffering any damage. The
objective of passive security
techniques is to minimize the
effects or disasters caused
by an accident, a user or
malware to computer
systems.
5. Malware and threats Silent
Malware is a general term to refer
to any type of “malicious software”
designed to infiltrate your device
without your knowledge. There are
many types of malware, and each
finds its targets in a different way.
However, all variants share two
defining features: they are
surreptitious and actively work
against the interests of the person
attacked.
6. Malware and silent threats
Our computer is exposed to a
series of small programs or
malicious software that can enter
the system through emails,
browsing false or infected web
pages, the transmission of
contaminated files from media
such as magnetic disks, memory,
CD, DVD, etc. We can find the
following types of malicious
software:
● Computer virus
● Computer worm
● Trojan
● Spy
● Dialers
● Pharming
● Phishing
7. Computer security software
A computer security
software is a program that
serves to protect the privacy
of the information contained
in a computer system. This
solution allows companies to
guarantee the security of
their data and protect
themselves against possible
computer attacks.
8. Web Security
Web security requires
vigilance in all aspects of the
design and use of a website.
This introductory article
won't make you a website
security guru, but it will help
you understand where
threats come from and what
you can do to harden your
web application against the
most common attacks.
9. News related to cybersecurity or computer attacks
A computer attack is an attempt to
access your computer equipment or
servers, by introducing viruses or
malware files, to alter its operation,
cause damage or steal sensitive
information for your company.
- Phishing attacks.
- Malware attacks.
- Web attacks.