Main » 2011 » Март » 16 » Winning the security model
14:00
Winning the security model
In the yard - in 2007, and the malicious software is already in the last year reached a record level of growth and technological sophistication. Many of us on his experiences have been exposed to spyware, viruses, worms and other malicious programs, and therefore wisely decided to take the appropriate steps to protect themselves.

Even those who escaped infection, is seriously resort to measures to ensure safety on the Internet. Everyone needs a reliable protection, covering as much as possible areas of risk and ability to protect your network, while not hindering the work.

But where to focus your search for security - for antivirus, firewall, integrated solution, or something else? Agnitum talks about how to choose the best combination of tools to counter modern threats. An article for the newsletter "In the world of security" was written to help you make informed choices, with short videos and simple descriptions, we show how modern malware infects a computer, and show why it should be a specific guide to action.

Security in theory

In essence, the computer is safely protected from most threats, if the following basic requirements:

1. There are elements of proactive protection. These may include intrusion prevention system (Host Intrusion Prevention Systems, HIPS), and their immediate relatives - stops the activity, behavior analyzers, tools, operating systems and security barriers to privilege escalation, as well as firewalls and other solutions that proactively confront threats, trying to accelerate or spread on a computer.

2. There are elements of reactive protection. They include traditional anti-virus and anti-spyware programs, as well as other products based on the signature scan and heuristic analysis.

3. Present understanding of the user key aspects of safe operation on the computer, including knowledge of the key functions of the system by working files and programs, understanding the need for software updates and other aspects of safe behavior on the network, high profile on portals such security as this one.

Interested? Read and watch the video>>
Views: 675 | Added by: w1zard | Rating: 0.0/0
Total comments: 0
Имя *:
Email *:
Код *: