Teach you how to prevent network security top ten threats (3)

  

Precautions: It is strongly recommended to install a safe and reliable malware removal tool - malware remover, an independently tested and effective security tool for preventing adware, rogue Software and fake security software are very useful.

However, if we really want to deal with this security threat, it is more necessary for the government and relevant departments to jointly crack down on crime and rectify the network environment.

Eight, Apple Mac is vulnerable to infection

Compared to Windows, there are far fewer malicious programs for Mac, and more people will still use financial services through Windows, so For the foreseeable future, this will also allow hackers to focus on the Windows platform. But we still recommend that Mac users use their computers in a safer way and get rid of complacency.

In April of this year, the emergence of Mac's first botnet showed that the Mac situation is not optimistic.




Precautions: Abandon the idea that "Mac is indestructible", you must prepare for the system and open the automatic update service at the same time as Windows users. At the same time, always pay attention to the various patches of third-party software.

IX, botnet

botnet is a growing cybersecurity threat today, botnets directly pose a great threat to users' information, privacy and even property. Unlike specific security events such as worms, phishing, and denial of service attacks, botnets are an attacking platform in the hands of attackers. With this platform, an attacker can bring various hazards to individuals or the entire network, but the specific hazards are unknown and flexible in static situations. Using botnets to launch different attacks can lead to flaws in the entire underlying information network or critical applications, as well as a large number of confidential or personal privacy leaks. Botnets can also be used to engage in other criminal activities such as cyber fraud.



An important part of a botnet is software that is secretly installed on multiple computers, which can be remotely controlled by a central controller. At first, botnets used worm technology to assemble a large number of zombie computers, use Trojan horses to implement remote control, and use Internet chat rooms to issue commands.

Today's botnets are usually able to detect the detection of defenders and can be invisible to the detector's detection mechanism. Some botnets can disable anti-virus and intrusion detection systems in a way that users can't detect.

Precautions: In general, botnets are geographically distributed, and it is difficult to determine the mode in which they attack computers. Relying on individuals and even individual security organizations, it is difficult to effectively fight against botnets. This is why domestic and foreign governments are emphasizing the reasons for security through cooperation. However, individual users have more security awareness and basic knowledge, which is very beneficial to reduce the threat of such security incidents.

Users want to turn on automatic system upgrades, set up complex passwords, and refuse to open suspicious messages and sites. Of course, security firewalls and anti-virus software are also essential and must be updated.

Ten, wireless network security threats

With the popularity of wireless networks, users have realized the dream of wireless Internet access in the home. At the same time, due to the exposure of wireless networks, it is easy to leave a hacker.



Since wireless networks rely on radio waves to transmit signals, it is impossible to limit the direction of signal propagation. In theory, anyone can read or receive wireless signals. Insert traffic on your network. That is, illegal users can also access your network without your knowledge.

In addition, for enterprises using WLAN, when someone adds a rogue AP to the network and WEP is turned off, one of the clients immediately gains access to your network. This vulnerability may not be dangerous when it exists alone, but it is a bad precedent because there may be malicious attackers in these passers-by that can exploit unpatched vulnerabilities somewhere in your network.

Precautions: For closed wireless networks such as home or corporate networks, access restrictions can be configured in network access, which can include encryption and checking of MAC addresses. For commercial providers, hotspots, and large organizations, the most popular solution is to use an open, encrypted network, but requires a completely isolated wireless network. Users can't connect to the Internet or any local network resources at first. Another option is for the user to securely connect to a privileged network using a VPN.

In addition, similar to the wired network, you need to deploy security measures such as firewall and identity verification. You can also reduce the transmitter power to reduce the network coverage, thus reducing the potential security risks.

Copyright © Windows knowledge All Rights Reserved