Kolkata Computers - Internet Security

When a computer connects to a network and begins communicating with others, it is taking a risk. Internet security involves the protection of a computer's internet account and files from intrusion of an outside user.[1] Basic security measures involve protection by well selected passwords, change of file permissions and back up of computer's data.

Security concerns are in some ways peripheral to normal business working, but serve to highlight just how important it is that business users feel confident when using IT systems. Security will probably always be high on the IT agenda simply because cyber criminals know that a successful attack is very profitable. This means they will always strive to find new ways to circumvent IT security, and users will consequently need to be continually vigilant. Whenever decisions need to be made about how to enhance a system, security will need to be held uppermost among its requirements.

You cannot eliminate security risks, but you can manage and mitigate the risk. The key to a successful security strategy is usually described as "Defence in Depth". The idea behind this is simple - you don't rely on a single protection for security, so that if one part of your security system is breached, the attackers only get as far as the next layer of security.


A firewall is a software program that has the ability to block any unauthorised ports on the computer. Firewalls are set up to record data of connection details.[2] There are three different types of firewalls. A stateful firewall is a more secure form of firewall, and system administrators often combine a proxy firewall with a packet-filtering firewall to create a highly secure system. Most home users use a software firewall. These types of firewalls can create a log file where it records all the connection details (including connection attempts) with the PC.

Anti virus

Software programs such as antivirus software are the most useful in protecting your computer from harmful viruses. These programs are used to detect and eliminate viruses. Anti-virus software can be purchased from any software vendor or downloaded off the internet. Care should be taken in the selection of anti-virus software, as some programs are not very affective in finding and eliminating viruses or malware. Also, when downloading anti-virus software from the Internet, one should be cautioned that some websites say they are providing protection from viruses with their software, but they are really trying to install malware on your computer by disguising it as something else.

Wifi & Wireless

Wi-Fi allows local area networks (LANs) to be deployed without cabling for client devices, typically reducing the costs of network deployment and expansion. Spaces where cables cannot be run, such as outdoor areas and historical buildings, can host wireless LANs.

A wireless access point (WAP) connects a group of wireless devices to an adjacent wired LAN. An access point is similar to a network hub, relaying data between connected wireless devices in addition to a (usually) single connected wired device, most often an ethernet hub or switch, allowing wireless devices to communicate with other wired devices.

WEP encryption can protect against casual snooping, but may also produce a misguided sense of security since freely available tools. These softwares can quickly recover WEP encryption keys in under a second; newer tools can use some sort of attack to crack a WEP key with a 50% success rate using only 40,000 packets. The newer Wi-Fi Protected Access (WPA) and IEEE 802.11i (WPA2) encryption standards resolve most of the serious weaknesses of WEP encryption.

About Us | Request Free Quotation | AMC Terms & Conditions | Our Services | Contact Us | Useful Links | Working Hours | Computing Tips | Service Centers
Design by KolkataWebHosting.com
(C) Copyrights 2005-2024 by Kolkata Computers, All rights reserved. Legal | Terms | Sitemap