Internet Security

Prevention of Computer Crimes (Cyber Crimes) while enhancing the safety and conservation of the Personal Information regarding with using Internet is meant by 'Internet Security'.

Internet Security is a part of the Computer Security which consider about the Network Security in a higher manner as it is connected with most of the applications such as the Operating System.

Internet Safety, Web Safety; Online Safety is also same with the meaning of 'Internet Security'.

Are we Safe On the Internet ?

(Internet Threats)

Internet is an useful network which offers us many services, where we can exchange so much of our information through this medium. Although we thought that it's the most secure & trusted way to exchange our information and to do our work, Internet is not that much secured as much as we thought. Sometimes we have to face many menaces knowingly or unknowingly.
The use of a computer involves various threats. Malicious Software / Malware or Malicious Codes cause serious harm to computers and networks in many ways such as,
  • Affect the efficiency of the computer (Improper Function, Unnecessary Attempts, Re-start again and again)
  • Destruction or mal-function of Software
  • Inability to install other software
  • Weaken Computer Hardware
  • Sabotage of Computer Networks
  • Data theft and destruction
  • Reduction of the Storage Capacity of the Hard Disk by storing unnecessary documents and files.
Here are some Internet Security Threats in Common
  • Computer Virus
  • Computer Worm
  • Trojan Horse
  • Adware
  • Bots / Botnet
  • Hijacking
  • Phishing
  • Spam
  • Rouge Security Software
  • Malicious Spyware
  • Rootkit
  • Hackers
  • Infected Websites
  • Back Doors
  • Malware
  • Brute Force
  • Denial of Service (DOS)
  • Wabbits
  • Exploit
  • Cookies
  • Distributed Denial of Service (DDoS)
  • Chain Letters
  • Mousetrapping
  • Pharming
  • SQL Injection

1. Computer Virus

Computer Viruses gain entry into the computer through a computer program and spread rapidly within the computer causing enough harm. Viruses can enter a computer through networks, a USB flash drive, external devices like memory chips, or through e-mails. Viruses enter to the system as executable files ( file format '.exe' ). All the Viruses come as .exe files; but all the .exe files are not viruses'. In other words the viruses always remain active within the computer.

2. Computer Worm

Computer Worms also act similar to Computer Viruses. Worms, however, are capable of acting and spreading alone using e-mail attachments, false websites and instant messages. Worms are produced using social engineering strategies.

3. Trojan Horse

The Trojan Horse (Spyware) is a harmful software based on the Greek Trojan Horse constructed using wood. It presents itself as harmless and enters the system without the knowledge of the user. Trojan Horse spyware makes the user uncomfortable by unnecessary opening up windows, producing different desktops, deleting documents and stealing data. Further, it allows other harmful software to gain entry. Trojan enters computer with e-mail attachments. However, unlike Computer Viruses and Worms, the Trojan Horse does not spread by itself.

4. Adware

The Adware (Spyware) is displaying unnecessary notices on the computer screen. Using these advertisements, adware collects commercial information. Adware is not harmful as other Computer Viruses but disturbs the user mentally.

5. Bots

Bots are derived from the word 'robots'. Bots is a harmful software that functions on its own communicating with other networks. Bots are used to collect personal information through Internet Messages and Conversations.

6. Hijacker

1. Browser Hijacking

Browser Hijacker is capable of misunderstanding a user to a different website through the Internet and collects information regarding trade, commerce and advertisements. Finally the user ends-up at a fake or disturbing site. Hijacker, is similar to adware.

2. Network Hijacking

Man-in-the-middle-attack can be consider as Network Hijacking. In this attack a Perpetrator (Hacker) hacks in to a communication of two or more parties secretly and receive their messages avoiding the receiver get the message, modify or edit the messages and sends back to them. The parties in the conversation think that they're messaging each other, but then true scenario behind the screen is totally different.

3. Website Hijacking

Here, the attacker creates and registers a domain name similar to a current active domain name. So when a user types the URL to visit, accidentally the user redirected to a corrupted site which the attacker registered under the same domain. As the analytics show, in many of the cases, the user get redirected to illegal sites such as porn sites.

7. Phishing

Phishing is the art of deceiving users to collect information about bank accounts or electronic accounts. E-mail is used for the purpose. Such mail is sent through a popular organization or a friend together with a link for access. With a click on the link, or by filling forms, valuable information and cash deposits related to the unsuspecting user get stolen.

8. Spam

Spam is unauthorized e-mail. Most often, spam relates to advertisements about products or a mail from an unknown person. The mail box can get filled with such mail and make the user uncomfortable. Also, Spam may collect e-mail addresses that can be used unlawfully for frauds.

How to be Safe on the Internet

As it is described above, it's not that much simple as we think of the Internet Security. It's not safe to use Internet that much unless we secure our selves on our own. There are many ways to be safe on the Internet.

1. Use Network Layers to Secure the devices

Protocols such as TSP / IP help us to secure our devices acting as security protocols. There are such many Security Protocols which we can use to get secured from Internet Threats.

2. Use Firewalls

To control access between networks, a Computer Firewall can be used. It filters unnecessary connections and block threats reaching the user. Also it has the ability to screen network traffic and block traffic which seems to act dangerous. Firewalls act as the intermediate server between SMTP and Hypertext Transfer Protocol (HTTP) connections.

3. Use a Secured Browser

As the Vulnerabilities are exploited in many different Browsers, it's a necessity to chose a proper Browser. As an example, 'Internet Explorer 6', which used to own a majority of the Web Browser market share, is considered extremely insecure because vulnerabilities were exploited due to its former popularity. So before using a Browser, we need to check it's security.

4. Use a Virus Guard

When using a Virus Guard, it helps us to detect and eliminate virus attacks. Therefor, we need to keep our installed virus guard, Updated make it more efficient and effective. There are many popular, secure Virus Guards and some of them are as follows.
  • AVAST Antivirus, AVG Antivirus
  • Kaspersky Antivirus
  • K7 Antivirus
  • McAfee Antivirus
  • Avira Antivirus
  • Norman Antivirus
  • Digital Defender Antivirus
  • Panda Cloud Antivirus (B)
  • Microsoft Security Essentials
  • BitDefender Antivirus
  • Norton Antivirus

5. Check whether the URL is 'Https:' rather than 'Http:'.

Https: is the secure version of 'Hyper Text Transfer Protocol' (Http:). The Protocol Https: is the protocol over which data is sent between the Browser of the User and the Website that the user us connected to. The 'S' in the end of 'Https:' stands for 'Secure'. That makes all the communications between the User's Browser and the website, are encrypted.
In 'Http:' there's a possibility for the Hackers to hack in to the user's connections and steal their data and information or spread Internet Viruses into their devices.
So you need to check whether the URL of the site you are engaged with, is with 'Https:'. Else know that there's a possibility of facing Internet Threats.

6. Use Strong Passwords

Use strong passwords for your private accounts, consisting 'Capital Letters', 'Simple Letters', 'Numbers' & 'Symbols'. Create a password that no one else can guess.

7. Scan downloaded files before using

8. Always install authorized software

9. Be careful when using external devises

10. Scan Secondary Storage Devices before using

11. Be careful with opening up e-mails

12. Do not click on suspicious links in e-mail. Avoid opening suspicious e-mails

13. Do not share your Security Information such as Passwords

14. Avoid suspicious advertisements advertisements or messages

15. Do not enter Personal Information without checking on Security


''Prevention is Better than Cure''

If you are a Online Shopping Lover, You must see this...
Stay Safe Online: 11 Tips You Should Keep In Mind To Stay Safe While Shopping Online


  1. You scared me bro. Your article is very straight forward and well written, you gain a new subscriber today. Thanks for the post again. 🙂

  2. It is actually so much informative and you've written it well to give all the readers a good knowledge. Well done!

  3. A much needed article on internet security, loved it buddy 👍🏻

  4. We all need more articles like this ones in my opinion, thanks for sharing it :)

  5. Great informative article, thanks for sharing!

  6. This is true and correct. There are many people who are just waiting for someone to be their victim. Prevention is always better than cure. Better safe than sorry

  7. This is such a great post with all into on security in one place. We all need constant reminders. thanks for sharing.

  8. A great article, thank you for taking the time to write about something very important that often gets overlooked.

  9. The internet is fabulous, but I'm constantly thinking about security online. Seems like no matter what precautions there's always still risk.

  10. Loved reading the ideas, and yes, 100% agree "prevention IS better than cure" in these cases.

  11. Nice informative article. I never thought of Internet security till I read this post Thanks for sharing :)

  12. This is so informative! Thanks for sharing this


Post a Comment

Popular Posts

TransferJet Technology

Unix Operating System - Pride over 50 Years

CryptoCurrency - Bitcoin

WiMAX Technology