Guide-Information Security Quiz: True or False?
Guide-Information Security Quiz: True or False
?
Dispelling some myths:
1 - I have a good antivirus and update it continuously. My computer is safe.
False: an antivirus, as well as a Antispyware protects the system from the threats they know, but not by the unknown. From when you enter a new threat to the network that the software is able to identify you can go from hours to days in this period of time the system is at risk ...
2 - Do not ever open emails from strangers. I can not be "infected" by email.
False: The flaw of the WMF is an example: simply highlight the email and preview it to be struck by the attack and who was using a client on Windows with thumbnail enabled was forced to select to delete it and therefore to preview. You can not know in advance when a flaw (bug) can be discovered and then exploited.
3 - I can not get any viruses if you do not surf any website
False: Although the majority of malware from spreading through the Internet and websites, there are other ways of "contagion." Leaving aside, however, the possibility (if any) of infection associated with removable media (USB devices, CD / DVD and others) continue to consider some possible attacks exploit or DDoS attacks that can happen even to the simple connection to your ISP without surfing with any browser.
4 - I have a powerful well-configured firewall. I feel comfortable not to receive attacks from outside.
False: firewalls (both software and hardware) to protect us from some types of attack. Moreover, they themselves can contain security flaws as it has for some routers Alice (Telecom Italy) or CISCO.
5 - I have the updated Antivirus, Firewall, an Anti-Rootkit and spyware filtering. I do not need to update the operating system.
False: "Seal" the flaws of a system for carrying out the updates and hotfixes (regardless of OS) is updated to take priority over the security programs. Some software, in fact, are only able to intercept the attacks, but not eliminate the cause and, therefore, is not exposed as long as you install the relevant patches.
6 - The use of long and complex password provides added security.
Partly true. A password is formed by characters with symbols and figures is more difficult to detect, but also to remember! If the password complexity leads to write it down on a sheet that you leave in plain sight in the office or at home, of course, is any less effective. Equally risky is keep it in a file. The best way to store passwords is to use a special software (itself protected with a password) that keeps track. In this way, we must remember one password to gain access to all the others.
7 - I scan with all security software, and many online services and was not detected anything. My system is clean.
False. As for point 1. We must also say that many current software and security systems offer a kind of heuristic detection that attempts to understand how and at what level some unknown applications behave. This makes it possible to intercept a potentially harmful action, but must also meeting with potential false positives.
8 - Some operating systems are safer than others
Partly true. Although the majority of malware circulating on the network is intended for Microsoft operating systems that does not mean that other systems are not exposed to risks. Do not forget that the malware is composed not only of "files" that are installed on your system, but also hoaxes, spam and network of various types that can steal information (and to disseminate or use for profit) regardless of the system. E 'on the user behavior that is based on safety, do not use the system ain. Enrolling in an online community that is not implementing a policy of treatment of data in an honest manner, for example, can lead to the same consequences that have a Trojan installed on your system.
Electronic News:
>>thinkpad x61 tablet battery
>>Dell XPS M1210 battery
>>Dell Inspiron 1520 Battery
How Security Hologram Stickers are Important Summary: Review Of Methods Commonly Used In The Securities Exam Review Summary - Review Of Methods - Use Of Weak Authentication Parameters Puts Information Security Of Over Million Individuals At Risk Securityshieldfraud Refuses To Be Removed - How To Get Securityshieldfraud Away From My Pc Foolproof Security Solutions With Innovative Technology Breast Actives Cream – Insecurities no More? How to Clean the XP Security 2011 - Uninstall/Remove the XP Security 2011 Virus Easily Are There Security Plugs in Your Messaging System? Fingerprint Security Lock - Benefits That Are Essential To Know Remove AV Security Suite - How to Remove AV Security Suite Completely UK Colocation Hosting for the Ultimate Security The Right Security System Server Based Computing Enhances Security – Reality or Myth?