What precautions must be taken to improve internet security


Asked by admin @ in Computer Science viewed by 277 People


What precautions must be taken to improve internet Security?​

Answered by admin @



Answer:

Install Antivirus and Antimalware

The first thing you should do before connecting any new computer, tablet, or smartphone to the Internet is install strong antivirus and antimalware software to keep it safe. These programs proactively stop malicious software and scripts from running on your device in the first place. If they do manage to be installed, these programs will effectively remove them.

For $20-$40, you can purchase one of the BEST ANTIVIRUS PROGRAMS on the market in 2017, including McAfee, Webroot SecureAnywhere, BitDefender, Norton by Semantic, Kaspersky, and Avast. Each program also has a free version, though you’ll have the best, real-time protection with the paid version.

Malwarebytes, Ad-Aware, Spybot Search and Destroy, and Emsisoft are all GREAT ANTIMALWARE PROGRAMS. The best protection is a mixture of two services, as one may be faster resolving a zero-day infection. Be sure to install on every device that accesses the Internet to keep your whole network safe.

2) Configure Your Firewall

Firewalls help control traffic on your network, opening and closing communication ports as necessary to allow internet connectivity as needed. Configuring your firewall sets rules, so it’s more difficult for hackers to exploit webcams, printers, and other open ports you may not even realize are open otherwise.

Although Windows has a default firewall program, many of the programs listed above have security precautions that include a firewall. Also, there are free and paid apps like PEERBLOCK and ZONEALARM that provide a firewall.

Unlike antivirus and antimalware, it’s best to stick to one firewall problem. Multiple programs running at the same time can cause massive configuration issues with streaming, gaming, and other online activities. They’ll ultimately cancel each other out and leave you more vulnerable online.

Configuring your firewall to work in conjunction with your antivirus and antimalware software is the best way to provide maximum device-level protection from malicious code.

3) Protect Your Home Network

These days, we live in an age where TVs, appliances, light bulbs, speakers, and other devices connect seamlessly to the Internet, often without user interaction. Nearly everyone has WiFi in their homes, and protecting that wireless signal is essential to keeping your data and devices safe.

Start by updating the firmware on your router/modem, and installing a firewall on the modem itself. This protects your IoT and connected devices that aren’t as easy to monitor as phones and computers.

Change the default password (especially the admin one to gain control over the device) and network name. Setup WPA encryption and consider whether or not you need to broadcast the network SSID. For maximum protection, a MAC filter is used by many enterprises and public WiFi networks to track usage and can be enabled on your home modem.

Keep your password safe, and if you have guests, connect them to a separate network to maintain the integrity of your core home network. Once this is set up, you can connect network storage and automation to create a truly modern smart home.

4) Use VPNs and Proxies

Now that your network is safe, you need to secure the traffic even further by using VPNs and proxies. With these programs, you remove geographic restrictions and create secure connections between devices and your home network from anywhere in the world.

A proxy server is a server where your traffic is rerouted to, in order to disguise your IP address, and a VPN is a particular type of proxy that reroutes all device traffic instead of just one program. Whether you’re at work, commuting, or at the store, you’ll have a safe and secure connection using military-grade encryption.

A variety of VPN programs exist, but we’re obviously biased toward Private Tunnel, which is based on the OpenVPN protocol and provides unlimited traffic for ONLY $29.99/YEAR.

Now that you have everything in place, you need to keep it updated.

5) Keep Everything Updated

Back in 2011, SONY’S PLAYSTATION NETWORK WAS HACKED, creating an outage and subsequent PR nightmare that cost Sony tens of millions in compensation and more. It’s one of the biggest hacks of modern times, and it could have been avoided if Sony had kept up with Apache server upgrades.

Missing a crucial security patch by just a few weeks was enough to leave one of the largest corporations in the world vulnerable to attack. That’s all it takes for everything to be changed by one malicious actor with a computer.

Having antivirus software is worthless if you don’t keep it updated.

It’s important to stay safe online, but it’s not hard. And just as you take precautions to protect your physical home, it isn’t all that different when it comes to the world of cyber: security precautions are just the natural steps to keep yourself safe. And if you follow these online security tips, 2019 will be a great and safe year for you

Explanation:

Hope it helps plz mark me as brainliest and then thanks my answer plz plz plz


Similar Questions

What precautions must be taken to improve online security

Asked by admin @ in Computer Science viewed by 316 persons

What precautions must be taken to improve internet Security?​

What precautions must be taken while taking antibiotics

Asked by admin @ in Biology viewed by 286 persons

What are antibiotics? What precautions must be taken while taking antibiotics? NCERT Class VIII Science - Main Course Book Chapter 2. Microorganisms: Friend and Foe

What are the precautions taken to eradicate malaria

Asked by admin @ in Biology viewed by 326 persons

What are the precautions taken to eradicate malaria

Which precautions you have taken in porating of microscope

Asked by admin @ in Biology viewed by 1818 persons

Q.5 Which precautions you have taken in porating of microscope?​

What precautions should be taken while measuring rainfall

Asked by admin @ in Geography viewed by 309 persons

2. What precautions should be taken while measuring rainfall, to ensure accuracy​

What precautions should be taken while taking antibiotics

Asked by admin @ in Biology viewed by 287 persons

What are antibiotics? What precautions must be taken while taking antibiotics? NCERT Class VIII Science - Main Course Book Chapter 2. Microorganisms: Friend and Foe

What precautions should be taken while storing harvested grains

Asked by admin @ in Biology viewed by 354 persons

What precautions should be taken while storing grain?

Which protocol is used for secure communication over internet

Asked by admin @ in Computer Science viewed by 317 persons

Which protocol is used for secure communication over internet?

What precautions should be taken while spraying weedicides why

Asked by admin @ in Science viewed by 308 persons

What precautions should be taken while spraying weedicides ​

What precautions should be taken while storing the grains

Asked by admin @ in Biology viewed by 294 persons

What precautions should be taken while storing grain?

What were the precautions taken by the prison authorities

Asked by admin @ in English viewed by 282 persons

B) What were the precautions taken by the prison authorities? in 100 to 120 words​

Measures taken by the government to improve education in india

Asked by admin @ in Social Sciences viewed by 270 persons

What are the steps taken by the government to improve education status of india

Overcoming fixed mindset: a step-by-step guide to cultivating a growth mindset

Asked by wiki @ in Health viewed by 1262 persons

Which of the following would best complete this list?

Asked by wiki @ in Social Studies viewed by 727 persons

What had the king decided to do before he saw the spider

Asked by vanshika149 @ in English viewed by 1120 persons

Most viewed questions in Computer Science


A programmer mistakenly writes gor instead of for

Asked by admin @ in Computer Science viewed by 19019 persons


Domestic data entry operator ncert book class 9 solutions

Asked by admin @ in Computer Science viewed by 15806 persons


Information technology code 402 class 9 solutions chapter 1

Asked by admin @ in Computer Science viewed by 10971 persons



Ncert solutions for class 8 computer chapter 1 computer system

Asked by admin @ in Computer Science viewed by 10401 persons


A scrum team works on a 4 weeks sprint

Asked by admin @ in Computer Science viewed by 8721 persons


Which of the following occupies more memory in c

Asked by admin @ in Computer Science viewed by 8135 persons



A database of motor vehicles has the base entity

Asked by admin @ in Computer Science viewed by 7841 persons


The network architecture can be termed as a mcq

Asked by admin @ in Computer Science viewed by 6486 persons


Cat5 and cat6 cabling refer to which reference model layer

Asked by admin @ in Computer Science viewed by 5788 persons



Class 7 computer chapter 3 questions and answers

Asked by admin @ in Computer Science viewed by 5692 persons


Choose the correct options about usability and user experience

Asked by admin @ in Computer Science viewed by 5474 persons


Which advocates daily team meetings for coordination and integration

Asked by admin @ in Computer Science viewed by 4980 persons



Which three security features match the database security level

Asked by admin @ in Computer Science viewed by 4970 persons


Which of the dbms package is not available

Asked by admin @ in Computer Science viewed by 4684 persons


________ aid a business grow and attain its objectives

Asked by admin @ in Computer Science viewed by 4487 persons