Firewall Vs Firewall

Improved Essays
Computers have become widespread in the modern world. Almost everyone now owns a computer, unlike the past where only a few people used a computer. Computers have become a necessity due to their increased usage. More threats arise with the widespread usage of the computers and hence they should be protected from the malware attacks to make sure that they are safe and efficient. These malware attacks are caused by a third party trying to access personal data from the computer as people tend to use computers to save their personal information. They mostly emerge from the increased usage of the internet and the web (Skoudis 26).
The usage of computers to save personal information, and business information, increase the urge for hackers to try
…show more content…
A firewall acts the role of a security guard on your computer. It is the first step to protecting your PC as it blocks unknown programs from entering the computer through the internet. There are two types of firewalls that could be installed in a computer, a software firewall, and a hardware firewall. These two safety nets serve a similar purpose of protecting the PC but in a different way. The software firewall is an application installed so as to perform its task while a hardware firewall is a device connected to the computer. The best type of firewall for a home computer is the software as it is easy to install and use. It is important to always make sure that the firewall is on at all times, especially when using the internet to ensure no entry of unknown …show more content…
This harmful software can be in the form of virus, Trojans, etc. Mostly they affect the speed of the computer, delete important files and create a window for hackers to access important files and personal information. It is important to have antivirus installed in the computer even though it is virus free. This protects the PC from future attacks and damage. Some of the antivirus are built with the ability to update automatically hence making them more efficient in protecting the PC from newly created viruses. This ability of the antivirus safeguards the computer at all times, especially in email protection and blocking

Related Documents

  • Improved Essays

    Encryption Of Cell Phones

    • 1692 Words
    • 7 Pages

    We protect our computer with anti-virus, anti-malware, and anti-spyware software. The software helps make our computers run efficiently by providing updates for different hardware and software. Our data is vulnerable without it. We are sending documents from our cell phones to our computers and back. 360 Security, Avast!, Trend Micro and McAfee are some company names that have made software to protect cell phone data in the same way.…

    • 1692 Words
    • 7 Pages
    Improved Essays
  • Superior Essays

    The first step is to get educated on ways to protect yourself against hacking, phishing, etc. Step two is to understand the common tactics hackers use and step three is to secure your computers and digital assets. You can follow these steps in order to make sure that you stay safe from the criminals lurking around the internet. I hope after reading this paper you will take some steps to try and make your computer at home the safest you can and that you will be extra careful with putting your personal information out…

    • 1245 Words
    • 5 Pages
    Superior Essays
  • Improved Essays

    Network security is all about keeping the network safe for all devices and computers on the system. There are certain measures and skills needed to keep a network safe. There are several people and illegal groups whose aim is to compromise network systems. The hackers or attackers themselves have a lot of procedures they use to compromise networks and cover up their mess in order for the network crime to go undetected. So not only…

    • 2212 Words
    • 9 Pages
    Improved Essays
  • Great Essays

    One of the greatest ways to prevent invaders from getting into your computer is to apply patches and other software fixes when they become available. By regularly updating your computer, you block outsiders from being able to take advantage of software flaws that they could otherwise use to break into your system. You should also…

    • 2603 Words
    • 11 Pages
    Great Essays
  • Improved Essays

    Impacts Of Hacktivisms

    • 1524 Words
    • 7 Pages

    With the onslaught of hacking and breaches in privacy by groups ranging from hacker cults to the NSA, individuals and corporations must take steps to protect themselves and their data to prevent any further damage. The impacts of coordinated hacking attacks are widespread and can affect any online services: ranging from PayPal to Sony’s PlayStation Network. A team of hackers, especially one with global support such as Anonymous advocate a policy called “hacktivism”. The concept of hacktivism usually involves using illegal means to target single issues while gaining collective support by a team to proceed with such hacks (Kelly, 2012). The attack conducted on PayPal took place in December of 2010; a Distributed Denial of Service (DDoS) attack…

    • 1524 Words
    • 7 Pages
    Improved Essays
  • Improved Essays

    Abstract- Modern technological advancement made our current internet on the pinnacle of everything related to information technology. However, it is always threatened by various types of security issues, which are mostly due to hackers, their bots and malicious scripts. They attacks, corrupts, collects and destroys the essential information in the system of the valuable organizations. To stop their such harmful and hazardous activities or to take preventive measures, most organizations now started to keep their own hackers who are known as ethical hackers or white hat hackers. This paper is based on what exactly an ethical hacker does, his protective system from illegal trespassing and on the field of ethical hacking with its various aspects.…

    • 1032 Words
    • 5 Pages
    Improved Essays
  • Superior Essays

    Chapter 3: The Cyber World The cyber world or cyberspace is an online environment of computer networks through which you can communicate with other people. It provides users with ways to conduct business and network with other people as easily as they do in the physical world. For example, online shopping has reduced trips to the market and social networking sites allow you to connect with friends staying thousands of miles away. In addition to all the benefits, there are some serious concerns too that the cyber world offers. Let’s learn more about the dangers of the cyber world so that we can keep ourselves safe.…

    • 1304 Words
    • 6 Pages
    Superior Essays
  • Decent Essays

    Software testing, account testing and website testing is loaded with risks. If the worst happens, such as if a program goes rogue, if a program wrecks your hardware, if your information is stolen, and so forth, it is a good idea to have a few contingency plans. Your personal contingency plan should depend on your methods and the types of software you are testing. With that in mind, here are a few elements you may wish to enter into your contingency plans. Burnable Email Addresses The first piece of advice is an easy one, as a tester and as a hardcore Internet user, you should have more than one email address.…

    • 1060 Words
    • 5 Pages
    Decent Essays
  • Improved Essays

    How To Make My PC Fast

    • 918 Words
    • 4 Pages

    Another vital step that enables the PC to run fast is to run a disk defragment. The disk defragmentation reconfigures the way the data is stored in the hard disk drive for increased efficiency. Defragmenting process is quite simple. Visit the My Computer, right click on the HDD, and opt for the properties, visit tools and then click on the option Defragment Now. Keep the hard disk drives free from errors For a faster PC download or gaming experience, it is all the more important that the hard disk drives of the personal computer is free from any errors.…

    • 918 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    Port Scanners are very useful in identifying open doors in which information can go in and out. They can be useful as well as harmful to networks, which is why it is seemly important that we know what ports are opened and closed. It’s important to understand that there is no way to stop someone from port scanning your computer, while you are on the Internet because when you access an Internet server it opens a port, which opens a door to your computer. However, there is software out there that can aid in the fight against port…

    • 1187 Words
    • 5 Pages
    Improved Essays

Related Topics