4.2 Threat limitation
To get the proper treatment of handling security threats, it is important to take a CISS (computer information science,
security) course. However, this subsection makes some general suggestions for those who want to pursue this
independently.
4.2.1 Virus check removable media
Even if you don’t run a virus checker contantly, it is important to virsu scan a removable media before using the contained
files. Some virus checkers, such as ClamAV, can target just a drive, a folder or a file.
4.2.2 Disable autorun
You can disable the autorun feature in Windows. Search for the method using a search engine. This means that in
order to install software, you need to explore the disk and manually execute the autorun script or set up
program.
4.2.3 Take a class
Security threats that come from a network is numerous. You can start with some common practices:
- Update the operating system with the latest patches. It is impossible to write an operating system that is
invincible. The key, then, is to repair security holes before they get exploited. This means that the delay of the
application of a patch can increase the risks of exposure. Keep in mind that hackers find security holes and
exploit them quickly.
- Use a firewall appliance. While a software firewall is useful, it still depends on the same operating system that
it protects. It is better to rely on a separate device to act as a network firewall. A properly configured firewall
(also called a residential gateway for home use) stops attacks that are initiated from the Internet. The key is
to choose a proven firewall, and properly configure it.
- Do not use an administrator account to surf the web or do anything that may be dangerous. Unfortunately,
Windows XP Home makes everyone an administrator by default. You need to specifically make a user a
non-administrator. This way, even if a non-administrator encounters malicious software, hopefully this helps
to limit the extent of damage. A properly configured and secure operating system should never get corrupted
if a normal user account is attacked.
- Pay attention to messages from your computer. Newer operating systems (and application programs) generate
warning messages when things get suspicious. Do not just click the “accept” or “continue” button.
- Install a continuous virus checker. Although a virus checker costs system performance, it does help to detect
and stop malicious software as it is downloaded about to execute. This particularly applies to malicious software
that is downloaded as a part of an email message.