Malwareaware

  • Subscribe to our RSS feed.
  • Twitter
  • StumbleUpon
  • Reddit
  • Facebook
  • Digg

Monday, 25 March 2013

What Does It Mean? Layered Defense

Posted on 14:30 by Unknown
These days, you can't read, hear. or see anything about computer security without catching the phrase "Layered Defense" or something like that. Well, the first thing you want to know is, what is it?

First, let's start with one layer of defense. Let's say you have an antivirus program. This should be enough, right? But the issue is, some malware can sneak past your antivirus or even disable the antivirus entirely. That looks a little something like this.


OK Defense. Some attacks blocked.
The Antivirus blocks some attacks, but some get to the computer and cause havoc.

How can we fix this issue? By using more then one layer. You can use Safe Computing for one.

Safe Computing is being smart before you click. Like I have said before, once you start thinking with your other head, you are a big target. Don't click on anything suspicious, and make sure you know what's real and what's not real.

You can also use a firewall. Security orientated firewalls block malware that attempts to access your computer via the network.

With these two extra layers in place, your "Layered Defense" looks a little more like this.

Better Defense. More attacks blocked.
So, the more layers you have, the less likely you are to get infected. If you still have trouble conceptualizing this, think of an onion. The more layers it has, the harder it is to get to the core.

And these three layers are just the beginning. You can add anything you like to increase your defenses based on your budget and your level of paranoia. And let us not forget that a little bit of paranoia when it comes to protecting what is important to you is a good thing. An example of top notch security would look a little like this.

Defense for the very paranoid. Most if not all attacks blocked.
 Now I am not about to suggest that you need to get all of this stuff. And there are some things in here that you may not know about. Stay tuned and we will discuss all of these unfamiliar aspects in future blog posts.
Email ThisBlogThis!Share to XShare to FacebookShare to Pinterest
Posted in What Does It Mean? | No comments
Newer Post Older Post Home

0 comments:

Post a Comment

Subscribe to: Post Comments (Atom)

Popular Posts

  • How to remove System Doctor 2014
    There is a new rogue AV making the rounds on the web called System Doctor 2014. For those that have just started reading my blog or for thos...
  • What are Bitcoin Miners?
    For my first post about Bitcoins, and for what I wish to be my last about the subject, we are going to be talking about what Bitcoin miners ...
  • How to keep spies from monitoring you through your computer or your phone.
    Those of you in The United States of America have most likely heard about that whole IRS scandal and the accompanying scandals of wiretappin...
  • Spotlight on Malware: The Gruel Worm.
    It's been around since Windows 2000, but there still is not a way to remove this worm without formatting the hard drive. I speak of the ...
  • I am going to be a billionaire!
    For those of you that have been reading my blog for some time, you know I like to mess with scammers, fake tech support and the like. But th...
  • Use VBScript to pull a joke on your friends.
    Do you want to play a trick on your friends, family, or coworkers? Well this one's for you. You can make a fake piece of malware on your...
  • Spotlight on Malware: MyDoom
    The MyDoom Windows worm, also known as Novarg, and Shimgapi will be the subject of our focus for this post. The MyDoom worm was first discov...
  • CryptoLocker as of 11/3/2013
    If you have read my other posts on this, you know. But for those of you who do not, there is a piece of ransomware that has been making the ...
  • The Big Game: Who's on our side?
    I recently helped a friend of mine remove malware from their computer when she be one mused on how lonely my job must be. "It must be s...
  • Java: No more coffee for you.
    Odds are that every blogger that has a tight focus on computer security has authored a blog post about Java. So why am I wasting your time? ...

Categories

  • Android
  • History Of
  • iOS
  • Java
  • Macs
  • Passwords
  • Removal Guides
  • Spotlight On Malware
  • The CryptoLocker Saga
  • What Does It Mean?
  • What's in a name?
  • Windows

Blog Archive

  • ▼  2013 (151)
    • ►  November (10)
    • ►  October (5)
    • ►  September (15)
    • ►  August (22)
    • ►  July (26)
    • ►  June (17)
    • ►  May (25)
    • ►  April (15)
    • ▼  March (7)
      • Malware Spotlight Double Header: Bagle and Netsky.
      • What Does It Mean? Layered Defense
      • What's In A Name: Rootkits
      • How do I make sure my Antivirus Software is protec...
      • Spotlight On Malware: The Conficker Worm.
      • Where did this whole issue with Malware begin?
      • My Take on Third Party Tech Support.
    • ►  February (6)
    • ►  January (3)
Powered by Blogger.

About Me

Unknown
View my complete profile