Chapter 4: Computer and Network Securit y
According to Techopedia, a network is a group of linked computers intended to allow the computers to share information amongst one another, like the internet, local area network (LAN), and wide area network (WAN). These networks can only exist if devices have a medium to transmit data through. This medium connects hardware together which allows the transfer of data and communication.
Description: Accenture-World-Network
Today, these hardware components include PCs, intercommunications, switches, routers, WLAN devices, and servers. Without computers to connect to one another, there would be no need for a network. That being said, PCs are a critical component of networks. Each individual computer is referred to as a node in a network.
As the internet has evolved over the past decade, so have hackers. Network security has become one of the most crucial factors companies consider because of the continuous growth of computer networks. Big corporations like Microsoft are constantly designing and building software products that need to be protected against hackers and foreign attackers because these are the kinds of people who will stop at nothing until they get what they want.
The more network security an individual has, the less chance there is of a hacker accessing their data and files.
Network security is the process by which measures are taken to prevent unauthorized access, misuse, or modification of information passed over a network. In other words, network security simply means that any computers accessing a private network are protected from any forms of cyber theft or manipulation. 
Network security
There are three ways to better protect a network, these are:
  • Intrusion detection systems
  • WPA/WPA2 which stands for Wireless Protected Access.
  • Security Sockets Layer/Transport Layer Security (SSL / TLS).
Intrusion Detection Systems
These systems are software programs designed to protect networks. They are intended to monitor server channels and detect malicious programs being sent across these servers. There are two types of systems. The first is known as IPS (Intrusion prevention system), this is a more secure software that not only monitors server channels, but it can also block and remove any malicious programs it detects. This type of system doesn’t need human involvement to protect a computer or network. The second kind of IDS (Intrusion detection system) is less protective in that it only monitors a server and alerts a user to a threat if one is found. These programs will not destroy or quarantine any malicious software. Of these, they eigher are network based or host based.
Wireless Protected Access
Wireless protected access, also known as ‘WPA,’ is a form of network encryption. There are two types of this security system, WPA, and WPA2. Both are more secure than the traditional WEP security found on old routers and WPA2 is the most secure, currently. Most modern routers found in stores today offer WPA2 encryption levels. The reason why both security features are useful is because they make it more difficult for an attacker to get into a wireless network. WPA2 offers a higher and more complex security layer by using different key setups for network access. This means that WPA2 makes it harder for an attacker to crack a password for a wireless network. The Preshared key is the wifi key used to access the wireless network. The longer and more complex the password is, the harder it is to crack a wireless network PSK (PreShared Key)
Security Sockets Layer / Transport Layer Security
Secure Sockets Layer (SSL) is a form of internet protection provided by encryption. Its purpose is to encrypt any data you send over a network to prevent anyone else on your network from seeing the actual information being transferred. SSLs are very important for anyone entering private information into a website. They work by verifying what is known as a website digital certificate. A certificate is what websites use to verify themselves. When you connect to a website, the server the website runs on sends you its certificate to verify its authenticity. A website can only acquire these certificates by applying for them, and they have to follow a strict set of security guidelines.
So, to keep this from getting complicated, if a website has a credible website certificate using SSL, any information you send or receive from that site will be encrypted and safe from any possible attackers. Note that SSL is now out of service, TLS is the new standard, primarily the latest version which is TLS  1.3.
Also, you can see if a website is secure by looking for the “https” check mark in the URL at the top of your internet browser.
Computer security
Computer security, on the other hand, is the protection of data physically stored on a computer. This includes taking steps to prevent attacks under the triad of information security, also known as CIA (confidentiality, integrity, and availability). 
A few of the basic methods below pertain to computer security and will cover passwords, software updates, firewalls, anti-virus or malware programs, ad-blockers, email encryption, and data backups.
Having a good password
Of all the things anyone can do to secure their networks and devices, it is to create and maintain good, complex, long passwords.
A good password consists of three basic qualities: Its length, the characters used, and the combination of upper and lower case letters. The longer a password is, the harder it is to break. Some hackers try to use algorithms in which they send massive amounts of combinations, hoping that one is a match to the secret password. By increasing the length of a password, its chances of being cracked decreases.  
A mixture of letters and symbols such as exclamation marks help protect your password from being stolen. This also applies to adding uppercase letters into your password. A password such as ‘password1’ is VERY weak in comparison to a password like “PasSWord&%#201*8!” The combination of upper case letters and symbols decreases the chances that a password can be hacked through brute force scripts.
Another method you can use to create incredibly secure passwords is getting a program like ‘LastPass’ or ‘Password Boss.’ These programs randomly create a password that is incredibly secure. Using a program like this will provide a unique password for everything a person uses. This means that if a hacker can get into one of an individual’s accounts, they will not have the password for the other programs or web services.
Software updates
Software updates are very important as they protect your computer or mobile device. Software updates are used to patch holes or bugs found in an operating system, and this will make your device more secure. Check your operating system often to see if a new update is available. Some operating software update automatically.
Firewalls
Firewalls are great protection for computers because they prevent unwanted data from getting to your computer. They monitor the flow of incoming data and run checks to see if the information that’s about to be received by your computer is harmful or not. For example, anytime a user downloads something from a website, the firewall will scan the file in question and determine if it is malicious or not. Not all firewalls are the same. Most operating systems come with a built-in firewall, so there is hardly a reason to install additional firewalls. Also, these OS companies are constantly updating their security features to make them more reliable. Firewalls prevent unauthorized access to or from a private network. 
Antivirus software
One of the most effective and common methods of dealing with malware is anti-malware software. Programs such as Windows Essentials, McAfee, and Bitdefender allow a user to run scans on a system to search for infected files. If any files are found to be corrupted, these programs alert the operator, allowing him or her to remove the files in question. This type of software is also very useful as they can scan any downloaded items or email attachments before allowing the user to download them. This is a crucial protective barrier, as it prevents any malicious programs from installing itself on a device.
These types of softwares can also analyze what kind of virus, worm, or Trojan has infected the computer in question. (The types of threats are described more in chapter 3). This kind of protective software will remove anything malicious automatically from the computer but will be unable to recognize threats such as ransomware or keyloggers.
Ad blockers
Most browsers have extensions that can be added to the browser which blocks pesky advertisements. For example, the Google Chrome web store has a variety of additional extensions users can download and run while using the browser (not all being adblockers). Chrome has an adblocker made specifically for the Chrome browsers which limit the number of ads that pop up while you visit websites. Ad blockers can also be downloaded directly onto the computer’s hard drive instead of a web browser. 
Description: 00003.jpeg
Chrome Adblocker in browser
Email encryption
Encryption protects emails by making the content of emails unreadable to any entity, besides the intended recipients. Popular email services such as Gmail have since added encryption of emails to their network. However, it only protects data that’s on their servers. This means that data is still vulnerable while it bounces around on other internet networks unless users implement client- side encryption. Most methods that allow this are complicated processes that require exchanging certificates with everyone who will be receiving or sending emails with one another.
Fortunately, there is an alternative called Virtru that works with Gmail accounts as well as Outlook. This allows users real, client-side encryption without the prolonged process of exchanging certificates. Virtru is a plug-in that users can download onto their web browsers to freely send and accept emails from Outlook or Gmail accounts without any compatibility issues (Virtru Corporation, 2015).   FlowCrypt is another great, FREE web browser encryption application for web-based email.
Data backups
Data backups are an important but overlooked aspect of computer security. By performing regular backups of all important data on a computer, the user protects themselves from the risk of a crash or virus and lose important data. Data backups typically upload data to an outside source, either to a cloud storage server, or a storage device. Any data that isn’t backed up can be completely lost if the computer hardware fails or data is corrupted. Like the old saying, “It is better to be safe than sorry.” There are so many options for backing up data today, there really is no excuse. We have multiple cloud platforms to choose from some which are free like Google Drive, G Suite and Amazon Free tiers.
In addition we have many hardware drives to choose from for daily automatic backups, which work great in tandem with cloud backups (you can even use the hard drive to bacl up yoru cloud account as well).
Failed security
If both security types fail, what could be put at risk? The types of information hackers may attempt to steal is divided into two categories: personal and financial. Regarding personal information, a hacker could use it to create fake web accounts, social media accounts, or a new identity altogether. The rampancy of identity theft today is fueled by the enormous amounts of information that can be collected from the internet. According to the identity protection service LifeLock, in 2017, 16.7 million people were victims of identity theft, resulting in $16.8 billion being stolen. In 2016, 15.4 million people were victimized, resulting in a loss of $16.2 billion. Over the past three years, the number of people who are victims of identity theft increased by 3.6 million. 
With financial information, it all comes down to the individual’s money. A hacker can use the stolen financial information to make online purchases, apply for loans, or go as far as to file tax returns under the victim’s name. It is of the highest importance that both types of information remain protected and accurate. 
According to the US government, there are several diverse types of identity theft that the general public could fall victim to: