skip to content
The Georgia Centers for Advanced Telecommunications Technology invisible spacer gif
invisible spacer gif GCATT Home invisible spacer gif  About GCATT invisible spacer gif  GCATT Office of Technology Research invisible spacer gif  GCATT Office of Technology Commercialization invisible spacer gif  GCATT Office of Technology Policy & Programs invisible spacer gif  The GCATT Event Venue invisible spacer gif invisible spacer gif
invisible spacer gif  GCATT News invisible spacer gif invisible spacer gif
invisible spacer gif invisible spacer gif invisible spacer gif
invisible spacer gif invisible spacer gif invisible spacer gif
invisible spacer gif invisible spacer gif invisible spacer gif invisible spacer gif
invisible gif

Types of Internet security software

Types of Internet security software

Keep your secure computer security software. (Man Thinking About internet security image by patrimonio designs from Fotolia.com)

Although the can be for many useful and educational, it can also be quite dangerous, what is cyber security? The malicious, also known as malware can infect your computer, steal information and even destroy your . Fortunately, there are many tools you can use to help strengthen when you enter online.

Antivirus software

The most basic security program is the of . This periodically download small components known as “definitions” from a server, which help you identify the virus on your computer.Having this type of software on your device is essential, as it will get rid of all malware accidentally discharged and, hopefully, willprevent it disperses on your computer. However, the disadvantage is that only the antivirus deletes the malicious software after it has been identified or downloaded, and does not prevent the malware is introduced into your computer.

Firewall

Unlike antivirus software, a firewall can actually prevent the malware is downloaded to your computer. Additionally, a good firewall can prevent unauthorized users from accessing your network, which can help increase corporate security. A firewall works by monitoring the connections made to and from your computer. Any connection that is not part of a default or custom “whitelist” of approved connection is aborted automatically.

Pop-Up Blocker

The software for blocking pop-ups is also an essential component of the security scheme.Many viruses are introduced using this inopportune mechanics, but you can stop the appearance of these windows and tabs unauthorized software with a strong blocking these elements. Most modern programs of this type are integrated to your favorite as an extension to help stop these windows at the source, before they have a chance to appear and possibly infect your computer browser.


Home | About GCATT | Technology | Commercialization | Policy | Event Venue | GCATT News | Building | Directions | Contact Us

GCATT is a program of the Georgia Research Alliance The Georgia Research Alliance

If you experience problems with this site, please contact the webmaster