Tuesday, June 10, 2008

Computer Security 2: Deploying 3-Tier Defence

Continued from Previous Post
Alright! I'm back with this post to continue from where I've left off. The next step in securing your precious computer's OS is to implement a 3-tier defense against malware. A 3-tier defense structure includes: Anti-virus, Firewall(non-windows), Anti-Spyware.

Discalmer: All programs that I've mentioned below are governed by their respective copyrights and international laws. Apart from that, this post is prepared by the author(me) using information that is believed to be reliable and accurate, but I make no warranty as to the performance and reliability with regards to different user environments- And will not accept responsibility in an event of System Failure, Data Loss or any form of system abnormality. If you do not agree with any part of this disclaimer, please DO NOT click on any links in this post.

Step 2: Implementing your arsenal
Phase 1: Bring up the Anti-virus
In this phase, the most basic defence: anti-virus software, is being installed. My personal recommendation is 'AVG Free Anti-Virus'. With Version 8.0 launched on 24th April 2008, you can expect a more intuitive user interface, and better anti-virus, anti-spyware protection engine. Best of all, it comes free!


Direct download from AVG Free site Here
AVG Free 8.0 details Here

Phase 2: Deploy the Firewall
In my previous post I've mentioned crappy system firewalls. In order to leverage security, one has to posses a more capable firewall. 'ZoneAlarm Basic Firewall' is my nifty defence against programs and malware which slyly target your system when you install a program, open a file or browse the web. The FOC basic firewall protection covers your network and programs, sufficient for the layman user. What about the (Windows) System Firewall?- Disable it, as its plain trash and does nothing more than providing repeatedly irritating admin confirmation messages (for Vista), false alarms, and very "Helpful" advice.


Direct download from ZoneAlarm site Here
ZoneAlarm Basic Firewall details Here

Phase 3: Complete your protection with Anti-Spyware
No ah kong ah ma story to explain this- The crux here is to guard against Trojans, Root kits, Internet Cookies and other forms of Spyware from sniffing your personal details, account passwords, Internet surfing activities etc. The solution?- 'Spybot Search & Destroy'


Looking for the direct download link?
Here's a quest for you:
Look for and download the 'Spybot Search & Destroy' anti-spyware program installer Here
Quest Rewards:
-Anti-Spyware Protection
-Computing Experience

Phase 4: Scanning & Reinforcing
Now is the time to put the programs you've acquired into good use:
1: Scan for Spyware using Spybot Search & Destroy
2: Scan for Viruses using AVG Free 8.0
3. Make necessary adjustments to AVG Free 8.0 ,Zone Alarm Firewall & Spybot Search & Destroy. Details may include setting automatic scanning schedules etc.
*My above prescribed order is for the benefit of time.

Phase 5: Continuing your protection
-Remember to update all your programs regularly:
AVG Free 8.0: Everyday
Spybot Search & Destroy: At least once a week
ZoneAlarm Firewall: When the newest engine is released

-Scan your computer for malware regularly
-Never allow programs that you're unsure of past the ZoneAlarm Firewall
-Backup all your precious data in external devices such as a Thumb Drive or External Hard Disk

-Also note that for Anti-spyware protection, some sources recommend more than one program to handle the task. In my prescription, AVG Free 8.0 alongside with Spybot Search & Destroy provides the base level of protection, while Zone Alarm Basic Firewall comes in as a secondary form of user intervention. If you seriously want to consider a 4th measure, try Ad-Aware by Lavasoft.
Note: Do read my post on Ad-Aware vs Spybot S&D


Conclusion
Notice that all the programs in my prescribed solution are without trail dateline and best of all, free? With the best programs out in the market, reliable computing security can be achieved at no monetary cost. But most important of all, we cannot be complacent and must understand that there will always be loopholes in the Windows OS which are vulnerable to malware attacks. As such, we must always be on guard to handle the next attack... ironic isn't it?

No comments: