Hope is what makes us strong. It is why we are here. It's what we fight with when all else is lost.

Sunday, 3 May 2015

12th Week: Solutions for The Threats Faced by Air Asia and Its Consumers (Part 2)

Sunday, May 03, 2015 Posted by Unknown No comments



How about security solutions for customer? Especially we all know that most of the computer reservation system for Air Asia is done in the personal computer or laptop. There are several ways that can be done by the costumer to prevent from security threats, especially from the one that is attacking their personal information, such as credit card information:
1.     Protect your computer with strong security software and keep it updated. Anti-virus provides proven PC protection from Trojans, hackers, and spyware. Its integrated anti-virusanti-spywarefirewallanti-spamanti-phishing, and backup technologies work together to combat today’s advanced multi-faceted attacks. It scans disks, email attachments, files downloaded from the web, and documents generated by word processing and spreadsheet programs.
2.     Use a security conscious Internet service provider (ISP) that implements strong anti-spam and anti-phishing procedures. The SpamHaus organization lists the current top-10 worst ISPs in this category—consider this when making your choice.

3.     Enable automatic Windows updates, or download Microsoft updates regularly, to keep your operating system patched against known vulnerabilities. Install patches from other software manufacturers as soon as they are distributed. A fully patched computer behind a firewall is the best defense against Trojan and spyware installation.

4.    Use great caution when opening attachments. Configure your anti-virus software to automatically scan all email and instant message attachments. Make sure your email program doesn’t automatically open attachments or automatically render graphics, and ensure that the preview pane is turned off. Never open unsolicited emails, or attachments that you’re not expecting—even from people you know.

5.    Be careful when using P2P file sharing. Trojans hide within file-sharing programs waiting to be downloaded. Use the same precautions when downloading shared files that you do for email and instant messaging. Avoid downloading files with the extensions .exe, .scr, .lnk, .bat, .vbs, .dll, .bin, and .cmd.
6.    Use security precautions for your PDA, cell phone, and Wi-Fi devices. Viruses and Trojans arrive as an email/IM attachment, are downloaded from the Internet, or are uploaded along with other data from a desktop. Cell phone viruses and mobile phishing attacks are in the beginning stages, but will become more common as more people access mobile multimedia services and Internet content directly from their phones. Mobile Anti-Virus software for a selected devices is available for free with some McAfee PC products. Always use a PIN code on your cell phone and never install or download mobile software from a un-trusted source.

4.     Configure your instant messaging application correctly. Make sure it does not open automatically when you fire up your computer.

5.     Beware of spam-based phishing schemes. Don’t click on links in emails or IM.

6.     Back up your files regularly and store the backups somewhere besides your PC. If you fall victim to a virus attack, you can recover photos, music, movies, and personal information like tax returns and bank statements.


10.     Stay aware of current virus news

Written by Andina F.S

0 comments:

Post a Comment