Internet
Fact-checked

At WiseGEEK, we're committed to delivering accurate, trustworthy information. Our expert-authored content is rigorously fact-checked and sourced from credible authorities. Discover how we uphold the highest standards in providing you with reliable knowledge.

Learn more...

What Is the Relationship between Internet and Computer Security?

Jessica Ellis
Jessica Ellis
Jessica Ellis
Jessica Ellis

Internet and computer security are linked concepts for any person who owns a computer with Internet access. While the Internet can provide many tools to protect against hacking and viruses, it is also the primary source of these major computer security threats. Attaching a computer to the Internet introduces greatly increased risks for security breaches. Nevertheless, Internet and computer security can both be improved through precautionary measures, such as anti-virus protection, firewalls, and Internet safety techniques.

Computer security helps protect personal data and information from being viewed or uploaded by unauthorized users. In a computer that does not have an Internet connection, most security precautions will revolve around preventing access to a user that physically takes over the computer. Password protection and encryption programs are two types of computer security that prevent a thief or unauthorized user from getting at information stored on a computer. Once a computer is hooked up to the Internet, however, threats become far more prevalent and complicated. In addition to password protection and encryption, Internet-using computers may require many additional programs and procedures in order to provide adequate protection from hackers and viruses.

Local area networks need buffers between the network and the Internet.
Local area networks need buffers between the network and the Internet.

Good Internet and computer security will help prevent hackers from accessing computer files. One primary method for hacking prevention is a hardware or software program known as a firewall. Firewalls are a type of customizable protection, which acts as a checkpoint for all incoming and outgoing information on a computer or network. If a piece of information does not conform to a firewall's settings, it will not be permitted to pass through the system without permission. Most modern operating systems provide a built-in firewall, but external applications can also be purchased for those who wish supplemental firewall protection.

Malicious computer viruses may be downloaded from the Internet.
Malicious computer viruses may be downloaded from the Internet.

Internet and computer security also aim to protect a network from viruses, which are user-created programs that can perform specific, often harmful, actions if they are accidentally downloaded. Viruses can be used to gain information for identity theft, allow hackers to send spam using a victim's email contacts, or perform needlessly destructive acts, such as erasing a hard drive. Anti-virus programs, which can be purchased or downloaded free online, help find and eliminate viruses before they can do any harm. Anti-virus programs tend to run continuously, so that all data is routinely checked for potential threats.

Hackers may access computers remotely via the Internet.
Hackers may access computers remotely via the Internet.

One of the most important principles of both Internet and computer security is intelligent user behavior. In addition to installing strong firewalls and anti-virus programs, it is important to use caution when using the Internet, just as when entering credit card information. Users should never download email attachments from strangers, and keep all accounts and sensitive computer data protected with strong, complex passwords. In addition, setting anti-virus programs to scan regularly and update automatically can help keep existing protection precautions up-to-date and functional.

Jessica Ellis
Jessica Ellis

With a B.A. in theater from UCLA and a graduate degree in screenwriting from the American Film Institute, Jessica is passionate about drama and film. She has many other interests, and enjoys learning and writing about a wide range of topics in her role as a WiseGEEK writer.

Learn more...
Jessica Ellis
Jessica Ellis

With a B.A. in theater from UCLA and a graduate degree in screenwriting from the American Film Institute, Jessica is passionate about drama and film. She has many other interests, and enjoys learning and writing about a wide range of topics in her role as a WiseGEEK writer.

Learn more...

Discuss this Article

Post your comments
Login:
Forgot password?
Register:
    • Local area networks need buffers between the network and the Internet.
      By: tobbef
      Local area networks need buffers between the network and the Internet.
    • Malicious computer viruses may be downloaded from the Internet.
      By: jamdesign
      Malicious computer viruses may be downloaded from the Internet.
    • Hackers may access computers remotely via the Internet.
      By: Artur Marciniec
      Hackers may access computers remotely via the Internet.
    • Internet viruses can corrupt the data on a computer's hard drive.
      By: merydolla
      Internet viruses can corrupt the data on a computer's hard drive.
    • Intelligent user behvior is one of the most important principles of computer and internet security.
      By: Yeko Photo Studio
      Intelligent user behvior is one of the most important principles of computer and internet security.
    • Users can keep local and networked computers secure through the use of complex passwords that are changed frequently.
      By: Edelweiss
      Users can keep local and networked computers secure through the use of complex passwords that are changed frequently.