Library

What is Online Security and How to be an Online ‘Ninja’

What is online security
Written by Lisa Patrick

No one realized in the 1980’s just how big an explosion The World Wide Web would have on the world. By the new millennia, more than a million commercial sites and millions of individual users had ‘popped’ up, spawning a global community eager to awaken into the virtual world.

This explosion lured a new type of criminal as well, the cyber attacker or hacker. Private individuals and corporations demanded protection and laws to protect themselves from a cyber-attack and thus the online security business emerged.

So, what is online security?

What is online security? Anyone who has a desktop or laptop computer, smart phone, tablet and internet access, has a pretty good idea of what online security does. But what is online security exactly? Online security “is the knowledge of maximizing the user’s personal safety and security risks to private information and property associated with using the internet and the self-protection from computer crime in general”. Nice definition, but what does this mean to the average person?

What it means is, knowing how to protect personal and corporate information from being stolen online by cyber criminals. Through various methods like Antivirus Software, Cloud Storage, or the use of a Virtual Private Network (VPN), people and corporations can secure their content online and keep out prying eyes.

A spoon full of sugar

Viruses—nasty little blighters that get into your body and cause all kinds of uncomfortable and even dangerous symptoms. But we’re not talking about the flu here. We’re talking about a computer virus. Viruses, malware, trojans, and worms enter into your system and cause irreparable damage to your hard drive making them the most effective ways for a hacker to wreak havoc on your system.

Antivirus software is your first defense in protecting your computer systems. Antivirus software programs are downloadable onto your computer, smartphone, or tablet and protect their operating systems from maliciously encrypted data being covertly inserted onto their hard drives via an internet connection.

The malware, viruses, worms, and trojans are designed to mimic standard network protocols. Antivirus software act much like antibiotics and vitamins do for the body. They eradicate the malware, viruses and worms, and put in place detection protocols to recognize these buggers the next time they try to enter your computer system.

Hackers are always trying to stay one step ahead of the curve so, antivirus software needs to be updated periodically in order for it protect your system from more and more savvy cyber criminals.

Tunnel Vision

While Antivirus software act as doctors and sentries for your computer, how do you keep your internet access safe from those entities (who shall remain nameless) from spying on what you do on the internet? Enter the Virtual Private Network (VPN). VPNs are a unique protection method in that their primary function is to make your online presence invisible and undetectable to an outside entity.

They work through the process of encryptions and ‘tunnels’ that cloak your information in a protective cocoon while transmitting the cocooned data through a ‘tunnel’. Much like an airplane cocoons passengers in a pressurized metal cabin while it careens through the air.

VPNs protect your online identity, location, and viewing from prying eyes while you’re accessing the internet from a Wi-Fi hotspot location or a stationary connection like that of your home or office. Since Wi-Fi connections are radio waves, they are all over and accessible to anyone with the right software. A VPN cloaks those radio waves also known as you’re a user.

With Your Head in the Clouds

So, now that we have covered the most common and trusted methods, what about the newest online rage, The Cloud. Cloud storage is fast becoming the preferred method in which corporations and individuals store their information when there simply isn’t enough space to store more.

Cloud storage works with other servers on other networks using the internet as the transportation method. You, the client, purchases and uses space on other servers outside of your home server or hard drive to store your information from one of the three types of cloud storage, public, private, and hybrid.

Public cloud storage is used mainly for emails and hard drive backup. They are a fee-for-use service and the network administrator providing the service, maintains security. The upside to public cloud storage is it is relatively inexpensive and easy to access.

The downside is once you hand over your information to the provider; you no longer have control over its security. Much like putting your valuables in a public storage locker, the people managing the facility keep your valuables safe. But there are no guarantees. One major power outage can wipe out an entire server, eliminating your data.

Private Cloud storage, like public cloud storage, is used by those who need to store a lot of information they have no more room for and have no immediate need to access. It is, usually, more used by corporations as the security is tighter on the provider servers.

Hybrid cloud storage is just that, a hybrid of public and private storage. Mostly used for its ease of access, Hybrid storage is used mainly by those who need access to some part of their information and not for others. For instance, an email from your employer requesting a particular project can be stored on a public cloud provided by your email provider.

The information you gathered to complete the task gets stored on a private cloud network. Hybrid storage is not exactly the most cost effective and security issues with this type of storage are fast becoming a topic of online debate—who owns the data stored in the cloud?

The Verdict

So, what is online security? The methods for securing your online identity and information; Antivirus software, VPNs and Cloud Storage all address a growing concern on the internet today. As this big blue marble of ours becomes increasingly smaller due to the internet, there is more need for online security than ever before. Information is at a premium today, but the cost of online security is priceless.

Featured Image By Brenda Clarke via Flickr

About the author

Lisa Patrick

Lisa Patrick is a freelance writer in the United States with a Bachelor’s degree in English from the University of Phoenix. Since 1984 she studied computers and computer technology. She has written for various companies for the better part of 20 years and enjoyed every word of it. She also enjoys reading and writing fiction and non-fiction, riding motorcycles, watching horror movies, making gemstone jewelry, singing, and dancing.

21 Comments

  • hello there and thank you for your info – I have
    definitely picked up anything new from right here.
    I did however expertise some technical issues using this website,
    since I experienced to reload the website a lot of times
    previous to I could get it to load properly.

    I had been wondering if your web hosting is OK?
    Not that I’m complaining, but slow loading instances
    times will often affect your placement in google
    and could damage your high quality score if ads and marketing with Adwords.
    Anyway I am adding this RSS to my email and can look out for much more of your respective intriguing content.
    Make sure you update this again very soon.

  • I’ve been exploring for a bit for any high-quality articles
    or weblog posts in this sort of space . Exploring in Yahoo I finally stumbled upon this
    site. Studying this information So i’m glad to show that I’ve a very good uncanny feeling I came upon exactly
    what I needed. I such a lot undoubtedly will make sure to do not omit this web site and provides it a look regularly.

  • Good post. I learn something totally new and challenging on websites I stumbleupon every day.
    It will always be helpful to read articles from other writers
    and practice a little something from their sites.

  • I blog frequently and I truly thank you for your content.

    Your article has really peaked my interest. I will book mark your
    website and keep checking for new information about once a week.
    I opted in for your RSS feed as well.

  • It’s awesome to visit this web site and reading the views of all colleagues about this piece of writing,
    while I am also zealous of getting know-how.

  • Hello! I know this is kind of off topic but I was wondering which
    blog platform are you using for this site? I’m getting tired of WordPress because
    I’ve had problems with hackers and I’m looking at alternatives for another platform.
    I would be great if you could point me in the
    direction of a good platform.

  • I do consider all of the concepts you’ve introduced to your post.
    They are really convincing and will certainly work.

    Nonetheless, the posts are very short for newbies.
    Could you please lengthen them a bit from next time?
    Thanks for the post.

  • I believe everything said made a great deal of sense. However,
    what about this? what if you typed a catchier title? I am not
    suggesting your content is not solid., however what
    if you added something that makes people want more? I mean What is Online Security and
    How to be an Online ‘Ninja’ | SecureKnow is a little
    plain. You might peek at Yahoo’s home page and watch how they write article headlines to grab people to click.
    You might add a video or a picture or two to grab readers excited about what you’ve got to say.
    In my opinion, it might make your blog a little livelier.

  • Today, I went to the beach front with my kids.
    I found a sea shell and gave it to my 4 year old daughter and said “You can hear the ocean if you put this to your ear.” She placed the shell to her ear and screamed.
    There was a hermit crab inside and it pinched her ear.
    She never wants to go back! LoL I know this is entirely off topic but I had to tell someone!

  • Appreciating the commitment you put into your website and detailed information you provide.
    It’s good to come across a blog every once in a while that isn’t the same
    out of date rehashed information. Wonderful read!
    I’ve bookmarked your site and I’m including your RSS
    feeds to my Google account.

  • Every weekend i used to go to see this web page, because i wish for
    enjoyment, for the reason that this this web page conations genuinely fastidious funny stuff too.

  • Hey just wanted to give you a quick heads up.
    The text in your article seem to be running off the screen in Safari.
    I’m not sure if this is a formatting issue or something to
    do with web browser compatibility but I figured I’d post to let you know.
    The layout look great though! Hope you get the problem fixed soon. Cheers

  • Hey! Do you know if they make any plugins to help with Search Engine Optimization? I’m trying to get
    my blog to rank for some targeted keywords but I’m not seeing very good success.
    If you know of any please share. Appreciate it!

  • Do you mind if I quote a few of your articles as long as I provide credit and sources back
    to your webpage? My website is in the exact same area of interest as
    yours and my users would genuinely benefit from some of the information you present here.
    Please let me know if this ok with you. Many thanks!

Leave a Comment