Zonealarm definitions problem updating
In this case, you become one of the bad guys—because the worm or virus is using your computer to attack other systems on your internal network and the Internet, wasting your computing resources and bandwidth.
Even though the worm or virus won’t know what to do with your confidential data, chances are good that it will open a new back door into your system to allow someone else to further abuse your computer and compromise your privacy.
This type of attack does happen, but it makes up a very small portion of the total network attacks that occur.
Today, worms and viruses initiate the vast majority of attacks.
Hybrid worms, in particular, have penetrated corporate networks through email systems, and then have spread quickly to unprotected internal systems.
Applying host-based firewalls to all systems, including those behind the corporate firewall, should now be standard practice.
Traditional firewall architectures protect only the perimeter of a network.
Firewalls are these locks, and just like in the physical world, they come in different shapes and sizes to suit different needs.
Losses from computer crime are hard to quantify and predict, and as a result most business insurance policies do little to compensate for the losses that result from a successful attack.
The one aspect of physical security, however, that isn’t missing from network security is the equivalent of door locks, employee badges, and security systems: firewalls.
Who are these “hackers” who are trying to break into your computer?
Most people imagine someone at a keyboard late at night, guessing passwords to steal confidential data from a computer system.