Netbook Security Guidelines

Source: Internet
Author: User
Tags account security

In the network world, those netbooks with the "Atom" label should be self-cleaned before they can swim across the network. The emergence of such computers has provided opportunities for major IT vendors, and challenges are coming soon. From the battery on the hardware to the Wi-Fi module, from the operating system on the software to the terminal protection product, in addition to security or security.

Security challenges with simplified Functions

The prices of popular Netbooks are generally less than 3000 yuan, and some "fake version" is lower than 2000 Yuan. The defects in computing performance make it unable to use most anti-virus software normally. The emergence of the netbook market poses a real challenge to the network security industry. It is critical that security software protection and server-side processing capabilities become crucial. Traditional anti-virus software that is large in size and consumes a large amount of CPU resources should be "reduced" to fit the netbook configuration.

The low-cost and low-configuration models for the above network's main consumption purposes naturally have many security problems. The hardware configuration of netbook is low, which limits the ability of running security software, such as data encryption and running anti-malware tools. Due to high requirements on processing capabilities, memory, and storage space, some security software is barely running on the netbook and cannot even run. Outdated system software makes netbooks vulnerable to malware attacks. For example, earlier this year, the British security company RiseSecurity said that Yi PC uses uncorrected Samba code, allowing hackers to remotely control vulnerable systems.

Generally, Netbooks are inseparable from Wi-Fi networks. They can easily log on to available Wi-Fi networks and may leak stored data. Many users do not even know how to access the Internet. The operating system has always been a large resource user, and there are countless vulnerabilities. Of course, the most important issue for security vendors is to redesign terminal protection products to simplify the complexity and reduce resource occupation without losing basic functions, thus improving performance.

In order to provide users with the fastest and most economical Internet experience, netbooks require the drastic cutting of redundant components to highlight the backbone: Generally, independent video cards, sound cards, and network cards are not required for integration; reduce or cancel external interfaces unrelated to the network; use high-capacity memory and low-consumption CPU.

Currently, the netbook operating system is mainly Windows XP family edition. For Windows systems, you only need to patch the most serious vulnerabilities and disable unnecessary Windows system services in the netbook environment, to avoid service vulnerabilities. It is necessary to remind you that the patch will also have a certain impact on resources.

Therefore, you can disable some system services. For example, disabling Telnet, TerminalServices, Server, RemoteRegistry and other external services can effectively improve the security level with user account security management. In addition, some Netbooks are configured with Lite versions of Linux and other systems, and the system security is even weaker, making it unable to withstand internet threats. This requires the introduction of third-party security protection products.

Mobile Security: Dust Cover for netbooks

Unlike mobile security, Web security focuses on Internet access. Web security generally refers to security issues related to browsing the Internet, such as Trojans, malicious webpages, Email Security, online games, and streaming media viruses, A special version of anti-virus software for netbook Web security is essential.

Although anti-virus software for netbooks has shrunk, its core functions include scanning viruses, web page monitoring, IM, and email filtering, if combined with the firewall, there are some security functions for VPN and Wi-Fi networks. In addition, the software needs to adapt to the relatively small characteristics of the netbook screen, so as to avoid occupying resources when the system is busy and do more silent processing.

Many people know that cloud security (CloudSecurity) is born in the information security era to get rid of the huge virus database of a single machine. This model is built on the collection and analysis of a large number of clients. The cloud security client can be seen as a sniffer That sends sniffing information to the server. The server can lock the threat source or help the virus Database Upgrade through the superposition of different suspicious degrees, then, send the defense action back to the client. This model greatly improves the immunity and killing capabilities of the entire "cloud security" network, and also makes the netbook client thinner and more efficient. Once the concept of "cloud security" was launched, various anti-virus software and security tools were followed up.

Of course, the strength of anti-virus software is a prerequisite for Web security. There is no "kernel-level self-protection", and anti-virus may prevent viruses. Anti-virus software with the smart active defense mode will not only target netbooks.

Value is applicable. netbook is a fashionable mobile office tool. While enjoying convenience, people should not ignore the security concept. With the development of Notebook software and hardware technology, netbooks will surely get rid of the bad names of inefficiency in the future and be fully armed in security, so that users can enjoy real work anytime, anywhere.

With the increasing popularity of netbooks, more and more application software providers have released software versions dedicated to netbooks. At the same time, security companies such as Trend Micro, Kingsoft, Kaspersky, and pandatv have released security software for netbooks.

Products customized for netbooks, especially for system memory, CPU, and IO devices, reconstruct the underlying engine of the system to run on a portable computer, improving the overall performance. At the same time, Kingsoft and Trend Micro will also make full use of the "cloud security" technology to provide online queries to hundreds of millions of users, effectively resisting the intrusion of popular viruses and Trojans.

Related Article

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.