<s>
Defensive	B-General_Concept
computing	I-General_Concept
is	O
a	O
form	O
of	O
practice	O
for	O
computer	O
users	O
to	O
help	O
reduce	O
the	O
risk	O
of	O
computing	O
problems	O
,	O
by	O
avoiding	O
dangerous	O
computing	O
practices	O
.	O
</s>
<s>
Strategies	O
for	O
defensive	B-General_Concept
computing	I-General_Concept
could	O
be	O
divided	O
into	O
two	O
categories	O
,	O
network	O
security	O
and	O
the	O
backup	B-Protocol
and	O
restoration	O
of	O
data	O
.	O
</s>
<s>
Users	O
put	O
their	O
computers	O
at	O
risk	O
when	O
accessing	O
the	O
Internet	O
and	O
other	O
networks	B-Architecture
.	O
</s>
<s>
A	O
firewall	B-Application
is	O
a	O
collection	O
of	O
security	O
measures	O
that	O
protects	O
a	O
computer	O
from	O
harmful	O
inbound	O
and	O
outbound	O
traffic	O
on	O
the	O
Internet	O
and	O
prevents	O
the	O
unauthorized	O
access	O
of	O
computer	O
systems	O
.	O
</s>
<s>
These	O
security	O
measures	O
are	O
integrated	O
into	O
the	O
form	O
of	O
special	O
software	O
that	O
runs	O
autonomously	O
either	O
on	O
individual	O
computer	O
systems	O
,	O
or	O
externally	O
through	O
built	O
in	O
software	O
within	O
routers	B-Protocol
and	O
modems	B-Application
.	O
</s>
<s>
Not	O
all	O
firewall	B-Application
software	I-Application
will	O
protect	O
computers	O
from	O
sending	O
unauthorized	O
or	O
harmful	O
outbound	O
traffic	O
.	O
</s>
<s>
An	O
important	O
defensive	B-General_Concept
computing	I-General_Concept
strategy	O
is	O
to	O
seek	O
and	O
implement	O
quality	O
firewall	B-Application
software	I-Application
that	O
filters	O
both	O
inbound	O
and	O
outbound	O
traffic	O
.	O
</s>
<s>
Firewalls	B-Application
may	O
not	O
completely	O
protect	O
a	O
computer	O
.	O
</s>
<s>
Malicious	O
software	O
may	O
be	O
able	O
to	O
get	O
through	O
a	O
firewall	B-Application
and	O
onto	O
a	O
system	O
.	O
</s>
<s>
An	O
important	O
aspect	O
of	O
defensive	B-General_Concept
computing	I-General_Concept
is	O
for	O
users	O
to	O
be	O
skeptical	O
of	O
the	O
data	O
to	O
which	O
they	O
have	O
access	O
via	O
the	O
Internet	O
.	O
</s>
<s>
A	O
defensive	O
strategy	O
against	O
unintentional	O
data	O
loss	O
is	O
the	O
regular	O
backup	B-Protocol
of	O
important	O
files	O
.	O
</s>
<s>
Regularly	O
backup	B-Protocol
important	O
files	O
,	O
documents	O
and	O
emails	O
.	O
</s>
<s>
Disable	O
auto	O
run	O
feature	O
from	O
USB	O
flash	B-Device
drives	I-Device
.	O
</s>
