Welcome to Scribd, the world's digital library. Read, publish, and share books and documents. See more
Download
Standard view
Full view
of .
Look up keyword
Like this
1Activity
0 of .
Results for:
No results containing your search query
P. 1
7 Practices for Safer Computing Click

7 Practices for Safer Computing Click

Ratings: (0)|Views: 7|Likes:
Published by Tom

More info:

Published by: Tom on Jun 22, 2012
Copyright:Attribution Non-commercial

Availability:

Read on Scribd mobile: iPhone, iPad and Android.
download as PDF, TXT or read online from Scribd
See more
See less

08/07/2013

pdf

text

original

 
PRACTICES FOR SAFER COMPUTING7
 
1
Access to information and entertainment,creditand financial services,products fromevery corner of the world—even to yourwork—is greater than earlier generationscould ever have imagined.Thanks to theInternet,you can order books,clothes,orappliances online;reserve a hotel roomacross the ocean;download music andgames;check your bank balance 24 hoursa day;or access your workplace fromthousands of miles away.The flip-side,however,is thatthe Internet—and the anonymity itaffords—also cangive online scammers,hackers,and identitythieves access to your computer,personalinformation,finances,and more.Butwith awareness as your safety net,youcan minimize the chance of an Internetmishap.Being on guard online helps youprotectyour information,your computer,even yourself.To be safer and more secureonline,adoptthese seven practices.
EFFICIENT SHOPPING
ACCESS TO INFORMATION,
MUSIC,AND GAMES
EDUCATIONAL
RESOURCES
TRAVEL PLANNING
SPORTS,HOBBIES,AND
SOCIAL NETWORKS
CONNECTIONS TO
FAMILY AND FRIENDS
CONVENIENT FINANCIAL
MANAGEMENT
NEWS FROM AROUND
THE WORLD
DIGITAL PHOTOGRAPHY
 
THE SEVEN PRACTICES
Protectyourpersonal information.It’s
valuable
.
3
personal or financial information.If you believethere may be a need for such information bya company with whom you have an accountor placed an order,contactthatcompanydirectly in a way you know to be genuine.Inany case,don'tsend your personal informationvia email because email is nota securetransmission method.
If you are shopping online,don’tprovide yourpersonal or financial information through acompany’s website until you have checked forindicators thatthe site is secure,like a lock iconon the browser’s status bar or a website URLthatbegins “https:(the “sstands for “secure”).Unfortunately,no indicator is foolproof;somescammers have forged security icons.
Read website privacy policies.They shouldexplain whatpersonal information the websitecollects,how the information is used,andwhether itis provided to third parties.Theprivacy policy also should tell you whether you have the rightto see whatinformationthe website has aboutyou and whatsecuritymeasures the company takes to protect your information.If you don’tsee a privacypolicy—or if you can
tunderstand it—considerdoing business elsewhere.
2
1
A
hacker
is a person who uses theInternetto access computers withoutpermission.A
spammer
is someone whosends mass amounts of unsolicitedcommercial email.A
virus
is softwarethatspreads from computer to computerand damages files or disrupts your system.
WORDS FOR THE WISE
Why? To an identity thief,your personal informationcan provide instantaccess to your financialaccounts,your creditrecord,and other assets.If you think no one would be interested in yourpersonal information,think again.The reality isthatanyone can be a victim of identity theft.Infact,according to a Federal Trade Commission (FTC)survey,there are almost10 million victims a year.It’s often difficultto know how thievesobtained their victims’personal information,and while itdefinitely can happen offline,somecases startwhen online data is stolen.Visit
www.consumer.gov/idtheft
to learn whattodo if your identity is stolen.Unfortunately,when itcomes to crimes likeidentity theft,you can’tentirely control whether you will become a victim.Butfollowing these tipscan help minimize your risk while you’re online:
If you’re asked for your personal information— your name,email or home address,phonenumber,accountnumbers,or Social Securitynumber—find outhow it’s going to be usedand how itwill be protected before you shareit.If you have children,teach them to
not 
giveoutyour lastname,your home address,or yourphone number on the Internet.
If you getan email or pop-up message askingfor personal information,don’treply or click onthe link in the message.The safestcourse of action is notto respond to requests for your

You're Reading a Free Preview

Download
scribd
/*********** DO NOT ALTER ANYTHING BELOW THIS LINE ! ************/ var s_code=s.t();if(s_code)document.write(s_code)//-->