You are on page 1of 3

Information brochure

Where modern technologies, like online banking, offer internet users a high online serviceability, the vulnerability of users increases. Online criminals are continuously searching for techniques to discover your personal identification data. How to protect yourself against internet crime? Social engineering Social engineering is the phenomenon where online criminals can act as if they are employees members of a familiar organi!ation, or they appear as familiar to their victim in some other way. "he aim is to obtain personal data. #t could happen that online criminals contact their victims by telephone, in order to gather the information needed. Phishing $nother technique is %hishing. &ou will receive threatening, pathetic or pleasing email messages. Such messages can be used to seduce you to click a link, log on to a site or respond to the sender, which in

fact is an online criminal. &ou might get a victim of identity or data theft. Trojan horses "ro'an horses are hidden in (apparently useful) software programs or email messages. "ro'ans cannot spread themselves without interference of the user. "ro'ans can provide access to files, folders, drives and peripherals. $pplications files could be erased or theft. Keyloggers *eyloggers record the keys struck on a keyboard and the movements of pointing devices. Software is used to gather personal data from an unaware user. Viruses +iruses do attach to programs running on your computer. "hey are able to delete or edit program codes and discover your data. $ virus can spread itself to other computers. Malware $ general term for malicious software, such as spyware and adware. Spyware views actions and personal files

without the knowledge of the user. ,iles can be passed on to others. Adware displays advertisements on the computer. "his could be annoying, but also harmful when its purpose is data theft. -se your consciousness to fight internet crime "o prevent from getting a victim of social engineering, be careful to use email and internet. .e aware of the following, regarding malicious email messages/ 0. "he message has no sub'ect line1 2. "he address of the sender is incomplete, unknown or not familiar1 3. "he message has got some grave grammar mistakes, which could indicate non4nativeness or computer generated mail1 5. 6rrors in the company name1 7. &ou have never contacted the sender of the message you are in no way related to the sender of the message. #n common use of the internet, you need to be careful to visit any web page. %referably do not visit suspicious websites.

8ead recommendation 7 from 9How to secure your computer against security threats: for more information on this.

How to secure your computer against security threats? 0. $lways use the Security ;entre in your Operating System1 2. #n the Security ;entre, you will find the current state of your firewall, virus scanner software and, in case you are running <icrosoft Windows, Windows =efender. &ou can download a free version of Windows =efender from the internet1 3. %urchase strong antivirus software. ;onsult your computer components supplier to find suitable antivirus sofware. "here are also free antivirus downloads available1 5. 8egularly use updates and patches for your operating system and programs. -pdates provide you with new supporting data and patches are meant to solve security vulnerabilities1 7. =ownload Spoofstick or use the Windows %hishingfilter Smartscreen filter tool to protect yourself against malicious

websites. Open #nternet 6>plorer and choose ?Smartscreen filter@ from the Security menu1 A. =ownload a program which is meant to filter spam and phishing messages1 B. 8un a complete scan of the whole computer on a regular basis and also run a scan of drives and folders1 C. 8un a scan in safe mode with the slightest suspicion of malicious software affecting your computer. "o do this, push ,C while booting the computer1 D. Select a high security level in #nternet 6>plorer. ;hoose #nternet options from the e>tra menu. ;lick on the security tab to find the internet security level. &ou will also find a tab for privacy settings. How to apply passwords and encryption software? "here is a twofold way of protecting your data/ you could secure a file with a password and you could encrypt the contents to make it unreadable to others. Software can be downloaded to apply passwords for files and folders. $n e>ample is .lowfish $dvanced. #nstall and run .lowfish $dvanced, press ,3 and

select the location where you have put the file folder. %ress the 96ncrypt: button. $pply a password and confirm the installation. "he file or folder will be saved as a 9.bfa: file. #f you want to open the file, you have to select the file in the .lowfish menu and press 9=ecrypt:. $fter applying your password, you are able to get access to your files again.

Shared folders &ou could also use Win!ip to secure shared folders. =ownload Winrar and the %atch. 8ight4click the mouse button on the (shared) folder1 choose the option 9$dd to archive:. ,rom the tab 9advanced:, choose 9Save files security: and click the 9Set password: button. $pply a password twice. Select 96ncrypt file names: and press 9Ok:. &our folder is secured. "he contents can only be viewed with a password.

You might also like