- Find Help
- Guides
- Safety
- Guides: Safety
- Guide to Internet Security and Safety
Guide to Internet Security and Safety
June 28, 2005Tweet
Guide to Internet Security and Safety
This Guide to Internet Security and Safety is written by our NHU staff for our Access Technology Initiative Computer Training and Workshops.
What you will learn
- Become familiar with the practices of Internet Security.
- Use the Internet safely.
- How to use the computer in everyday life.
Internet Security
On the Internet we can connect our home or office computer to the Internet and contact our bank or a company and perform a remote transaction. To ensure that this remote transaction is secure, that no one can read the transaction, obtain it or change it as it bounces through various computers on the Internet, one must follow certain steps.
Remote transactions
Establish a secure connection. If you are using an Internet browser a small closed lock will appear in the window of the browser. To establish a secure connection you will often have to do use the following:
- Set up an account
- Other identifying items for verification.
- User name.
- Password.
- PIN Personal Identification Number.
- User name.
- Other identifying items for verification.
- Download a plugin, a small piece of software to allow your pc to set up a secure connection.
- Transactions often involve the exchange of a small file called cookies that are set by the website you are visiting on your hard drive. These cookies contain information about your server, browser and any information you volunteer to the website. Cookies are meant to save time and keep track of your orders.
- To view stored cookies find the file on your computer under Windows.
- To turn cookies on or off or alert when a cookie is placed on your hard drive.
- Choose Tools Internet Options from the menu bar.
- Click on Security, Custom Level.
- Scroll down to Cookies.
- To enable cookies, set options to allow cookies that restored on your computer and allow per-session cookies (not stored).
- Click on the OK button.
- Once you are connected to a secure server the information you send or receive will be scrambled or encrypted.
- To view stored cookies find the file on your computer under Windows.
Computer Viruses
Computer viruses are designed by computer programmers to do a certain unwanted, annoying, destructive function to your computer's programs and files that can cause your computer to stop working, change your desktop settings or reassign file extensions.
A computer gets a virus from an infected file on a CD or floppy disk, an email attachment, a download from the Internet.
You cannot get a virus from a plain email message or from a simple text file. A virus needs to run before it can take effect so it infects a pc when the user tries to open and infect.
It is possible for a programmer to attempt to spread a virus by building a virus script into an html type of email message.
There are also fake virus warnings called hoaxes that cause people to take unnecessary steps to avoid a virus. A legitimate warning will provide a link to a website of an anti-virus company with more information about the virus. Check out whether the virus is legitimate before deleting files.
Anti-virus program
Check scripts on Internet sites or email from unknown senders with an anti-virus program. An anti-virus program checks your computer for the virus and repairs damaged files or deletes files that are infected with viruses. You may have to replace infected files than cannot be repaired.
When you purchase an anti-virus program you also purchase the periodic updates that keeps your program up-to-date on new viruses. A program can be customized as to when and how the program will check the computer for viruses. Update your software once or twice a week.
Check all disks with your anti-virus program as well as your computer.
If you have to reload your computer programs, use the original program disks. You may want to check your original disks before reinstalling the software. If the original disks are infected contact the distributor to get them replaced.
In addition protect against viruses by:
-
Do not open email file attachments that seem strange or are from strange sources.
- Download legitimate files from the Internet. Use a floppy disk and check it with the anti-virus software before downloading to your computer.
Firewall
A firewall is used to protect private information. If you have business, financial or account information on your computer, you may want to protect your files. If you have a high-speed Internet connection such as cable or DSL modems, your computer is "always on". Your computer is more accessible to hackers. A firewall prevents unauthorized access to or from your system. Research firewall manufacturers on-line.
Passwords
To protect your computer, accounts, programs and files use passwords.
Change passwords periodically or if you notice any change in your account.
Passwords should be comprised of letters and numbers, some case sensitive and at least eight to ten characters long for greater security.
Memorize your passwords.
Don't use well-known abbreviations, numbers or names that are easily traced to you, actual words, your user name or the same password for different accounts.
Create a password based on a phrase using intermittent letters and numbers. Memorize it.
Safety
The Internet can certainly be intimidating to new users. However, you will find that with the proper knowledge, the Internet can offer you many opportunities and much information. It is important that you properly evaluate your sources of information for reliability. Following are a few things to keep in mind while searching the Internet:
-
1. DO NOT give any personal information (i.e. last name, address, phone number, social security number, etc.) to strangers you meet in discussion boards, newsgroups, chat rooms, etc.
2. DO NOT send pictures of yourself to people you meet on discussion boards, newsgroups, chat rooms, etc.
3. DO NOT trust that all information provided on Internet websites is accurate. Some websites might be propaganda or may be created with the sole purpose to deceive. Verify that the source of information is reputable, or perhaps verify with an expert.
Safe Shopping on the Internet
The convenience of shopping online is undeniable, with online companies offering anything from gifts to groceries to furniture for purchase. Such convenience has made shopping online very popular, an everyday activity for some individuals.
While the majority of companies found online are legitimate, there are the few that are not. While we encourage you to discover the convenience of shopping online, it is important that you take precaution, before you ring that sale.
Following are a few online shopping tips:
-
1. Verify that the company is legitimate.
- Check with the Better Business Bureau for recent complaints brought against the company. Visit them online at: Better Business Bureau.
- Ask the online company for customer referrals. Contact past customers inquiring on their satisfaction of their transaction with the company.
- Look for a physical address, e-mail address and / or telephone number on the site. Call and / or e-mail the company, seeking to speak to an employee, NOT an answering service.
- Verify that the submittal form is secure. A non-secure form will not encrypt (code) information, therefore making your credit card information available to dishonest people.
- First, contact the company and determine if there has been an oversight. Document this contact.
- If you are not satisfied with the company's explanation, send a certified letter requesting a quick resolution, keep a copy with your record of purchase.
- If your complaint has still not been resolved, contact your local Better Business Bureau and file a complaint against the company. Contact your credit card company, as they most likely offer protection against fraud.
2. Internet shipping sites require the use of a credit card. Before submitting credit card information to a company over the internet:
3. Never share your social security number or bank account numbers to online companies, even if after you determine their legitimacy.
4. Request confirmation of your purchase (i.e. order tracking / confirmation number, e-mail receipt, etc.)
5. If you do not receive your merchandise in the time period specified by the company:
-