Home | ARTS | How to Secure Your Computer

MBA (General) - IV Semester, Information Technology and E-Business, Unit 5.1

How to Secure Your Computer

   Posted On :  07.11.2021 08:05 am

Start reading privacy policies. Get in the habit of reading a Web site’s privacy policy. A link to the privacy policy is usually found at the bottom of the home page. This policy should alerts to how information is shared and sold. Additionally, the policy outlines what rights one possess. If a company violates its own privacy policy one can file a complaint to the FTC (Federal Trade Commission).

Secure Your Computer

Install anti-virus, anti-spyware and personal firewall software. Regularly install updates to these software solutions.

       Regularly install security updates to the desktop operating system and

Internet browser software.

       Install and activate a pop-up “blocker.”

       For extra protection, consider disconnecting PC from the network when not in use.

       Destroy all sensitive data on hard drive prior to selling, donating or discarding an old computer.

Start reading privacy policies. Get in the habit of reading a Web site’s privacy policy. A link to the privacy policy is usually found at the bottom of the home page. This policy should alerts to how information is shared and sold. Additionally, the policy outlines what rights one possess. If a company violates its own privacy policy one can file a complaint to the FTC (Federal Trade Commission).

Encryption as a Security Measure

Encryption is a method of scrambling an e-mail message or file so that it is gibberish to anyone who does not know how to unscramble it. The privacy advantage of encryption is that anything encrypted is virtually inaccessible to anyone other than the designated recipient.

Thus, private information may be encrypted and then transmitted, stored, or distributed without fear that it will be read by others. Strong encryption programs such as PGP (Pretty Good Privacy) are available online.

What are privacy policies and Web seals?

The Federal Trade Commission urges commercial Web site operators to spell out their information-collection practices in privacy policies posted on their Web sites. Most commercial Web sites now post policies about their information- collection practices.

Look for a privacy “seal of approval,” such as Trustee, on the first page of the Web site. Trustee participants agree to post their privacy policies and submit to audits of their privacy practices in order to display the logo.

Other seals of approval are offered by the Council of Better Business Bureaus

(BBB) www.bbbonline.org, and VeriSign www.verisign.com.

How to make sure to have a Good Password?

Create passwords with nonsensical combinations of upper and lower case letters, numbers and symbols, for example tY8%uX. Do not use the same or variations of the same password for different applications.

One way to create a password that is easier to remember is to use the first or last letters in a favorite line of poetry. Intermingle these letters with numbers and punctuation marks. “Mary had a little lamb” becomes m*ha2ll. Or create a story that gives the clues which helps to remember the password.

Microsoft recommends that virtually “uncrackable” passwords have at least 14 characters and use upper and lower case letters plus numbers and symbols. Change password often. Don’t let others watch log in. Don’t print password on a post-it note and attach it to your video monitor. If it is a must to write down or record password, take steps to secure or disguise the information.

There are services and software packages that will help one to keep track of their passwords. Most are free and are worth considering. These programs are availabe at www. download.com.

Password Assistant 2.0

Password Manager Plus

RoboForm

Demands for such services are strong and innovations are likely to continue.

Anonymizer is available at www.anonymizer.com.

Tags : MBA (General) - IV Semester, Information Technology and E-Business, Unit 5.1
Last 30 days 90 views

OTHER SUGEST TOPIC