US-CERT Cyber Security Tip ST04-003 -- Good Security Habits

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 




-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

   			Cyber Security Tip ST04-003
			    Good Security Habits

Good Security Habits

   There are some simple habits you can adopt that, if performed
   consistently, may dramatically reduce the chances that the information
   on your computer will be lost or corrupted.

How can you minimize the access other people have to your information?

   You  may  be able to easily identify people who could, legitimately or
   not, gain physical access to your computer--family members, roommates,
   co-workers,  members of a cleaning crew, and maybe others. Identifying
   the  people who could gain remote access to your computer becomes much
   more  difficult.  As  long  as you have a computer and connect it to a
   network,  you are vulnerable to someone or something else accessing or
   corrupting your information; however, you can develop habits that make
   it more difficult.
     * Lock  your  computer  when  you are away from it. Even if you only
       step  away  from your computer for a few minutes, it's enough time
       for  someone  else to destroy or corrupt your information. Locking
       your  computer  prevents  another person from being able to simply
       sit down at your computer and access all of your information.
     * Disconnect  your  computer from the Internet when you aren't using
       it.  The  development of technologies such as DSL and cable modems
       have  made  it  possible  for users to be online all the time, but
       this  convenience  comes with risks. The likelihood that attackers
       or  viruses  scanning  the  network  for  available computers will
       target  your  computer  becomes  much  higher  if your computer is
       always  connected.  Depending on what method you use to connect to
       the  Internet, disconnecting may mean ending a dial-up connection,
       turning off your computer or modem, or disconnecting cables.
     * Evaluate your security settings. Most software, including browsers
       and  email  programs,  offers  a  variety of features that you can
       tailor  to  meet  your  needs  and  requirements. Enabling certain
       features  to  increase  convenience or functionality may leave you
       more  vulnerable to being attacked. It is important to examine the
       settings,  particularly  the security settings, and select options
       that meet your needs without putting you at increased risk. If you
       install  a  patch or a new version of the software, or if you hear
       of  something  that  might  affect  your settings, reevaluate your
       settings   to   make   sure   they   are  still  appropriate  (see
       Understanding Patches, Safeguarding Your Data, and Evaluating Your
       Web Browser's Security Settings for more information).

What other steps can you take?

   Sometimes the threats to your information aren't from other people but
   from  natural  or  technological  causes.  Although there is no way to
   control or prevent these problems, you can prepare for them and try to
   minimize the damage.
     * Protect  your  computer against power surges. Aside from providing
       outlets  to plug in your computer and all of its peripherals, some
       power  strips  protect  your  computer  against power surges. Many
       power strips now advertise compensation if they do not effectively
       protect  your  computer.  During a lightning storm or construction
       work  that  increases  the odds of power surges, consider shutting
       your computer down and unplugging it from all power sources. Power
       strips  alone  will  not protect you from power outages, but there
       are  products  that  do offer an uninterruptible power supply when
       there are power surges or outages.
     * Back up all of your data. Whether or not you take steps to protect
       yourself,  there  will always be a possibility that something will
       happen to destroy your data. You have probably already experienced
       this  at least once-- losing one or more files due to an accident,
       a  virus  or  worm,  a  natural  event,  or  a  problem  with your
       equipment.  Regularly  backing  up  your  data  on a CD or network
       reduces  the  stress  and  other negative consequences that result
       from  losing  important  information (see Real-World Warnings Keep
       You  Safe  Online  for more information). Determining how often to
       back  up  your  data is a personal decision. If you are constantly
       adding  or  changing  data,  you may find weekly backups to be the
       best  alternative;  if your content rarely changes, you may decide
       that your backups do not need to be as frequent. You don't need to
       back  up  software  that  you  own  on  CD-ROM or DVD-ROM--you can
       reinstall the software from the original media if necessary.
     _________________________________________________________________

     Both  the National Cyber Security Alliance and US-CERT have identified
     this topic as one of the top tips for home users.
     _________________________________________________________________

     Authors: Mindi McDowell, Allen Householder
     _________________________________________________________________

     Produced 2007 by US-CERT, a government organization.
  
     Terms of use
 
     <http://www.us-cert.gov/legal.html>
  
     This document can also be found at
 
     <http://www.us-cert.gov/cas/tips/ST04-003.html>
 

     For instructions on subscribing to or unsubscribing from this
     mailing list, visit <http://www.us-cert.gov/cas/signup.html>.


-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.2.1 (GNU/Linux)

iQEVAwUBRdtpXuxOF3G+ig+rAQKzUQgAocma490BW6G1GqXUn0vIXStH36RGicay
kjRV+2YT76IU74iSPCqcJb5GChaGwfrSi27KD42wadedBO2fQWjE1ZmU8S/UuMDa
E5eYMI2wa5b00dpU4oe8XQoKeOhZ34EjbyOAk3x50rMzrRn48pdxZcLdtC+Fuv19
phKhuSJhPu9Rq5kcGusaodUZDOXVtPVU65nmKCboPA5TtQCH6wC6EvFh2SZQv9Gh
hVYMoFg7V56SYCqcSqETE6u+USBvB6M34Lfcx9VlLIRo0hpZ0aCZT3hWMCAzXM3a
FFvHoJ7BLxVhQLSYsQ9146ZshjmDzz/NQ/4tNroU1XYtDYkvpMwK0w==
=MYrL
-----END PGP SIGNATURE-----

[Index of Archives]     [Fedora Announce]     [Linux Crypto]     [Kernel]     [Netfilter]     [Bugtraq]     [USB]     [Fedora Security]

  Powered by Linux