US-CERT Cyber Security Tip ST06-002 -- Debunking Some Common Myths

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

                        Cyber Security Tip ST06-002
                        Debunking Some Common Myths

   There are some common myths that may influence your online security
   practices. Knowing the truth will allow you to make better decisions about
   how to protect yourself.

How are these myths established?

   There is no one cause for these myths. They may have been formed because of
   a lack of information, an assumption, knowledge of a specific case that was
   then generalized, or some other source. As with any myth, they are passed
   from one individual to another, usually because they seem legitimate enough
   to be true.

Why is it important to know the truth?

   While believing these myths may not present a direct threat, they may cause
   you to be more lax about your security habits. If you are not diligent about
   protecting yourself, you may be more likely to become a victim of an attack.

What are some common myths, and what is the truth behind them?

     * Myth: Anti-virus software and firewalls are 100% effective.
       Truth: Anti-virus software and firewalls are important elements to
       protecting your information (see Understanding Anti-Virus Software and
       Understanding Firewalls for more information). However, neither of these
       elements are guaranteed to protect you from an attack. Combining these
       technologies with good security habits is the best way to reduce your
       risk.
     * Myth: Once software is installed on your computer, you do not have to
       worry about it anymore.
       Truth: Vendors may release patches or updated versions of software to
       address problems or fix vulnerabilities (see Understanding Patches for
       more information). You should install the patches as soon as possible;
       some software even offers the option to obtain updates automatically.
       Making  sure  that  you have the latest virus definitions for your
       anti-virus software is especially important.
     * Myth: There is nothing important on your machine, so you do not need to
       protect it.
       Truth:  Your  opinion  about  what is important may differ from an
       attacker's opinion. If you have personal or financial data on your
       computer, attackers may be able to collect it and use it for their own
       financial gain. Even if you do not store that kind of information on
       your computer, an attacker who can gain control of your computer may be
       able  to use it in attacks against other people (see Understanding
       Denial-of-Service Attacks and Understanding Hidden Threats: Rootkits and
       Botnets for more information).
     * Myth: Attackers only target people with money.
       Truth: Anyone can become a victim of identity theft. Attackers look for
       the biggest reward for the least amount of effort, so they typically
       target databases that store information about many people. If your
       information happens to be in the database, it could be collected and
       used for malicious purposes. It is important to pay attention to your
       credit information so that you can minimize any potential damage (see
       Preventing and Responding to Identity Theft for more information).
     * Myth: When computers slow down, it means that they are old and should be
       replaced.
       Truth: It is possible that running newer or larger software programs on
       an older computer could lead to slow performance, but you may just need
       to replace or upgrade a particular component (memory, operating system,
       CD or DVD drive, etc.). Another possibility is that there are other
       processes or programs running in the background. If your computer has
       suddenly become slower, you may be experiencing a denial-of-service
       attack   or  have  spyware  on  your  machine  (see  Understanding
       Denial-of-Service Attacks and Recognizing and Avoiding Spyware for more
       information).
     _________________________________________________________________

     Author: Mindi McDowell
     _________________________________________________________________

     Produced 2006 by US-CERT, a government organization.

     Note: This tip was previously published and is being re-distributed 
     to increase awareness. 
  
     Terms of use
 
     <http://www.us-cert.gov/legal.html>
  
     This document can also be found at
 
     <http://www.us-cert.gov/cas/tips/ST06-002.html>
 

     For instructions on subscribing to or unsubscribing from this
     mailing list, visit <http://www.us-cert.gov/cas/signup.html>.
     
     
     


-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.5 (GNU/Linux)

iQEVAwUBSPZWEHIHljM+H4irAQInoAgAmWxMEd1UCy38HR1kf/201FmzohHlndCF
NwKOgAjhPzStKVc0/gkF7KL3iS1auVCzuYPEkg61KzEmCnySonfBnvwJ05OLemYx
af3YARdRhsJznL0n3N0t+nXpVgu5RfWnoiryXUsnEQpN6+UKWDvSJVN7CDXvw3hy
GffdoxGbIQ4jflAG4OPq6VD1pVeaAmKr1+cvNZb04eu+Y43nH5Pd+2UkYyyAmJ8S
wW+ldFrAUTPo/5AILM/l+uecOzLJZSrCR3XNEsMh6dgGpA+8IbUn6/k8DOFQBcd0
HMFpO+A3d3Lj7KIOKCLP/fvLWKjzPJGtBVlrata0Ofc5ZKkUMlxErg==
=JmAo
-----END PGP SIGNATURE-----

[Index of Archives]     [Fedora Announce]     [Linux Crypto]     [Kernel]     [Netfilter]     [Bugtraq]     [USB]     [Fedora Security]

  Powered by Linux