1. How to stop computer crime
submitted to:
Sir inam-ul-haq
submitted by:
Amna Akram(3018)
University of education renala cumps
BSIT(Hons)evening semester -1
7. Install protective software
Shops is available as a free download for
Windows, Macintosh, and Linux from IS&T's
software page. When installed, the
software should be set to scan your files
and update your virus definitions on a
regular basis.
8. Choose strong passwords
Choose strong passwords with letters,
numbers, and special characters to create a
mental image or an acronym that is easy
for you to remember. Create a different
password for each important account, and
change passwords regularly.
9. Protect your e-identity
Be cautious when giving out personal
information such as your name, address, phone
number or financial information on the Internet.
Make sure that websites are secure (e.g. when
making online purchases) or that you’ve enabled
privacy settings (e.g. when accessing/using
social networking sites).
10. Protect sensitive data
Reduce the risk of identity theft. Securely remove
sensitive data files from your hard drive, which is
also recommended when recycling or repurposing
your computer. Use the encryption tools built into
your operating system to protect sensitive files
you need to retain.
11. Be Social-Media Savvy
Make sure your social networking profiles
(e.g. Facebook, Twitter, Youtube, MSN,
etc.) are set to private. Check your security
settings. Be careful what information you
post online. Once it is on the Internet, it is
there forever!
12. Control access to your machine
Don't leave your computer in an unsecured
area, or unattended and logged on,
especially in public places - including
Athena clusters and Quick stations. The
physical security of your machines just as
important as its technical security.
13. Use secure connections.
When connected to the Internet, your data
can be vulnerable while in transit. Use
remote connectivity and secure file
transfer options when off campus.
14. Use email and the Internet safely.
Ignore unsolicited emails, and be wary of
attachments, links and forms in emails that
come from people you don't know, or which
seem "phishy." Avoid untrustworthy (often
free) downloads from freeware or
shareware sites.
15. Secure your wireless network
Wi-Fi (wireless) networks at home are
vulnerable to intrusion if they are not
properly secured. Review and modify
default settings. Public Wi-Fi, a.k.a. “Hot
Spots”, are also vulnerable. Avoid
conducting financial or corporate
transactions on these networks.
16. Conclusion
Most of the really effective steps that a computer
user can take to avoid being a victim of crime make
the user's computer less convenient to use. Each
user must balance for himself/herself how much
security is enough, especially when faced with daily
inconvenience of high-level security measures vs.
the rare occurrence of attacks.
Further, the user must be aware that a determined
and creative criminal can defeat nearly any security
measure, so complete security is not possible.