Purpose

Dedicated to helping people make themselves safe and their Homes harder targets,...or when James Bond meets Soccer Mom




Friday, July 9, 2010

Cyber Security - 201 Definitions

What is Internet fraud?

Internet fraud refers to any type of fraud scheme that uses email, websites, chat rooms, or any other Internet related means to present fraudulent solicitations to prospective victims, to conduct fraudulent transactions, or to transmit the proceeds of fraud.

What is Financial Fraud?

Financial fraud is any non-violent offense that is committed by or against an individual or corporation and which results in a financial loss.

Some examples include:

* Cross-Border Fraud
* Romance Schemes
* Advanced Fee Scams
* Charities Fraud
* Debt Elimination
* Investment Frauds
* Job Scams
* Nigerian "4-1-9" Scams
* Ponzi & Pyramid Schemes
* Sweepstakes/Lottery Fraud

What is a hacker, attacker, or intruder?

These terms are applied to the people who seek to exploit weaknesses in software and computer systems for their own gain.

What is malicious code?

Malicious code, sometimes called malware, is a broad category that includes any code that could be used to attack your computer. Examples of malicious code are viruses and worms.

What does anti-virus software do?

Anti-virus software scans files or your computer's memory for certain patterns that may indicate an infection. The patterns it looks for are based on the signatures, or definitions, of known viruses. It is important that you have the latest definitions installed on your computer since new viruses are released or old ones are changed frequently
.
How do I create a good password?

· Don't use passwords that are based on personal information that can be easily accessed or guessed.
· Don't use words that can be found in any dictionary of any language.
· Develop a mnemonic for remembering complex passwords (ex: I am the Captain of the football team = IatCotft).
· Use both lowercase and capital letters.
· Use a combination of letters, numbers, and special characters.
· Use passphrases when you can (ex: Iamtheleaderofthepack,...or Iamthebossofallthings).
· Use different passwords on different systems.

What do firewalls do?

Firewalls provide protection against outside attackers by shielding your computer or network from attack and subsequent intrusion by restricting the network traffic which can pass through them, based on a set of defined rules. Firewalls can be configured to block data from certain locations while allowing the relevant and necessary data through. They are especially important for users who rely on "always on" connections such as cable or DSL modems.

What are rootkits and botnets?

A rootkit is a piece of software that can be installed and hidden on your computer without your knowledge. It may be included in a larger software package or installed by an attacker who has been able to take advantage of a vulnerability on your computer or has convinced you to download it. Botnet is a term derived from the idea of bot networks. In its most basic form, a bot is simply an automated computer program, or robot. In the context of botnets, bots refer to computers that are able to be controlled by one, or many, outside sources. Your computer may be part of a botnet even though it appears to be operating normally.

What is a phishing attack?

Phishing attacks use email or malicious websites to solicit personal information by posing as a trustworthy organization. For example, an attacker may send email from a seemingly reputable company, financial institution or charity that requests account information, often suggesting that there is a problem. When users respond with the requested information, attackers can use it to gain access to the accounts. Attackers often take advantage of current events and certain times of the year, such as:

* natural disasters (e.g., Hurricane Katrina, Indonesia tsunami)
* epidemics and health scares (e.g., H1N1)
* economic concerns (e.g., IRS scams)
* major political elections
* holidays

What is file sharing?

File sharing involves using technology that allows internet users to share files that are housed on their individual computers. Peer-to-peer (P2P) applications, such as those used to share music files, are some of the most common forms of file-sharing technology. However, P2P applications introduce security risks that may compromise your information, computer or the entire network in jeopardy.

What are Honey Pots?

Honey pots are computers that are either intentionally or unintentionally left vulnerable to attack by hackers. They can be used to catch hackers or fix vulnerabilities.

Thursday, July 8, 2010

Cyber Security 101

These are the baseline Cyber Security Procedures. 

1. Back up important files.
  You can use thumb drives, CD/DVD's, or a host of on-line back up services like Carbonite.   

2. Protect your children online.  Make your knowing their log in's and paswords a condition for using the computer.  Conduct no notice inspections, where you check their content.  That will make them keep it clean. One of my child's friends was writing nasty things on e-mail.  I printed it out and threatened to send the messages to Grandma so she could see what type of friends my child has.  Boy, did that help her clean it up.  Also check privacy seting and information posted on facebook, etc.

3. Use security software tools as your first line of defense.  Norton, McAfee, etc.  Must have on your computer.

4. Use strong passwords or strong authentication technology to help protect your personal information.  Best passwords incorporate upper case and lower case letters, numbers and special characters.        Example:  Y s 8 * m K L 7 #

5. Learn what to do if something goes wrong.  Have some phone numbers for technical support handy.  They all go to someone in India anyway.

6. Know who you're dealing with online.
  Predators and con artists will conceal their true identity; look for discrepancies in their messages.   Some, like the child predators are very good at telling children what they want to here.  Train your children to be wary.    

7. Keep your web browsers and operating system up to date
.  Use the automatic update features, just ensure the website they are going to are valid.

Wednesday, July 7, 2010

Identity Theft 101

Having your information lost or stolen can be a frightening experience.  You worry about how the information may be misused.  You might be in this situation if, for example, your wallet was stolen; you responded to a phishing email; or you were notified that a company experienced a data breach and lost some of your data.  Fortunately, if your data may have been accessed without authorization, there are steps you can take to detect misuse that has already occurred and to help prevent potential future misuse.

What are the signs of identity theft?

Stay alert for the signs of identity theft, like,...

  • accounts you didn't open and debts on your accounts that you can't explain.

  • fraudulent or inaccurate information on your credit reports, including accounts and personal information, like your Social Security number, address(es), name or initials, and employers.
  • failing to receive bills or other mail. Follow up with creditors if your bills don't arrive on time. A missing bill could mean an identity thief has taken over your account and changed your billing address to cover his tracks.

  • receiving credit cards that you didn't apply for.
  • being denied credit, or being offered less favorable credit terms, like a high interest rate, for no apparent reason.

  • getting calls or letters from debt collectors or businesses about merchandise or services you didn't buy.


How do you find out if your identity was stolen?

Unfortunately, many consumers learn they their identity has been stolen after some damage has been done.

You may find out when bill collection agencies contact you for overdue debts debts you never incurred.

You may find out when you apply for a mortgage or car loan and learn that problems with your credit history are holding up the loan.

You may find out when you get something in the mail about an apartment you never rented, a house you never bought, or a job you never held.


What personal information should I monitor regularly?

Early detection of a potential identity theft can make a big difference. Keep an eye out for any suspicious activity by routinely monitoring:

Your financial statements. Monitor your financial accounts and billing statements regularly, looking closely for charges you did not make.

Your credit reports. Credit reports contain information about you, including what accounts you have and how you pay your bills. The law requires each of the major nationwide consumer reporting agencies to provide you with a free copy of your credit report, at your request, once every 12 months. If an identity thief is opening credit accounts in your name, these accounts are likely to show up on your credit report. To find out, order a copy of your credit reports.

Once you get your reports, review them carefully. Look for inquiries from companies you haven't contacted, accounts you didn't open, and debts on your accounts that you can't explain. Check that information, like your Social Security number, address(es), name or initials, and employers are correct. If you find fraudulent or inaccurate information, get it removed. See Correcting Fraudulent Information in Credit Reports to learn how. Continue to check your credit reports periodically, especially for the first year after you discover the identity theft, to make sure no new fraudulent activity has occurred.


How do I get my free annual credit reports?

An amendment to the federal Fair Credit Reporting Act requires each of the major nationwide consumer reporting companies to provide you with a free copy of your credit report, at your request, once every 12 months.

To order your free annual report from one or all the national consumer reporting companies, visit www.annualcreditreport.com, call toll-free 877-322-8228, or complete the Annual Credit Report Request Form and mail it to: Annual Credit Report Request Service, P.O. Box 105281 , Atlanta , GA 30348-5281 . You can print the form from ftc.gov/credit. Do not contact the three nationwide consumer reporting companies individually; they provide free annual credit reports only through www.annualcreditreport.com, 877-322-8228, and Annual Credit Report Request Service, P.O. Box 105281 , Atlanta , GA 30348-5281 .

Under federal law, you're also entitled to a free report if a company takes adverse action against you, such as denying your application for credit, insurance or employment, and you request your report within 60 days of receiving notice of the action. The notice will give you the name, address, and phone number of the consumer reporting company that supplied the information about you. You're also entitled to one free report a year if you're unemployed and plan to look for a job within 60 days; you're on welfare; or your report is inaccurate because of fraud. Otherwise, a consumer reporting company may charge you up to $9.50 for any other copies of your report.

To buy a copy of your report, contact:

Equifax: 800-685-1111; www.equifax.com

Experian: 888-EXPERIAN (888-397-3742); www.experian.com

TransUnion: 800-916-8800; www.transunion.com

Should I use a credit monitoring service?

There are a variety of commercial services that, for a fee, will monitor your credit reports for activity and alert you to changes to your accounts. Prices and services vary widely. Many of the services only monitor one of the three major consumer reporting companies. If you're considering signing up for a service, make sure you understand what you're getting before you buy. Also check out the company with your local Better Business Bureau, consumer protection agency and state Attorney General to see if they have any complaints on file.