Robert Sim, CyberGuard
The basic problem for home or end user is lack of understanding and ignorance of the dangers of the Internet. The Internet at the moment is like Wild West, full of dangers and pit holes. Home users are using their computers for investing, banking, shopping and communicating with friends through e-mail or chat programs. We may not consider our communications as top secret but intruder may read your email and use your computer to attack other systems. They may examine your personal data stored in your system like credit card information, bank's password and account information and other personal information.
Intruders do not care about the identity of the users. They want to control your computer so that they can launch attacks against other more important computer systems like government or financial systems. By taking control of your computer allow them to hide their true identity and location. Once your computer is connected to the Internet to play games or to send email to friends, you are the target.
Intruders can control your computer and monitor every action on the computer. They can see what you see on the monitor screen, what is your bank account name and the password. They can switch on your microphone and web cam without you knowing it and they can see and hear what is happening in front of your computer. (Don't have your web cam facing your bed.)
Control your system is as easy as "ABC", intruders are always discovering new vulnerabilities to exploit in computer software. Some software applications have default settings that allow others to access your computer unless you change the setting to be more secured. Examples chat programs that allow outsiders to execute commands on your system or web browsers that allow someone to put harmful programs on your system that run when you click it.
How do you protect yourself and minimizes the risk of an attack: -
- Use anti-virus software and keep it updated - many people do not regularly update the virus definitions.
- Use a personal firewall for your system.
- Email attachments are dangerous; you need to think where it comes from before opening. Even best friend can sent you dangerous attachments unintentionally.
- Don't run unknown programs from unknown origin.
- Install the vendors' security patches for all your software applications (IE) and operating system.
- Disconnect or turn off your computer (some computer can be turn on from the net) from the network.
- When it is possible turn off scripting features in email program
- When it is possible turn off Java, JavaScript and ActiveX.
- Backup your data regularly.
- Make a boot disk in case your computer is damaged or compromised.