Online Security: How Secure are You When You Get on the Internet?

Aug 10
06:10

2007

Dean Forster

Dean Forster

  • Share this article on Facebook
  • Share this article on Twitter
  • Share this article on Linkedin

Management of security features and assurances via control of changes to hardware, software, firmware, documentation, test, test fixtures and test documentation of AIS, during the development and life cycle of a system.

mediaimage

Internet technology specialists widely agree that security is becoming the primary concern of those using Internet technologies. This is especially true now for Internet novices who hear stories of rampant identity theft,Online Security: How Secure are You When You Get on the Internet? Articles Trojan horses, worms, rootkits, and general spyware. Internet novices don't know what these terms mean, but they know disaster will strike if they don't have a premium Internet security software suite.

However, even those with a fair amount of Internet experience find it difficult to know what to look for to protect themselves and how to configure it when they find it. As partakers in the Internet, we are left to whatever advice we can get and whatever software we can find. We have little in the way of resources to tell us which people to trust for advice. We continue on without even knowing what causes these Internet security vulnerabilities.

One of the things many users are surprised to discover is that Internet security has a lot more to do with what programs that are installed and run on the computer than where they go on the Web. For example, the relative rarity of the software used on Apple computers makes it a less common target of viruses. So doing the same things on an Apple that you would do on a PC would expose you to less security threats. This is also true of the various Linux platforms available. Because an overwhelming majority of users run Windows, hackers tend to develop viruses and worms for Windows vulnerabilities and for the major software programs run on Windows based PCs. So one simple solution to the majority of security threats, for those who don't need a specific Windows only program, is to switch operating systems.

Another thing that makes Windows an easy target for hackers is the way it is assembled with a standard set of helper applications and applets. For example, Windows Mail or Outlook Express come pre-configured to automatically open files. If a file has a virus, you're in trouble. This is just one example of the many holes built into Windows when it is freshly installed. Instead of being built securely from the start and then adding on features, Windows is built full of features, and then bug fixes are added as people find the holes. Until the bug fixes are released and installed on your computer before the hackers find the holes, your computer is at risk. You can also find out more at http://www.configurationmanagementsystem.com

In addition to exploited software flaws, Internet users must take into account online security. E-commerce is perhaps the most crucial area for online security. Even if you have a secure connection to the Internet, a secure computer and you are able to make a transaction without any compromise of information, you could still be at risk. If the company you transact with keeps a database of online transactions, you are as vulnerable as their database. If you transact with many companies, you are as vulnerable as the weakest link among them.