Essays /

Understanding Internet Security Essay

Essay preview

Understanding Internet Security

What you need to protect yourself online.

Understanding Internet Security
What you need to protect yourself online.

Table of Contents
SECTION ONE—Internet Security: What it is and why you need it • You and your family are at risk of virtual attacks .....................................................................1 • Understanding how the Internet works and the security threats you face....................................1 • What’s a nuisance, what’s a threat ........................................................................................2 • Spyware: It’s the new threat your anti-virus software won’t find ................................................2

SECTION TWO—Protecting yourself from Internet threats
How to know if you have been a victim of an Internet attack .......................................................3 Step One: Find out what’s already on your computer ..................................................................4 Step Two: Get rid of the threats ................................................................................................4 Step Three: Build a protective wall around your computer ...........................................................4 Step Four: Filter out the Internet junk........................................................................................5

SECTION THREE—Advanced Protection. Simple Solution.
Identifying the right Internet security solution for you ..................................................................6 Evaluating your risks with the BP Security Analyzer™ .................................................................6 Eliminating the threats with BP Internet Security™Spy Sweeper™ ................................................6 Protecting your identity and personal data with the BP Internet Security™ firewall.......................................................................................7 Controlling Web content with BP Internet Security™ Web-filtering ....................................................................................................................7 Bringing it all together with the BP Internet Security™ control panel ....................................................................................................................7 Making security your top priority with BP Internet Security™…………...…… ................................7

SECTION FOUR—Glossary of Internet Security Terms ...............................................8 SECTION FIVE—Frequently Asked Questions about BP Internet Security™ .........10

Internet Security 101—Table of Contents

1

SECTION ONE—Internet Security: What it is, and why you need it. You and your family are at risk of virtual attacks.
A decade ago, the Internet was something only “techies” talked about. It was a new limitless source of information, with very few users. Today, the Internet has already become an essential part of our lives. It’s where we access our banking records, credit card statements, tax returns and other highly sensitive personal information. By the end of this decade, over 2 billion people will be connected to the Internet—that’s about half the world’s current population. But with all the good things the Internet offers us, it also opens the door to serious, potentially devastating threats. Unlike corporate and government computer systems, few personal computers have any safeguards beyond basic virus protection. That means anytime you’re online, you are a potential target for online criminals and hackers. And if you have high-speed Internet access, your computer is online most of the time, making Internet criminals and hackers a 24-hour-a-day, year-round threat to you, your personal information, and your family.

The numbers: Internet threats to your security are real.
• In 2002, more than 10 million people were victims of identity theft, costing the average victim more than $1,000 and a year’s time to repair their credit.1 • More than 95% of Internet users have inadequate protection from online threats.2 • Over 90% of computer users have dangerous “spyware” lurking on their computers without their knowledge.3 • In 2002, nearly 20 million people had the skills to hack a computer.4 • In 2003, Internet-related identity theft more than tripled.5 • Today, a typical online PC is “scanned” by outside intruders twelve times every day.6 1 – Federal Trade Commission Report 09/03/03 2 – SummitWatch 11/03 3 – TechNewsWorld 3/19/04 4 – Information Warfare Task Force 5 – USA Today 10/23/03 6 – National Strategy to Secure Cyberspace 9/02

Understanding how the Internet works and the security threats you face. When you access the Internet, your computer sends a message over the Web that uniquely identifies your computer and where it is located. This allows the information you’ve requested to be returned to you. Often, this requested information carries with it unwanted hidden software created by hackers and online criminals. This software installs itself on your computer and can either be just a nuisance or pose a more serious threat to you, your identity and sensitive financial information. Usually the nuisances are visible and easy to identify, while the more dangerous threats are typically invisible, silent, and difficult to detect until it’s too late. The key to a safe, enjoyable Internet experience is understanding the difference between what’s a threat and what isn’t.

1 Internet Security 101—Section One

What’s a nuisance, what’s a threat.
Cookies, pop-ups, and adware are tools that track your online behavior, and are u...

Read more

Keywords

-1000 -345 -487 -6617 -800 -801 000 09/03/03 1 10 10/23/03 101 11 11/03 128 2 20 2000 2002 2003 2004 24 25 3 3/19/04 30 333 4 48 5 5.5 500 6 60 64 7 8 9 9/02 90 90018166 95 98se 98se/2000/xp a.m abl accept access account act action activ actual ad address adequ adult advanc advertis adwar agenc ago alert allentown allow almost alreadi also alway amount analysi analyz annoy anoth answer anti anti-spywar anti-virus anyon anytim appear applic area aren around arrest arriv ask assess associ assur attach attack automat avail averag awar award award-win back bank barrag barrier base basic becom begin behavior believ belong benefit besid best better beyond big billion bit block book box bp break briefcas bring broadband brought brows browser build built bundl busi button cabl call cannot captur card care carri castl casual caus certain chanc chang chat children choic clean clear clock collect combat combin comfort commiss common communic compani compar comparison competit competitor complet compon comprehens compromis comput computer.4 conduct confus conjunct connect consist constant consum contact contain content control cooki corpor correct cost could cours creat credit credit.1 creditor crime crimin critic crucial cst current custodi custom cyberspac d daili damag danger data daughter day day.6 days-a-week deal decad decid decis decreas defens delet deni design desir desktop destroy destruct detail detect determin devast develop dialog dialogu differ difficult difficulti disguis disk display disrupt door download drawbridg drop due easi easiest easiest-to-us easili easy-to-us ecommerc effect effici either elimin email employe encount end engag enjoy enough ensur enter entic eras essenti est etc evalu even everi everyth evolv exist experi experienc expir expos exposur extra eye face fact fals famili featur feder file filter financi find firewal first five focus follow forc form forward found four fraud fraudul free frequent friend fulli futur gain gate gather general generat get give glossari goal good govern greater green guard habit hack hacker half hand hand-in-hand happen hard harm harmless hasn heard help hidden high high-spe higher highest highjack hoax home homepag hors host hour hour-a-day howev hundr idea ident identifi ie ii illeg illustr imag immedi import imposs improv inadequ inappropri inc incid includ increas individu industri infect inform innoc innov instal instant intent internet internet-rel intrud invis irrepar isn isol isp jail job julian junk key keyboard keystrok know knowledg knowledge.3 knowledge1 known late later latest lead learn leav left legitim let level licens life like limitless link list liter live ll load locat loss lost lot louis lower lurk made major make malici manag mani market may mb mean mechan meet memori mere messag mhz microsoft midnight million mind minut miss money monitor mous mst much must name nation near need neighbor network never new newer none nu nuisanc number objection observ obtain obvious occur offer often one ongo onlin onto open oper option order organ origin other outsid overal p.m page panel parent part partner pass password past payment pc peac peaceof peaceof-mind pennsylvania pentium peopl percent perform permiss permit person phish phone planet pleas plus pop pop-up popul pornograph pornographi pose possibl potenti power present prioriti privat problem process processor product profession program promis promot prompt proper protect proven provid pst publish purchas purpos q qualiti quarantin question quick quiet ram rapid rate re real receiv recommend record recreat regard regardless regist relat releas remov repair report repres request requir reserv result retriev return revenu review rid right risk room round run safe safeguard safeti scan seamless search secret section secur see seem seen select send sensit sent separ serious server servic set seven ship side side-by-sid silent similar simpl simple-to-us simpli site skill skin slower slowli sneak social softwar sold solid solut someon someth soon sophist sourc space spam specif speed spend spi spread spywar stack start state statement stay steal step stole stolen stop store stori strategi suffer suffici summitwatch support sure surf sweep sweeper symptom system tabl take talk target task tax team techi technewsworld technic technolog telephon term theft thick thiev thing though threat threaten threatfre threats.2 three tick time today togeth tool top top-rat total track trade trademark transfer tri trick tripled.5 trojan turn tutori twelv two type typic understand uniqu unit unknow unlik unnot unprotect unrestrict unsolicit unusu unwant up updat upgrad us usa use user usual various ve version victim view virtual virus visibl visit vulner wait wall want warfar watch way weak web web-bas web-cont web-filt web-surf websit week well whenev whether william win window windows-bas within without woman won work world worm would written wrongdo www.bigplanetusa.com xp year year-round yes yet york