The 50 Ways Series

50 Ways to Protect Your Information Assets When Cruising the Internet

CyberCops are particularly vulnerable to exploitation when they are doing investigations on the Internet. To help them, and others who want to be safer when cruising the Internet, Fred Cohen and (Kevin Manson) provide this list of the 50 ways to protect your information assets when cruising the Internet.

System configuration must be done properly in order to have a modicum of security. Here are some configuration issues you should address:

Passwords have been a security issue for a long time, and most people still don't know how to use them safely. You need to know how to create and use passwords that are properly crafted to the need:

Don't trust remotely obtained software. It can contain Trojan Horses that are potentially devastating in their effect. Examples of how this has been exploited in the past include but are by no means limited to (1) causing your system to dial out to a 900 number for Internet service, (2) stealing your online information, (3) corrupting or destroying information on your system, (4) turning the computer into a jumping off point to attack other systems, and (5) placing a Trojan horse in your system to permit remote reentry and exploitation at a later date.

Keep up to date on the information security issues that might effect your system:

Use available security technology to your advantage:

Use uncommon sense: