You and your family are at risk of virtual attacks.
A decade ago, the Internet was something only “techies” talked about. It was a new limitless source of information, with very few users. Today, the Internet has already become an essential part of our lives. It’s where we access our banking records, credit card statements, tax returns and other highly sensitive personal information.
But with all the good things the Internet offers us, it also opens the door to serious, potentially devastating
threats. Unlike corporate and government computer systems, few personal computers have any safeguards beyond basic virus protection. That means anytime you’re online, you are a potential target for online criminals and hackers. And if you have high-speed Internet access, your computer is online most of the time, making Internet criminals and hackers a 24-hour-a-day, year-round threat to you, your personal information, and your family.
Glossary of Internet Security Terms
Adware
A form of spyware. Displays the “pop-up” ads you’ve seen on your computer. Advertisers use it to generate online revenue and exposure. Adware installs components that gather personal information without informing you that it’s doing so.
Broadband
High-speed Internet connection typically offered by cable and phone companies. Without adequate Internet security, Broadband users are constantly at risk of online security threats because their computers are always connected to the Internet.
Cookies
Bits of information secretly stord on your computer allowing others to monitor your Internet activities. This
spyware is often used to gather information on your Web-surfing habits to help companies create better marketing strategies. However, many send information to online criminals who would use it to harm you.
Firewall
Software that sets up a defense barrier around your computer so that hackers and online criminals cannot access the information on your computer.
Hackers
Individuals with computer and Internet skill levels sufficient enough to break security settings on personal computers and servers over the Internet. Some hackers do it for recreation, others for malicious intent.
Identity Theft
Occurs when a criminal obtains and uses another individual’s personal information (social security numbers, financial account information, etc.) to use his or her identity for illegal purposes. They then conduct fraudulent activities in the victim’s name.
ISP
Internet Service Provider. An organization that offers Internet access to customers.
Phishing
A hoax where Internet criminals send out false emails in the name of a legitimate organization in order to trick victims into sending personal information back to be used in identity theft crimes.
Spam
Unsolicited promotional email.
Spyware
Dangerous software that collects information about your computer activities. It sends that information to others without your knowledge or permission. Once on your computer, spyware installs itself and starts working. It’s difficult to detect, and often impossible for average users to remove. Types of spyware include tracking cookies, adware, Trojan Horses, and system monitors.
System Monitors
Spyware that observes and captures keystrokes of virtually everything you do on your computer—including passwords, social security numbers, credit card numbers, emails and chat room dialogs. It also monitors the Web sites you’ve visited, and programs you’ve run. They usually run unnoticed, storing the information on your computer in a secret file to be retrieved later.
Trojan Horses
Spyware that is often disguised as harmless or even desirable programs, but is actuallydesigned to cause loss or theft of computer data and to destroy computer systems. They usually arrive as email attachments or bundled with other software. Some give attackers unrestricted access to your computer anytime you’re online, allowing file transfers, adding or deleting of files and programs, and taking control of your mouse and keyboard.
Virus
A software program written to disrupt computer systems and to destroy data—viruses are the most well known Internet security threat.
Worms
Similar to viruses but much more dangerous. They spread rapidly by accessing your email address book and automatically forwarding themselves to every address it contains. Current anti-virus software can’t find worms once they’ve been loaded onto your system.
Web filtering
A software tool that allows computer users to determine which Web content they will allow
onto your computer through their browser.