Friday, June 20, 2008

How To Safeguard Our Personal and Financial Data ?

Since the Internet founded in late 1980's, more and more people join this network,or we called World Wide Web and become an user of it. Internet is a public network of nearly 50,000 networks connecting millions of computers throughout the world, and this figure will only increase as daily basis.

We keen to use Internet because it brings a lot of convenience into our life.Nowadays, we can find that human are hardly to perform many task if there is no Internet provided. Human are now heavily dependant on Internet, which make the world become smaller, make us a global village.



Once we involve into those website, we are always request to provide some personal information. The information are including name, age, gender, email address or even financial or privacy data.Those information are normally used to contribute into a database of the website, which are purposely use to store their user's information and try to identify and understand their users.




However, as we reveal our information, there are some risk for us. The information that we given via Internet might not safe to be revealed. Our information might be infringe by third party such as hackers or other spyware. There are many real world issue can be found, and the credit card issue is the most common problem in infringe information.As we purchase in Internet, we can paid by using Bank Transfer and Credit Card, but these 2 method are required us to provide our financial data to the e-merchant. Fraud and phising arise when the things go on. The security issue make a big impact on Internet users, causes them reluctant to use E-Commerce and other services in Internet.



How to protect our personal and financial data ? Here are some of the tooltips:



1.Do not use desktop search tools like Google Desktop or Microsoft Desktop Search.

A full index of every keyword on your hard drive in the hands of marketers is very useful for the purposes of targeted advertising.


2.Do not use webmail from a service provider like AT&T, Google or Microsoft.

Same reason as above, except here it applies to every email you send or receive.


3.Do not use browser toolbars or desktop gadgets.

Both of these types of add-ons from companies like Yahoo and Google are known to gather information on your online activity for marketing purposes.






4.Remove all social network accounts.

There is loads of good information there that can be used for targeting and correlation. At the very least, remove all personal information and have a username that does not give any clues to your true identity.


5.Clear your browser cookies after every session.

To take erasing your footprint a step further, do not accept any browser cookies by default. This additional step will make web surfing slower and more intrusive as you will have to manually accept or deny cookies. That being said, if you surf for an hour without accepting cookies by default you will become much more aware of them, and that in and of itself could prove enlightening.


6.Change your local username daily.

Browsers and other software have been known to pass local usernames to servers as part of their operation. If your username is something like “first.lastname” this is clearly useful information for data collection purposes.


7.Do not have a home broadband connection.

If you have a home broadband connection, a network service provider can map your name to your IP address to your physical location. Again, your name, where you live and your Internet activity is all useful information for marketers.


8.Use free Wi-Fi.

If you don’t have a home broadband connection but you will still want to be connected, find a free wireless access point at a local coffee shop. To further hide your existence, every time your computer associates with a wireless access point, manually change your MAC address.


9.Install a host-based Intrusion Detection System (IDS) like OSSEC.

Assuming that you are already using a personal firewall, anti-spam and anti-spy software, a host-based IDS will ensure your computer isn’t being used without your knowledge. For an additional level of security, you could block all Internet traffic except for HTTP (port 80) and then log and trap anything else.

Reference Link:

Prepared and review by Rui


All right reserved by EnT02 Group Rui,Ean and Agu

No comments: