Uniform Crime Reporting Program

If a hacker breaks into a bank’s computer and steals your account numbers and Social Security number along with your mother’s maiden name, there’s not a thing you can do about it. Your personal information is only as secure as the computers it’s stored on, so it’s important to share such data only with trusted institutions. And then pray that they protect it as best they can. Securing Your Computer Your task, prior to venturing into an eBay goods-grabbing, fortune-finding journey, is to ensure that your computer is safe and your data is safe.

Here are the steps to consider to ensure that your online adventure begins in a safe vehicle. Step 1: Secure the Line With the allure of blazing-fast Internet surfing made available by broadband Internet connections (DSL or cable modems, for example), PC users need to recognize the risk and responsibility when enjoying the convenience of an “always on” Internet connection. Essentially, your PC remains open to the Internet 24 x 7 while it’s dutifully humming awaiting your next command or request.

4 In the meantime, others could be stopping by, unannounced, usually to cause harm, mayhem, or data theft. Don’t yank the connection from the wall just yet, though. Instead, look to a Firewall application that can effectively screen unauthorized access to your PC from that open broadband line. ZoneAlarm and BlackICE Pc Protection are but a couple of the firewall applications available to protect your PC. Search the Internet for “firewall” and compare and contrast the features and costs.

Step 2: Batten Down Your Browser With the direct line into your computer appropriately guarded, now secure your browser to help ensure you don’t unwitting allows trouble into your trading space while innocently surfing the Internet. The security settings, options, and preferences in your browser will help add the next level of protection. If you’re using Internet Explorer, choose Tools, Internet Options, click the Security tab, and select the Internet icon.

Then confirm that the Security level slider is set at least Medium, effectively blocking most activities that could introduce illicit scripts and programs to execute while you browse. Step 3: Clear Your Cookies; Erase Your History Although they’re typically not destructive in nature, those cute little cookie files that Web sites use to personalize your online experience do often tell tales that you might want to keep to yourself. Cookies offer up information about which sites you like to surf, what sort of preferences you have in shopping, and other details about how you’ve customized your online

4. Cole, Eric and Ring, Sandra. Insider Threat: Protecting the Enterprise from Sabotage, Spying, and Theft. Syngress. 2006. exploits at various Web sites. If you’re an IE user and are curious just how much information cookies can reveal, choose Tools, Internet Options; then on the General tab, click the Settings button in the Temporary Internet files area. In the Settings dialog box, click the View Files button to see all the cookies sitting in your virtual cookie jar. Mozilla and Netscape users should choose Tools, Cookie Manager, Manage Stored Cookies.

The real risk in having cookie files hanging around is that the information could be retrieved by a virus, a hacker, or a spybot (more on those later) to collect information about your Internet habits, using that information to bombard you with even more e-mails, advertisements, and other such annoying come-ons. To view history records in any of the browser previously mentioned, simply press Ctrl+H on your keyboard to open the History frame that will appear on the left side of your browser window. Here you can see sites that have been visited in the past day, week or beyond.

To clear this trail of ever your operating systems, visit the appropriate Web site to ensure that you keep your computer’s core functions and protections current.


Bott, Ed, Siechert, Carl and  Stinson, Craig. Microsoft Windows XP Inside Out. Original from the University of Michigan. 2004, 168. Cole, Eric and Ring, Sandra. Insider Threat: Protecting the Enterprise from Sabotage, Spying, and Theft. Syngress. 2006. Federal Trade Commission, United States, 2002. Uniform Crime Reporting Program,( Federal Bureau of Investigation), United States 2002.