Saturday, October 12, 2013

Week 7 - Internet Security

There are many various steps that one can take when it comes to increasing the privacy on your laptops, phones or any devices that one uses to connect to the Internet. However, after doing some research, I have cross referenced all the data that I found online and came up with the six most effective steps. There was much information available online in how to increase your privacy but these are the simpler and recurring ones but they serve as well as the more complicated ones. These steps are taken to shield yourself against potential hackers and identity thieves and in some way, the government.
1)    Hide in the network.
Implement hidden services such as Tor. Tor is a free software that is available online for enabling online anonymity. What the program Tor does it that it directs Internet traffic through a free, worldwide, volunteer network consisting of more than three thousand relays to conceal a user's location or usage from anyone conducting network surveillance or traffic analysis. Using Tor makes it more difficult to trace your Internet activity, including "visits to Web sites, online posts, instant messages, and other communication forms", back to the user. Anyone can use this to conceal their identity and Internet activity from most surveillance and traffic analysis. This can also be used to protect users against the amazingly brazen efforts by commercial companies to track the customers’ online behaviour.
Another option for becoming anonymous online is logging on through a personal virtual network. Software programs such as proXPN VPN and HMA! Pro VPN creates a secure, encrypted Internet connection and masked IP address for a home computer, laptop or any other devices. The software can act as an extra layer of protection if one is going online over a public Wifi network at a coffee shop or airport, which might not be password protected.
2)     Encryption
Popular email programs such as Microsoft Outlook and Gmail already have built-in encryption. So do websites that use Hypertext Transfer Protocol Secure (HTTPS) which is the latest communications security protocol. One can tell whether a website has HTTPS protection by looking at the site's URL in the browser's address bar. If the URL starts with "https" instead of "http" it has an extra protection, called secure socket layer (SSL), built in. Sites with HTTPS encrypt personal data and other sensitive information that users may share on the site. What the Transport Layer Security (TLS) and its predecessor, Secure Sockets Layer (SSL) is, is that they are cryptographic protocols that are designed to provide communication security over the Internet. They use X.509 certificates and hence asymmetric cryptography to assure the counterparty whom they are talking with, and to exchange a symmetric key. This session key is then used to encrypt data flowing between the parties. Another method to go to the Electronic Frontier Foundation website to download extensions for Chrome and Firefox that add HTTPS protection to the browser regardless of the sites that one visits.

3) Shield your IP address. 

After encrypting all the important data, the next step is to shield your IP address. The most effective way to do so is to download software programs such as AnchorFree's Hotspot Shield or Easy-Hide-IP that mask any device's IP address. Both programs have been proven to render all the devices undetectable by the NSA, hackers, police, Internet service providers, or anyone else bascially.

4)     Shop online with a virtual or single-use credit card number. 
Online or virtual shopping is the ‘in’ thing these days. Everyone is buying everything off the Internet because it is so much more convenient. The only downside is that one had to wait a few days for the delivery to arrive. It saves one the trouble, effort, time and cost of travelling to buy something that they can get off the web. This is the reason why the Bank of America's ShopSafe and Citibank's Virtual Account Numbers programs came about. These programs are created to shield customers' account information by generating a virtual credit card or single-use credit card number for online purchases. The virtual cards may be good for a single purchase or pre-set period of time. This prevents hackers and scammers from getting one’s credit card information.
5)     Keep anti-virus updated. 
Everyone hates what the updating of the anti-virus does to their computers, but if one does not have anti-virus, anti-spyware and anti-phishing software on the devices they use to connect to the Internet, chances of them getting hacked are a lot higher.
6)     Monitor your stuff
What one can do is routinely monitor their bank statements, credit card bills and other accounts so if hackers or identity thieves have used your information. When you can spot it, take the necessary steps to correct it. Credit card companies also do monitor customer accounts for potentially fraudulent activity. But ultimately, it is up to oneself to pay attention to your own accounts.
And there you have it, 6 easy steps to shield yourself on the Internet. Hope it helps!
Till next time.

No comments:

Post a Comment