Microsoft Office Tutorials and References
In Depth Information
Security Threats on Your Computer
Figure 25
The Internet Explorer browser when a known spoofed site is visited
Criminals get people to visit spoofed sites by phishing , which is the practice of
sending email messages to customers or potential customers of a legitimate Web site asking
them to click a link in the email message. The link leads to a spoofed site where the user
is asked to “verify” personal information.
If you receive a message like this, never click the link in the message. Instead, open
your browser and type the URL of the organization into the Address or Location bar.
Unfortunately, sometimes a criminal can break into a DNS server (a computer
responsible for directing Internet traffi c) and redirect any attempts to access a particular Web
site to the hacker’s spoofed site. This is called pharming .
Protecting Information with Passwords
You can protect data on your computer by using passwords. You can set up accounts
on your computer for multiple users and require that users sign in with a username and
password before they can use the computer. This is known as logging in or logging on .
You can also protect individual files on your computer so that people who try to open or
alter a file need to type the password before they are allowed access to the file. Many
Web sites require a username and password to access the information stored on it. To
prevent anyone from guessing your passwords, you should always create and use strong
passwords. A strong password consists of at least eight characters of upper- and
lowercase letters and numbers. Avoid using common personal information, such as birthdays
and addresses, in your password.
Search JabSto ::

Custom Search