Social Engineering
-Do not reveal personal or financial information in email, and do not respond to email solicitations for this information. This includes following links sent in email.
-Don’t send sensitive information over the Internet before checking a web site’s security.
Trojan Horse
-Never execute programs unless they are from a trusted source.
-Never open e-mail attachments unless you know who they’re from, especially attachments with the extensions .exe, .ink and .vbs.
-Update your antivirus and security software on a regular basis.
Distributed Denial of Service
-Install latest security patches
-use and turn on firewalls
Sniffing
-use SSL(Secure Socket Layer) where digital certificates and signatures help to encapsulate data
-IP Security insures some form of protection at each packet level
IP Spoofing
-reject packets originating inside of your network that claim to come from a host on the outside
-use access control to deny IP addresses on your interface
Brute Force Attack
-restricting the amount of valid login attempts
-ban IP address after multiple login fail attempts
Shoulder Surfing
-if you are using an ATM (Automatic Teller Machine) try to ensure that no one is standing behind you. If you feel that the individual behind you is too close ask them to take a few steps back. Most ATMs now have lines marked on the pavement to indicate the distance at which a waiting customer should stand behind someone already using the machine
-memorise your PIN number – never write it done and under no circumstances leave it in a wallet or purse along with your cars
-you should never carry letters or statements from banks or building societies about your person. These documents along with your credit or debit card can be a gift to any would be robber
Sabotage
-use virus scanner to remove bugs from your system
-don’t put personal information on Windows if your connection is through a DSL line