• Create BookmarkCreate Bookmark
  • Create Note or TagCreate Note or Tag
  • PrintPrint
Share this Page URL
Help

Chapter 5. Connecting to the Internet (G... > Internet Security Checklist

Internet Security Checklist

We have covered a lot of ground, so I have included a quick checklist here to help you assess how you are handling security for your Internet connection. This list should help determine how well you are covering the areas that need to be secured when you’re connecting to the Internet.

  • What type of connection do you have? Is it “always on?”

  • Do you use an operating system that can be secured? Does it support user identities, security at the file-system level, and auditing of activities on the system?

  • Do you run programs from unknown sources, including executing programs, scripts, or files containing macros?

  • Do you use an antivirus program and make sure it scans your system regularly?

  • Have you given out your password or logon information? Are you careful with your personal information?

  • Do you know your risk and are you aware of the value of the data on your system to yourself and others?

  • Do you assume out-of-the-box security is enough?

  • Have you turned on auditing, if your operating system supports this option?

  • Are you using a firewall, proxy, or network address translation (NAT)?

  • Do you manually read audit logs or use a parser to do it?

  • Do you protect sensitive information with encryption?

  • Do you use any tools to analyze your own security? How often?

  • Do you protect your online privacy?


PREVIEW

                                                                          

Not a subscriber?

Start A Free Trial


  
  • Creative Edge
  • Create BookmarkCreate Bookmark
  • Create Note or TagCreate Note or Tag
  • PrintPrint