Beka

__ Identity Theft __ Identity theft is a crime in which one person takes another person's personal information, such as their name, social security numbers, drivers license numbers, etc. The information can be used to obtain credit, merchandise, and services in the name of the victim, or to provide the thief with false credentials. In addition to running up debt, the thief might provide false identification to the police, creating a criminal record or leaving outstanding arrest warrants for the person whose identity has been stolen.

Identity theft can be put into two categories: true name and account takeover. True name identity theft means that the thief uses personal information to open new accounts. The thief might open a new credit card account, establish cellular phone service, or open a new checking account in order to obtain blank checks. Account takeover identity theft means the thief uses personal information to gain access to the person's existing accounts. Typically, the thief will change the mailing address on an account and run up a huge bill before the person who's identity has been stolen realizes there is a problem. The Internet has made it easier for an identity thief to use the information they've stolen because transactions can be made without any personal interaction.

Although an identity theft might crack into a database to obtain personal information, experts say it's more likely the thief would obtain information by using old-fashioned methods. Retrieving personal paperwork and discarded mail from trash dumpsters, also known as dumpster diving, is one of the easiest ways for an identity thief to get information. Another popular method to get information is something known as shoulder surfing - the identity thief simply stands next to someone at a public office, such as the Bureau of Motor Vehicles, and watches as the person fills out personal information on a form.

To prevent identity theft, you should shred all your important papers and especially pre-approved credit applications received in your name and other financial information that provides access to your private information. Make sure you do not throw anything away that someone could use to become you. Get all of your checks mailed to your bank, not to your home address.There are many more ways, but these are just to name a few useful ways.

__Firewalls__ Firewalls are a key part of keeping networked computers safe and secure. Traditional firewall architectures protect only the perimeter of the network. However, once an attacker penetrates the that perimeter, internal systems are completely unprotected. Hybrid worms, in particular, have penetrated corporate systems through e-mail systems, and then have spread quickly to unprotected internal systems. Applying host-based firewalls to all systems, including those behind the corporate firewall, should now be standard practice.

Most of the "attackers" of your computer today include worms and viruses.