Virus checkingsoftware: Use latest version of anti-virussoftware. Update your antivirussoftware regularly. Use internet security software and anti-spyware software too.
Backup your computer: ifyou have a valuable data in your computer, then you should back up. Back up cansafe your data from corrupting the system or destroy t the data by viruses. Youcan back up your files or folders in 3 different ways. You can back up yourfiles in external hard drive or you can use cloud storage.
Another way to backup your files are online backup service.Identity Theft: the most common cyber-crime activity is identity theft. Thecriminal obtains someone else’s personal business details to position as therightful owner and gain access to their bank account. Another reason ofidentity theft is diversion of financial assets.
Criminal trying to divert thefinancial assets of an organisation and to use this in illegal moneyundertaking activities.Prevention methods: Use encrypted websites: when you use a webpage and put someconfidential information or security data, before using, you have to make surewebsite is secured to give your confidential information by looking at it’sbeen encrypted or not. Look at the data; is it public or private.
Use authentication controls: Use authentication controls to protect against fraudulent in e-commercebusiness. Use two or three steps of identification of verification. Highconfidential data’s access should be controlled by password. Use strong password which one is difficult to break. SSL: SSL standsfor ‘secure sockets layer’. SSL is a computer networking protocol for securingconnections between client’s application network and an insecure server’snetwork. Due to enormous amount of protocol and application flaws andvulnerabilities, SSL was deplored for use on the internet and has been replacedby Transport Layer Security (TLS)Secure Sockets layer uses a combination of public key and symmetricmethod encryption to protect a connection between a server and client computer.
One is mail or web server and a client system, transferring data over theinternet or another TCP or IP network. SSL delivers a Mechanism for encryptingand verifying information or data sent between a tasks running on two machines.Secure Socketlayer runs above the network layer and the transport layer which areresponsible for the transport the data between over the server and clientnetwork, and respectively, below the Simple Mail Transport Protocol and theApplication Layer Protocol such as HTTP.The Threats SSL Prevent: SSL technology can manage the securityand confidentiality of transmissions. Data which one is being transmitted isefficiently encrypted, and later decrypted at its targeted destination.