Tag Archives: cyberspace

Guidelines for Publishing Information Online

Why is it important to remember that the Internet public? Because the Internet is so accessible and contains a wealth of information, it has become a popular resource for communicating, for researching topics, and for finding information about people. It … Continue reading

Posted in Computer Security, Cyber Security, G7 Security, Information Security, isecurity, Risk Management Strategies, Software Security Risks, Technology | Tagged , , , , , , , , , , , , | Leave a comment

Risks of File-Sharing Technology

What is file sharing? File sharing involves using technology that allows internet users to share files that are housed on their individual computers. Peer-to-peer (P2P) applications, such as those used to share music files, are some of the most common … Continue reading

Posted in Computer Security, Cyber Security, G7 Security, Information Security, isecurity, Network Security, Risk Management Strategies, Software Security Risks, Technology | Tagged , , , , , , , | Leave a comment

Browsing Safely: Understanding Active Content and Cookies

What is active content? To increase functionality or add design embellishments, web sites often rely on scripts that execute programs within the web browser. This active content can be used to create “splash pages” or options like drop-down menus. Unfortunately, … Continue reading

Posted in Computer Security, Cyber Security, G7 Security, Information Security, Network Security, Software Security Risks | Tagged , , , , , , , | Leave a comment

Understanding Internationalized Domain Names

What are internationalized domain names? To decrease the amount of confusion surrounding different languages, there is a standard for domain names within web browsers. Domain names are included in the URL (or web address) of web site. This standard is … Continue reading

Posted in Computer Security, Cyber Security, G7 Security, Information Security, Software Security Risks, Uncategorized | Tagged , , , , , , | Leave a comment

Understanding Web Site Certificates

What are web site certificates? If an organization wants to have a secure web site that uses encryption, it needs to obtain a site, or host, certificate. There are two elements that indicate that a site uses encryption (seeProtecting Your … Continue reading

Posted in Computer Security, Cyber Security, G7 Security, Hacked, Information Security, isecurity, Software Security Risks, Uncategorized | Tagged , , , , , , | Leave a comment

Shopping Safely Online

Why do online shoppers have to take special precautions? The Internet offers convenience not available from other shopping outlets. From the comfort of your home, you can search for items from multiple vendors, compare prices with a few mouse clicks, … Continue reading

Posted in Computer Security, Cyber Security, G7 Security, Information Security, Software Security Risks, Technology | Tagged , , , , , | Leave a comment

Protecting Portable Devices: Data Security

Why do you need another layer of protection? Although there are ways to physically protect your laptop, PDA, or other portable device (seeProtecting Portable Devices: Physical Security for more information), there is no guarantee that it won’t be stolen. After … Continue reading

Posted in Computer Security, Cyber Security, G7 Security, Information Security, Software Security Risks, Uncategorized | Tagged , , , , , | Leave a comment