Subscribe: Security Articles
http://www.security-port.com/article-feed.php
Preview: Security Articles

Security Articles



Articles related to security issues and security alerts.



Published: Mon, 21 May 2007 09:00:00 -0400

Last Build Date: Fri, 18 May 2007 15:52:02 -0400

 



Home Security Measures

Mon, 21 May 2007 09:00:00 -0400

Anyone is susceptible to robbery, home invasion, or assault. Criminals often survey their target before entering and taking a few precautions will make your home and those who dwell there less likely to be victimized. Those who have experienced someone coming into their home will often report the feeling of being violated. More than the items lost or destruction of property, the concern for the lives and well-being of those in the home are the foremost concerns. It can effect daily activities, comfort and self-assurance. There is generally enough concerns in life that take worry, that your home security should not have to be one on them. There are a variety of precautions to take, ranging from simply installing lights to a full security system in your home. Taking these measures will give the impression some one is home, deterring would be criminals and/or warning through lights or noise that their presence is known. If the question comes to mind, "why do I need a security system?", it might be beneficial to search the local statistics for crime in your geographical area.

Home Security Measures



Security Classifications

Tue, 3 Oct 2006 09:00:00 -0400

Having a security clearance is nothing to sneeze at, and some experts say that having such a clearance can increase one’s salary between $10 and $15K. It is evident that the ability to keep a secret is a valued commodity in this increasingly precarious society.

Security Classifications



Background Checks

Tue, 26 Sep 2006 09:00:00 -0400

If you have ever been employed, chances are good that you’ve had a background check run on you. Employers looking for reliable, trustworthy individuals will often use these reports to confirm that information given on a resume is true and ensure that they are hiring persons of high standards. But what is included in a background check? Do you have control over who can access your report? How can you find out what is on your record?

Background Checks



Careers in Security

Tue, 19 Sep 2006 09:00:00 -0400

To get almost any job in security one must pass a full background investigation and pass a drug test. If security clearance is required for hiring, this may take six months to a year. The military employs the nation’s greatest population of individuals who possess security clearance. Often members of the armed forces find gainful employment in security-related fields when their terms are up.

Careers in Security



Security on Campus

Tue, 12 Sep 2006 09:00:00 -0400

It may surprise you to know that college and university campuses are scenes to more than just socializing and learning. All too often, they can also be the scenes of a crime. Awareness of this problem has grown dramatically over the last twenty years, and many institutions are taking appropriate measures to protect their students from malice. Wise parents do not close their eyes to these issues, but discuss them openly with their students. When choosing schools for their sons or daughters, they consider the security programs and features utilized by the schools. You must do all you can to ensure that your student doesn’t get an education they didn’t plan for.

Security on Campus



Blogging Dangers

Mon, 28 Aug 2006 09:00:00 -0400

While blogging can be a great outlet and channel, and in someway immortalizing thoughts, it is important that safety is considered and that good blogging practices are followed at all times.

Blogging Dangers



Who is Who? Dangers of Anonymity.

Tue, 15 Aug 2006 08:00:00 -0400

Child exploitation and the rise of Internet related crimes is increasing. Child exploitation has no boundaries; pedophiles exist in every socioeconomic, ethnic and religious community. Consider these statistics, 20% of children online are approached sexually online. 89% of those advances take place over instant messaging. Online predators prowl, rebellious teenagers are opportune targets, and shared personal details often make them become victims.

This further fuels the discussion of who is who. Are they really who they say they are, or claim to be? The Internet is far more complex and "anonymity" might in fact provide the protection that surfers are seeking.

Who is Who?



Keep Your Family Safe

Mon, 14 Aug 2006 09:00:00 -0400

Tips to make sure that your family is safe at home and while traveling.

Keep Your Family Safe



Protect Yourself From a Home Invasion

Mon, 7 Aug 2006 09:00:00 -0400

There are lots o small things that homeowners can do to deter a burglar. Follow these simple steps to protect your home from a burglar.

If you have a lot of jewelry, valuable documents, cash or other negotiable items, consider installing a safe or a burglar alarm.

Don't leave notes for service people or family members on the door, as they act as a welcome mat for a burglar.

Protect Yourself From a Home Invasion



Protection from a Home Invasion

Mon, 31 Jul 2006 09:00:00 -0400

If you have a lot of jewelry, valuable documents, cash or other negotiable items, consider installing a safe or a burglar alarm. Don't leave notes for service people or family members on the door, these act as a welcome mat for a burglar.

Protection from a Home Invasion



Keeping Children Safe Online

Mon, 24 Jul 2006 09:00:00 -0400

There was once a time when you only had to worry about children when they were outside or not at home. Those times have changed. Strangers can now enter your home, without a key or coming through a door. How you may ask? These strangers enter your home using a keyboard. These strangers can befriend your children online.

Keeping Children Safe Online



Online Safety

Mon, 17 Jul 2006 09:00:00 -0400

The proliferation of computer technology and emergence of the Internet has enhanced the lives of children and adults. Increasing productivity and efficiency, the Internet is a powerful educational tool, and it provide youths a vast amount of information. That said, it is important to remember that the Internet can also be very dangerous. Criminals are using modern technology to prey on innocent victims.

Online Safety



Personal Security; Avoiding Identity Theft

Tue, 11 Jul 2006 09:00:00 -0400

Some law-enforcement authorities call identity theft "the fastest growing crime across the country right now". In fact, identity theft is the most called-about subject on the Privacy Rights Clearinghouse's telephone hotline. Most victims don't even know how the perpetrators got their identity numbers. Such fraud may account for as much as 25% of all credit card-fraud losses each year.  49% also stated that they do not feel they know how to adequately protect themselves from this crime.

Personal Security Avoiding Identity Theft



Homeland Security

Tue, 4 Jul 2006 09:00:00 -0400

The US President's Executive Order issued October 8, 2001 established the US Office of Homeland Security. The Office is directed to develop and coordinate a comprehensive national strategy to strengthen protections against terrorist threats or attacks in the US. The new Office will coordinate federal, state, and local counter-terrorism efforts.

More on Homeland Security



Protection from Cyberstalkers

Tue, 27 Jun 2006 09:00:00 -0400

What is Cyberstalking?
Cyberstalking is the term used to describe stalking behaviour undertaken by way of computer. Although no universal definition exists, cyberstalking occurs when an individual or group uses the Internet to stalk or harass another.  Essentially cyberstalking is the act of stalking using the Internet, e-mail, or other electronic communication devices.   Everyone who receives e-mail or uses the Internet is susceptible to cyberstalking.  

More on Cyberstalking



Protection from a Home Invasion

Tue, 20 Jun 2006 09:00:00 -0400

Use simple safety systems to protect your home. Use locks and other mechanisms to lock the doors that are difficult to break. The longer the burglar takes to break into the house, the greater the chances that he will be caught.

Protection from Burglars



Security Policies

Tue, 13 Jun 2006 09:00:00 -0400

Create security policies to match the size and culture of your business. Policies must be written, enforced, and continually updated. Maintain configuration management through Security Policy implementation and systems hardening.

Security Policies



Security Systems Software

Tue, 13 Jun 2006 09:00:00 -0400

Anti-Virus Software:
Install virus protection software. That means three things: having it on your computer in the first place, checking daily for new virus signature updates, and then actually scanning all the files on your computer periodically. Update your anti-virus software daily or weekly and schedule a regular scan. Make sure all family members know what to do if the home computer becomes infected.

Security Systems Software




Encryption, Security and SSL

Tue, 6 Jun 2006 09:00:00 -0400

When it comes to accepting online payments and other sensitive information over the web, normal HTTP just doesn't cut it. It's an insecure method of communication where everything is sent over the wire in cleartext - it's completely trivial for anyone in a network administrator position at a business or ISP to gain access to the network, and most networks are even vulnerable to 'sniffing' by non-privileged users of the network.

Encryption, Security and SSL



Computer Virus Basics

Tue, 30 May 2006 09:00:00 -0400

In its simplest terms a virus is a disruptive computer code period! A computer virus almost always repeats itself and spreads by attaching itself to other files. Viruses can be made to host a number of harmful things on any computer from disrupting files to crashing networks. It can even be laying dormant, without you knowing it's there and then attack when least expect it, like right in the middle of downloading a large file or typing a long report.

Computer Virus Basics



Holiday Security

Mon, 22 May 2006 09:00:00 -0400

Christmas holidays are a special time when families and friends come together to celebrate the season. It is also the time of year where families and friends are most generous and practice the tradition of gift giving. It should be a joyous and happy time for all of us. Unfortunately for us, home burglars view the holiday season a little differently. For them, it is a time of opportunity to burglarize your home for cash, credit cards, and all the new gifts of small electronics, computers, jewelry, and easily sold valuables. Here are a few tips of what they look for when shopping for a house to burglarize. These tips will help you enjoy the holidays without incident.

Holiday Security



New Security Portal

Tue, 16 May 2006 09:00:00 -0400

Security Port is an innovative web site that provides news, resources and information about critical security issues. The new site located at http://www.security-port.com makes it easy for individuals searching for security solutions and information. Security Port helps users locate the latest security news and technology in one convenient location.




Tips to Prevent Computer Infections

Tue, 16 May 2006 09:00:00 -0400

Methods that guarantee a computer or network is safe from computer viruses, worms and trojan horses simply do not exist. Users can take several precautions, however to protect their home and work computers from these malicious infections.

Tips to Prevent Computer Infections



Protection from Identity Theft

Tue, 9 May 2006 09:00:00 -0400

Identity theft is the fastest growing criminal activity in the 20th Century, replacing illegal drug sales.

Protection from Identity Theft



High Tech Fingerprint Fraud

Mon, 8 May 2006 13:41:43 -0400

Eyeballs, a severed hand, or fingers carried in ziplock bags. Back alley eye replacement surgery. These are scenarios used in recent blockbuster movies like Steven Spielberg's "Minority Report" and "Tomorrow Never Dies" to illustrate how unsavory characters in high-tech worlds beat sophisticated security and identification systems.

High Tech Fingerprint Fraud



Technology Predictions

Tue, 14 Mar 2006 09:00:00 -0400

Technology is usually thought of as impersonal, but something needs to be recognized; without technology the personal elements of the 2005 tragedies would not likely have been conveyed to the extent and timeliness they were. Reflecting on 2005 and looking forward to 2006, technology will undoubtedly continue play a significant role in the future both on a personal and impersonal level.

Technology Predictions