Threats to Computer Security
17
Rule No. 2:
Use caution when copying new data to your computer
:
Scan all removable storage drives, for example floppies, CD/DVDs, and
flash drives, for viruses before using them (see 5.5 on pg. 51).
Treat emails with caution. Do not open any files attached to emails un-
less you are certain that you were intended to receive them, even if they
were sent by people you know.
Be careful with information obtained through the Internet. If any web site
suggests that you install a new program, be certain that it has a security
certificate.
If you are copying an executable file from the Internet or local network,
be sure to scan it with Kaspersky Anti-Virus.
Use discretion when visiting web sites. Many sites are infected with
dangerous script viruses or Internet worms.
Rule No.
3:
Pay close attention to information from Kaspersky Lab
.
In most cases, Kaspersky Lab announces a new outbreak long before it
reaches its peak. The corresponding likelihood of infection is still low, and
you will be able to protect yourself from new infection by downloading
updated application databases.
Rule No. 4:
Do not trust virus hoaxes
, such as prank programs and emails about
infection threats.
Rule No. 5:
Use the Microsoft Windows Update tool
and regularly install Micro-
soft Windows operating system updates.
Rule No. 6:
Buy legitimate copies of software from official distributors
.
Rule No. 7:
Limit the number of people who are allowed to use your computer
.
Rule No. 8:
Lower the risk of unpleasant consequences of a potential infection
:
Back up data regularly. If you lose your data, the system can fairly
quickly be restored if you have backup copies. Store distribution flop-
pies, CD/DVDs, flash drives, and other storage media with software and
valuable information in a safe place.
Create a Rescue Disk (see 15.4 on pg. 171) that you can use to boot
up the computer, using a clean operating system.
Rule No. 9:
Review list of software installed on your computer on a regular ba-
sis
. This can be accomplished using the
Install/Remove Programs
service
under
Control Panel
or simply by viewing the contents of the
Program
Files
folder. You can discover software here that was installed on your com-
puter without your knowledge, for example, while you were using the Inter-
net or installing a different program. Programs like these are almost always
riskware.