1
<page xmlns="http://projectmallard.org/1.0/"
2
type="guide" style="task"
3
id="net-security-tips">
6
<revision pkgversion="3.4.0" date="2012-02-21" status="final"/>
7
<revision version="13.10" date="2013-09-15" status="review"/>
9
<link type="guide" xref="net-general"/>
12
General tips to keep in mind when using the internet
15
<credit type="author">
16
<name>Steven Richards</name>
17
<email>steven.richardspc@gmail.com</email>
19
<include href="legal.xml" xmlns="http://www.w3.org/2001/XInclude"/>
22
<title>Staying safe on the internet</title>
24
<p>A possible reason for why you are using Ubuntu is the robust security that Linux based
25
systems are known for. One reason that Linux is relatively safe from malware and
26
viruses is due to the lower number of people who use it.
27
Viruses are targeted at popular operating systems like Windows, that have an extremely large
28
user base. Linux based systems are also very secure due to their open source nature, which allows
29
experts to modify and enhance the security features included with each distribution.</p>
31
<p>Despite the measures taken to ensure that your installation of Ubuntu is secure, there
32
are always vulnerabilities. As an average user on the internet you can still be susceptible to:</p>
35
<item><p>Phishing Scams (websites and emails that try to obtain sensitive information through deception)</p></item>
36
<item><p><link xref="net-email-virus">Forwarding malicious emails</link></p></item>
37
<item><p><link xref="net-antivirus">Applications with malicious intent (viruses)</link></p></item>
38
<item><p><link xref="net-wireless-wepwpa">Unauthorized remote/local network access</link></p></item>
41
<p>To stay safe online, keep in mind the following tips:</p>
44
<item><p>Be wary of emails, attachments, or links that were sent from people you do not know.</p></item>
45
<item><p>If a website's offer is too good to be true, or asks for sensitive information
46
that seems unnecessary, then think twice about what information you are submitting and the potential
47
consequences if that information is compromised by identity thieves or other criminals.</p></item>
48
<item><p>Be careful in providing any application <link xref="user-admin-explain">root level permissions</link>, especially ones that
49
you have not used before or apps that are not well-known. Providing anyone/anything with root level
50
permissions puts your computer at high risk to exploitation.</p></item>
51
<item><p>Make sure you are only running necessary remote-access services. Having
52
SSH or VNC running can be useful, but also leaves your computer open to intrusion if not
53
secured properly. Consider using a <link xref="net-firewall-on-off">firewall</link> to help
54
protect your computer from intrusion.</p></item>