1. To prevent cyber stalking avoid disclosing any information pertaining to oneself. This is as good as disclosing your identity to strangers in public place.
2. Always avoid sending any photograph online particularly to strangers and chat friends as there have been incidents of misuse of the photographs.
3. Always use latest and up date anti virus software to guard against virus attacks.
4. Always keep back up volumes so that one may not suffer data loss in case of virus contamination
5. Never send your credit card number to any site that is not secured, to guard against frauds.
6. Always keep a watch on the sites that your children are accessing to prevent any kind of harassment or depravation in children.
7. It is better to use a security programme that gives control over the cookies and send information back to the site as leaving the cookies unguarded might prove fatal.
8. Web site owners should watch traffic and check any irregularity on the site. Putting host-based intrusion detection devices on servers may do this.
9. Use of firewalls may be beneficial.
10. Web servers running public sites must be physically separate protected from internal corporate network.
Crimes Committed
Some of the many crimes that are regularly committed with the facilitation of the Internet are child pornography, fraud, the sell and purchase of illegal guns or drugs, or other material that are protected by copyright. In the worst cases, cyber crimes can result in child abduction and molestation, and physical harm to victims. These heinous crimes have forced lawmakers and legislators to look long at hard at the state of crimes in relation to the Internet, and what laws are in effect to protect and prevent such crimes from harming those at risk.
Computer Crimes can be broken down into three Categories:
1."Hacking" into someone's computer for the purpose of stealing by taking complete control over the information contained within, or gaining control over someone's computer in an effort to sabotage information or mess up the flow of information or crash the server.
2. Criminals use computers as ways to keep up with illegal contacts, such as drug dealers. A person who steals identities may use the computer to store stolen passwords, credit card info, and other sensitive information in furtherance of an illegal act.
3. The other way in which criminals utilize the computer to further illegal acts is through the act of communication. Email accounts on a computer can be used to set up any number of unlawful acts