<?xml 
version="1.0" encoding="utf-8"?>
<rss version="2.0" 
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
>

<channel xml:lang="en">
	<title>Objectif Sciences International</title>
	<link>http://www.osi-ngo.org/</link>
	<description>Participatory Research for changing the World</description>
	<language>en</language>
	<generator>SPIP - www.spip.net (Sarka-SPIP)</generator>

	<image>
		<title>Objectif Sciences International</title>
		<url>https://www.osi-ngo.org/local/cache-vignettes/L144xH27/siteon0-406d0.png?1727780990</url>
		<link>http://www.osi-ngo.org/</link>
		<height>27</height>
		<width>144</width>
	</image>



 
	<item xml:lang="en">
		<title>The best of online worlds</title>
		<link>https://www.osi-ngo.org/agir-vous-memes/centre-de-ressources/services/guichets/service-informatique/points-de-securite-a-respecter-en-tant-que-membre-osi/article/le-meilleur-des-mondes-en-ligne</link>
		<guid isPermaLink="true">https://www.osi-ngo.org/agir-vous-memes/centre-de-ressources/services/guichets/service-informatique/points-de-securite-a-respecter-en-tant-que-membre-osi/article/le-meilleur-des-mondes-en-ligne</guid>
		<dc:date>2011-06-06T08:17:14Z</dc:date>
		<dc:format>text/html</dc:format>
		<dc:language>en</dc:language>
		<dc:creator>*Att-Log, *Tech Informatique</dc:creator>


		<dc:subject>Checklist</dc:subject>
		<dc:subject>Security</dc:subject>
		<dc:subject>Effectiveness</dc:subject>
		<dc:subject>Information Technology</dc:subject>

		<description>&lt;p&gt;Whether you want to settle payments, make purchases, send emails, or simply surf the global network, the Internet offers you even more. But be careful!&lt;/p&gt;

-
&lt;a href="https://www.osi-ngo.org/agir-vous-memes/centre-de-ressources/services/guichets/service-informatique/points-de-securite-a-respecter-en-tant-que-membre-osi/" rel="directory"&gt;Security Points to Follow as an OSI Member&lt;/a&gt;

/ 
&lt;a href="https://www.osi-ngo.org/mot/check-list" rel="tag"&gt;Checklist&lt;/a&gt;, 
&lt;a href="https://www.osi-ngo.org/mot/securite" rel="tag"&gt;Security&lt;/a&gt;, 
&lt;a href="https://www.osi-ngo.org/mot/efficacite" rel="tag"&gt;Effectiveness&lt;/a&gt;, 
&lt;a href="https://www.osi-ngo.org/mot/informatique" rel="tag"&gt;Information Technology&lt;/a&gt;

		</description>


 <content:encoded>&lt;div class='rss_texte'&gt;&lt;div class=&#034;cs_sommaire cs_sommaire_avec_fond&#034; id=&#034;outil_sommaire&#034;&gt; &lt;div class=&#034;cs_sommaire_inner&#034;&gt; &lt;div class=&#034;cs_sommaire_titre_avec_fond&#034;&gt; Sommaire &lt;/div&gt; &lt;div class=&#034;cs_sommaire_corps&#034;&gt; &lt;ul&gt; &lt;ul&gt;
&lt;li&gt;&lt;a title=&#034;Shopping online: search, click, buy&#034; href='https://www.osi-ngo.org/spip.php?id_rubrique=93&amp;#38;page=backend#outil_sommaire_0'&gt;Shopping online: search, click, buy&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a title=&#034;How to use online content: copyright and copy wrong&#034; href='https://www.osi-ngo.org/spip.php?id_rubrique=93&amp;#38;page=backend#outil_sommaire_1'&gt;How to use online content: copyright and copy (...)&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a title=&#034;Virtual economies: Second Life &amp;#38; Co.&#034; href='https://www.osi-ngo.org/spip.php?id_rubrique=93&amp;#38;page=backend#outil_sommaire_2'&gt;Virtual economies: Second Life &amp; Co&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a title=&#034;The new Internet: direct and indirect interaction&#034; href='https://www.osi-ngo.org/spip.php?id_rubrique=93&amp;#38;page=backend#outil_sommaire_3'&gt;The new Internet: direct and indirect (...)&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a title=&#034;Open source databases: Wikipedia is not the only one&#034; href='https://www.osi-ngo.org/spip.php?id_rubrique=93&amp;#38;page=backend#outil_sommaire_4'&gt;Open source databases: Wikipedia is not the (...)&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a title=&#034;E-business: competition intensifies&#034; href='https://www.osi-ngo.org/spip.php?id_rubrique=93&amp;#38;page=backend#outil_sommaire_5'&gt;E-business: competition intensifies&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a title=&#034;Digital business network: a fast and useful network&#034; href='https://www.osi-ngo.org/spip.php?id_rubrique=93&amp;#38;page=backend#outil_sommaire_6'&gt;Digital business network: a fast and useful (...)&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a title=&#034;Online telephony: VoIP, modern communication&#034; href='https://www.osi-ngo.org/spip.php?id_rubrique=93&amp;#38;page=backend#outil_sommaire_7'&gt;Online telephony: VoIP, modern communication&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a title=&#034;Efficient email flow management&#034; href='https://www.osi-ngo.org/spip.php?id_rubrique=93&amp;#38;page=backend#outil_sommaire_8'&gt;Efficient email flow management&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a title=&#034;Instant messaging: staying connected, even at work&#034; href='https://www.osi-ngo.org/spip.php?id_rubrique=93&amp;#38;page=backend#outil_sommaire_9'&gt;Instant messaging: staying connected, even at (...)&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a title=&#034;Online marketing: creativity, the key to success&#034; href='https://www.osi-ngo.org/spip.php?id_rubrique=93&amp;#38;page=backend#outil_sommaire_10'&gt;Online marketing: creativity, the key to (...)&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a title=&#034;E-business security: technical aids and common sense&#034; href='https://www.osi-ngo.org/spip.php?id_rubrique=93&amp;#38;page=backend#outil_sommaire_11'&gt;E-business security: technical aids and (...)&lt;/a&gt;&lt;/li&gt;&lt;/ul&gt; &lt;/ul&gt; &lt;/div&gt; &lt;/div&gt;
&lt;/div&gt;&lt;div class='cs_blocs'&gt;&lt;h4 class='blocs_titre blocs_replie blocs_click' id=&#034;outil_sommaire_0&#034;&gt;&lt;a href='javascript:;'&gt;Shopping online: search, click, buy&lt;/a&gt;&lt;/h4&gt;&lt;div class='blocs_destination blocs_invisible blocs_slide'&gt;
&lt;p&gt;Shopping on the Internet is increasingly popular. Concerns about security online are gradually fading away. The advantages offered by online shopping are taking precedence.&lt;/p&gt;
&lt;p&gt;The growing trend of a stronger use of shopping portals continues. According to a study by the University of St. Gallen, the Swiss prefer online shopping for books, food items, flight bookings, CDs, tickets, and auctions. There are differences between genders: while men particularly appreciate direct product comparisons, women value not having to carry their purchases home. Men shop online more often than women, who primarily miss a sensory approach to products.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Additional benefits are convincing&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;Some sites keep a list of reviews for each product. Customers can share their opinion on the product or rate their satisfaction with points. It should be noted that this customer information for other customers can be manipulated by the provider. Reading one or two reviews can still be helpful. This way, you will know if only positive reviews are published.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;No more carrying drinks&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;The two food distributors Migros and Coop are also posting double-digit annual growth rates in online sales. Customers spend over 200 francs per purchase, which is seven times more than in-store purchases. The main reason for buying groceries online is the convenience of not having to carry anything home. Both providers also convince customers with next-day delivery and fresh products.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Generally positive experiences with credit cards&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;Consumers who don't shop online often cite their lack of computer skills or concerns over payment security. However, the majority of online shoppers are satisfied: over 90% of those who have paid with a credit card have never had a bad experience or felt uneasy. Often, you can choose the payment method, but most customers prefer bank transfers. If you want to buy on an auction site, you should choose paid payment options, as they include added security.&lt;/p&gt;
&lt;p&gt;&lt;i&gt;Christa Gall (Swisscontent Corp.)&lt;/i&gt;&lt;/p&gt;
&lt;/div&gt;&lt;/div&gt;&lt;div class='cs_blocs'&gt;&lt;h4 class='blocs_titre blocs_replie blocs_click' id=&#034;outil_sommaire_1&#034;&gt;&lt;a href='javascript:;'&gt;How to use online content: copyright and copy wrong&lt;/a&gt;&lt;/h4&gt;&lt;div class='blocs_destination blocs_invisible blocs_slide'&gt;
&lt;p&gt;Downloading songs and movies, copying texts and photos, everything seems possible on the Internet. But beware: not everything is allowed!&lt;/p&gt;
&lt;p&gt;In Antiquity and the Middle Ages, intellectual property did not exist. For instance, a book could not be stolen, but it could be copied. It was normal for many artists and authors to rework existing content, just as it was common for musicians to reuse or modify songs or musical pieces. If an author didn't want to see their work altered, they would cast a spell on the book and curse anyone who dared falsify it with leprosy.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Copyright is equivalent to copyright law&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;Nowadays, no one casts spells because laws now exist. Copyright law is equivalent to copyright in Anglo-Saxon legislation. It protects intellectual works in literature and art that have an individual character, i.e., a certain originality, such as literary works, photographs, magnetic tape or music recordings, or even choreographies or pantomimes. Computer programs are also included in works protected by copyright law.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Permission required&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;Generally, for protected works, one must obtain permission from the author. However, there are exceptions: works published in a private domain or within a circle of close individuals, such as family or friends, may be used without permission. This exception does not apply to computer programs.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;The Internet is not a law-free zone&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;The Internet is not a law-free zone either. The use of copyrighted works from the web is only possible in private. To publish copyrighted works on the Internet, you must have the author's permission, unless access to the work is restricted to a close circle of people by means of a password.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Severe penalties&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;Anyone who makes copyrighted songs or movies available on a file-sharing platform is subject to penalties and can face a fine of up to 10,000 francs or even one year in prison.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Links from another site&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;What about images and texts copied from another site? This is only possible if you have the source's authorization. Images and texts, therefore, cannot be copied (from a newspaper's site, for example). However, you can link to other sites without permission.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Videos on YouTube&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;Can I post videos on the web, for example, on YouTube? Yes, if they are your own (image and sound). Those who use someone else's material without permission (excerpts from TV shows, movie scenes, and music) are also breaking the law.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Fighting Internet crime&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;Recently, the Confederation and the cantons created the National Coordination Service for the Fight Against Internet Crime (SCOCI), which receives reports of copyright violations on the Internet. More information at &lt;a href=&#034;http://www.cybercrime.ch&#034; class='spip_out' rel='external'&gt;www.cybercrime.ch&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;&lt;i&gt;Deborah Balmer (Swisscontent Corp.)&lt;/i&gt;&lt;/p&gt;
&lt;/div&gt;&lt;/div&gt;&lt;div class='cs_blocs'&gt;&lt;h4 class='blocs_titre blocs_replie blocs_click' id=&#034;outil_sommaire_2&#034;&gt;&lt;a href='javascript:;'&gt;Virtual economies: Second Life &amp; Co.&lt;/a&gt;&lt;/h4&gt;&lt;div class='blocs_destination blocs_invisible blocs_slide'&gt;
&lt;p&gt;Everyone is talking about the virtual universe Second Life (SL). The online three-dimensional infrastructure allows users to create worlds where internet users interact, play, do business, and communicate.&lt;/p&gt;
&lt;p&gt;Since 2003, an estimated nine million people worldwide have registered to frolic in Second Life. About 100,000 Swiss also participate in this global virtual economy. However, the number of active players is smaller and has been declining since mid-2007. Depending on the time of day, between 15,000 and 50,000 people are online.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Swiss companies' virtual presence&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;Life in the virtual universe brings a special fascination. Players can not only choose their virtual appearance as they wish, but they also decide the character they want to be in the game: whether living adventures as a superhero or flirting in a virtual bar, almost anything is possible. Individuals are not the only ones present in the virtual parallel world. Companies like IBM, Toyota, Mercedes, Adidas, and Nike, as well as Swiss companies like SBB, Swisscom, and Publigroup, create their &#8220;avatars&#8221; (virtual people in Second Life) and try their luck in business. These companies know that behind these avatars are real people who also benefit from commerce.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;You have to pay to build&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;Anyone can participate in Second Life. There are free accounts and several types of paid subscriptions ranging from a one-time fee of $10 to a monthly $10. Only paying members can buy their own land on the main continent &#8220;Mainland,&#8221; a prerequisite for creating virtual infrastructure. Prices vary according to supply and demand. Currently, a full region (about 65,000 square meters) costs $1,650, plus a monthly tax of $295.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Private business in Second Life&#8230;&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;In Second Life, it is possible to trade objects and services freely. Payment is made with Linden dollars. This virtual currency can be converted into real currency (USD) and is thus connected to the real economic cycle. To earn money in Second Life, one can create objects, such as houses or bars, and sell them to other users. This also applies to services or paid virtual jobs, such as maintenance jobs. Linden dollars can also be earned by &#8220;camping,&#8221; that is, renting out certain places.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;&#8230;doesn't guarantee big profits&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;According to the online encyclopedia Wikipedia, some individuals try to make a living as Second Life developers, i.e., as merchants and service providers. According to experts, real profit opportunities are limited. Among the more than 400,000 users online in December 2006, only about 400 earned more than 250,000 Linden dollars (about 1,050 francs) per month.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;A laboratory for companies&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;So far, no company has made real profits. Only the creator of Second Life, Linden Lab, is truly making money through participation fees and virtual island rents. According to some estimates, this amounts to about half a million USD per month. Companies in SL mainly aim to learn more about consumer purchasing behavior in order to test new sales methods.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;The competition doesn't sleep&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;Currently, Second Life is the main platform of its kind in the Western world. Linden Lab's competitors include Active Worlds, considered by some as the true creator of the online three-dimensional concept, Entropia Universe, There, Newcomer, and the cyberpark Dotsoul. In Asia, platforms are also being developed, like the Chinese platform hipihi.com. The Chinese variant was only created in 2005, and by early October, the HiPiHi universe already had 30,000 residents, according to their own data. The launch of the virtual universe &#8220;Home,&#8221; developed by Sony, is scheduled for early 2008.&lt;/p&gt;
&lt;p&gt;&lt;i&gt;Markus Kick (Swisscontent Corp.)&lt;/i&gt;&lt;/p&gt;
&lt;/div&gt;&lt;/div&gt;&lt;div class='cs_blocs'&gt;&lt;h4 class='blocs_titre blocs_replie blocs_click' id=&#034;outil_sommaire_3&#034;&gt;&lt;a href='javascript:;'&gt;The new Internet: direct and indirect interaction&lt;/a&gt;&lt;/h4&gt;&lt;div class='blocs_destination blocs_invisible blocs_slide'&gt;
&lt;p&gt;The modern Internet is called Web 2.0. It is more than just a mass of data. Thanks to new applications, the Internet platform allows users to exchange data and thus interact directly or indirectly.&lt;/p&gt;
&lt;p&gt;New applications are booming on the Internet. The enormous amounts invested by major online companies show how important this trend of new applications is. For example, Yahoo acquired the photo-sharing site Flickr, though the purchase price was not disclosed. Google acquired the video-sharing site YouTube for 1.8 billion dollars. Microsoft bought aQuantive, a company specializing in online advertising, for 6 billion dollars.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Today on the Internet&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;Whoever surfs the Internet can already find these applications. Some are used intensively without users even realizing the technology at work. For example, users viewing the online map of Zurich on &lt;a href=&#034;http://www.mapsearch.ch&#034; class='spip_out' rel='external'&gt;www.mapsearch.ch&lt;/a&gt; can not only zoom in but also see, for instance, tram stops. And if the cursor hovers over a stop, the user will see the tram schedule for that stop. The map also provides information on restaurants and cinemas in the city.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Collective intelligence&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;The wider the dissemination of these new technologies, the more apparent the effects will be, as with the fax machine: if only a few people own a fax machine, its use is limited; however, the more widely the fax is available, the more people it can reach, and the more it is used. The information from countless users is gathered in Web 2.0, then reworked and structured through interactions. This way, the new applications possess a form of collective intelligence that surpasses the knowledge and capacity of any single application. The Internet of the future will therefore be significantly more powerful than today.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Web 2.0: the same impact as mobile phones?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;The new virtual world will not look like a science fiction movie. Despite all the new developments, it is merely an evolution of already existing technologies. However, we should not forget that this was also true for mobile phones. These have become omnipresent in our lives, whether we like it or not. We might witness the same phenomenon with Web 2.0. Perhaps, in a few years, thanks to new technologies, the Internet will be as present in our lives as mobile phones are now.&lt;/p&gt;
&lt;p&gt;&lt;i&gt;Patrick Herger (Swisscontent Corp.)&lt;/i&gt;&lt;/p&gt;
&lt;/div&gt;&lt;/div&gt;&lt;div class='cs_blocs'&gt;&lt;h4 class='blocs_titre blocs_replie blocs_click' id=&#034;outil_sommaire_4&#034;&gt;&lt;a href='javascript:;'&gt;Open source databases: Wikipedia is not the only one&lt;/a&gt;&lt;/h4&gt;&lt;div class='blocs_destination blocs_invisible blocs_slide'&gt;
&lt;p&gt;Online database management systems like Wikipedia work wonderfully. However, to protect against manipulation and incorrect entries, quality controls are necessary.&lt;/p&gt;
&lt;p&gt;The days of consulting hefty encyclopedic dictionaries to look up a term are long gone. Today, the Internet offers countless virtual libraries, with decisive advantages over books: text content can be linked, multimedia functions can support text with visual or audio elements, and full-text search functions allow users to find information in the context of the text. Articles can also be updated at any time.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;A rapidly expanding virtual newsroom&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;The most informative and by far the most spectacular online encyclopedia, Wikipedia, was not created by a renowned publishing house but by the users themselves. This international project is based on open-source software, allowing all users to add articles or revise old ones; it is therefore a virtual newsroom that grows daily. However, entries vary greatly in quality and length, reflecting more the author's knowledge than the actual significance.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Secure Wikipedia&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;Wikipedia has other weak points: in the past, there were incorrect entries and recurrent manipulations, but this should soon change. Starting in November, the standard site will show only entries identified as free from distortion. However, unmarked articles are accessible with one click and can still be edited.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Meyers Lexikon opens up to users&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;Today, Wikipedia includes 8.2 million articles in 253 languages. This success has forced traditional encyclopedia providers to take action. One possibility is to allow users to contribute to encyclopedic dictionaries. Meyers Lexikon has chosen this strategy. This reference work consists of 24 volumes, 9,000 pages, 150,000 keywords, and around 4,000 photos, plus a DVD, for 237 Swiss francs.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;All contributions are reviewed&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;On the site &#8220;lexikon.meyers.de,&#8221; everyone is free to contribute to article updates. Additionally, registration is required, and all contributions are reviewed by an editorial team before publication. Unlike Wikipedia, user-revised articles are stored in a special section of the encyclopedic dictionary. Meyers Lexikon online has been on the web for more than a year. According to the publisher, it contains 150,000 keywords and has about 22,000 daily visitors.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Bibliographies on the Internet&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;Thematic encyclopedias, managed by universities or private users and largely based on scanned works, abound on the World Wide Web. The link collection from the &#8220;Bibliografien im Internet&#8221; project covers over 200 useful links, but is not always up to date.&lt;/p&gt;
&lt;p&gt;&lt;i&gt;Deborah Balmer (Swisscontent Corp.)&lt;/i&gt;&lt;/p&gt;
&lt;/div&gt;&lt;/div&gt;&lt;div class='cs_blocs'&gt;&lt;h4 class='blocs_titre blocs_replie blocs_click' id=&#034;outil_sommaire_5&#034;&gt;&lt;a href='javascript:;'&gt;E-business: competition intensifies&lt;/a&gt;&lt;/h4&gt;&lt;div class='blocs_destination blocs_invisible blocs_slide'&gt;
&lt;p&gt;Online shopping is becoming increasingly popular. However, in both the United States and Europe, growth rates are expected to be significantly lower this year than in 2006. Increasingly intense competition and higher customer demands are the causes of this decline.&lt;/p&gt;
&lt;p&gt;Currently, many companies offer customers the option to purchase goods and services online. Purely virtual companies are rare, however. Generally, in addition to their online platform, they also operate a traditional store. Companies that want to focus solely on the Internet must offer the most advantageous prices, as customers can easily and quickly compare prices online.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Advantage through size&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;Companies such as the online bookstore amazon.com or the auction website eBay benefit from their size. These companies can order in large volumes and therefore demand discounts from suppliers, which then benefits customers. Smaller competitors do not have this advantage. They must therefore find other compelling arguments besides price to attract new customers. For these companies, it is important that customers can learn about the company and its products through the website. A customer approach that does not focus on price is particularly suitable for companies offering consulting and support services.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Networked customers&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;The increasing networking of customers is an important trend in e-business. Many companies now offer their customers the chance to publish a brief profile to connect with other customers through the company's homepage. Product reviews and lists of favorite items are even more common. This form of customer networking will intensify in the coming years and will become more important to support customers during their shopping.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Online presence: a boost for business&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;Studies have shown that an online presence boosts in-store business. In fact, online stores attract far more customers to the physical store than vice versa. This behavior suggests that many customers research online but prefer to buy in-store. It's believed that concerns about scams contribute to this trend. Important: a bit of caution is always advised.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Signs of reputable online companies&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;According to Stiftung Warentest, when shopping online, make sure the company's full address and a contact number are displayed on the homepage. Additionally, the provider should hold a recognized quality label. The transfer of sensitive information, such as credit card data, should always be done through an encrypted connection. A secure connection begins with &#8220;https://&#8221; and also displays a padlock symbol (which should remain closed) in the browser. When purchasing online with a credit card, it is strongly recommended to keep payment records. The best way is to print the payment details page.&lt;/p&gt;
&lt;p&gt;&lt;i&gt;Patrick Herger (Swisscontent Corp.)&lt;/i&gt;&lt;/p&gt;
&lt;/div&gt;&lt;/div&gt;&lt;div class='cs_blocs'&gt;&lt;h4 class='blocs_titre blocs_replie blocs_click' id=&#034;outil_sommaire_6&#034;&gt;&lt;a href='javascript:;'&gt;Digital business network: a fast and useful network&lt;/a&gt;&lt;/h4&gt;&lt;div class='blocs_destination blocs_invisible blocs_slide'&gt;
&lt;p&gt;Online professional networks such as Xing or LinkedIn compete with traditional clubs like the Rotary Club or alumni associations. Online clubs may be less exclusive, but they are faster, more global, and easier to use. Headhunters are also increasingly using online networks.&lt;/p&gt;
&lt;p&gt;The Rotary Club, traditional and limited to established business professionals, now faces growing digital competition: the publicly traded professional network Xing (a leader in Europe), along with other networks like LinkedIn (&lt;a href=&#034;http://www.linkedin.com&#034; class='spip_out' rel='external'&gt;www.linkedin.com&lt;/a&gt;, the U.S. leader, available only in English) and industry-specific networks like AdGabber (&lt;a href=&#034;http://www.adgabber.com&#034; class='spip_out' rel='external'&gt;www.adgabber.com&lt;/a&gt;) and INmobile (&lt;a href=&#034;http://www.inmobile.org&#034; class='spip_out' rel='external'&gt;www.inmobile.org&lt;/a&gt;), threaten the existence of real-world professional networks. Thanks to digital interconnectivity, you can, for example, find business colleagues or potential clients on Xing (&lt;a href=&#034;http://www.xing.com&#034; class='spip_out' rel='external'&gt;www.xing.com&lt;/a&gt;) within minutes, after online registration and setting up your profile.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Business success through networking&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;A young entrepreneur who makes gold clothing reportedly met a businessman from the United Arab Emirates through the Xing platform. This businessman introduced him to clients, thus giving the young entrepreneur a new distribution channel. Xing is a perfect example of Web 2.0 services: on Web 2.0 sites comparable to Xing, such as YouTube or Flickr, content is no longer produced solely by companies in a centralized manner and then disseminated to the masses but also by private individuals networking with each other.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;The essence of business: contacts&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;Contacts are the essence of business. Finding and maintaining them is easiest via the Internet. In automated testing, Xing proved very effective. Just by setting up a free profile, including career information and office address, etc., you become accessible to other members. And indeed, after a few days, Xing members I already know reach out and wish to be added to my personal network. The personal network of contacts grows rapidly and becomes a hub of &#8220;guaranteed-benefit&#8221; acquaintances. A quick glance is enough to see who you're connected to. American sociologist Stanley Milgram was right with his &#8220;small world&#8221; phenomenon: on average, two people are connected by a chain of six relationships.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Finding contacts: an easy task&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;On Xing, the confidentiality of personal data is largely preserved, with only a few details visible. Access can be limited to certain data. Communication with Xing members takes place through an internal mailing system. External emails notify you of messages or invitations. Xing doesn't stop at the virtual level: the network also offers business meetings in real life, which makes sense since connecting the real and virtual worlds translates to profit.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;The standard profile is free, the rest is paid&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;The online network is available in 16 languages and already has nearly two million members worldwide. In Switzerland, about 100,000 people are registered with Xing. It is no surprise that headhunters search for qualified employees via Xing. Online networks like Xing and similar platforms generally offer free standard registration. Those who want to expand their profile and view other profiles must pay. On Xing, a one-year subscription costs 120 francs annually.&lt;/p&gt;
&lt;p&gt;&lt;i&gt;Bernhard Bircher-Suits (Swisscontent Corp.)&lt;/i&gt;&lt;/p&gt;
&lt;/div&gt;&lt;/div&gt;&lt;div class='cs_blocs'&gt;&lt;h4 class='blocs_titre blocs_replie blocs_click' id=&#034;outil_sommaire_7&#034;&gt;&lt;a href='javascript:;'&gt;Online telephony: VoIP, modern communication&lt;/a&gt;&lt;/h4&gt;&lt;div class='blocs_destination blocs_invisible blocs_slide'&gt;
&lt;p&gt;Online telephony, also known as Voice over Internet Protocol (VoIP), is very straightforward. Skype is used by most people who utilize mobile telephony. However, this service also has some drawbacks.&lt;/p&gt;
&lt;p&gt;Free communication has become a reality. At least, for those who have Internet access, only one more step is required. There are several software providers on the market. The global leader is Skype. Currently, about 170 million people use this software, which is why it takes precedence. This is because only Skype users can call each other for free.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Calling landlines costs money&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;Those who make or receive calls through landlines must pay. However, the rates are significantly lower than those of traditional operators. Additionally, with Skype, there is no distinction between day, night, or weekend rates. There are no registration, activation, or other fees to pay.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Not always computer-dependent&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;To receive a call via Skype, it isn't always necessary to be online; it rings even if the user isn't connected. However, the computer must be turned on. If you also want to be reachable outside of your home, you can connect a regular phone or mobile phone to the computer, provided you have the necessary software.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;A multitude of possibilities&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;Skype doesn't only offer free calls. You can also chat, send emails, or exchange large amounts of data, which might exceed the capacity of a typical server. With Skype, you can also talk via webcam and look your conversation partner in the eyes; phone and video conferences are also possible.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Large companies don't use Skype&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;Multinational corporations, which could benefit from Skype because they often communicate over long distances via phone or videoconference, do not use Skype. The data they exchange is too sensitive. Skype is mainly suited for private phone calls.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Joining the Skype Family&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;Using Skype doesn't require expertise. Anyone can go to &lt;a href=&#034;http://www.skype.com&#034; class='spip_out' rel='external'&gt;www.skype.com&lt;/a&gt; and download the program suitable for their operating system (Windows, Mac OS X, Linux, and Pocket PC). To use Skype, at least an ISDN connection is required.&lt;/p&gt;
&lt;p&gt;&lt;i&gt;Christa Gall (Swisscontent Corp.)&lt;/i&gt;&lt;/p&gt;
&lt;/div&gt;&lt;/div&gt;&lt;div class='cs_blocs'&gt;&lt;h4 class='blocs_titre blocs_replie blocs_click' id=&#034;outil_sommaire_8&#034;&gt;&lt;a href='javascript:;'&gt;Efficient email flow management&lt;/a&gt;&lt;/h4&gt;&lt;div class='blocs_destination blocs_invisible blocs_slide'&gt;
&lt;p&gt;With email communication, daily office work can be managed far more effectively. However, the countless unnecessary and vague emails quickly become a burden for the user.&lt;br class='autobr' /&gt;
_Solution: a good work technique.&lt;/p&gt;
&lt;p&gt;Almost everyone working in an office is familiar with this phenomenon: due to its advantages, email quickly became a daily work tool. But it can also feel like a lot of time is wasted on emails. Spam is a problem in this regard; the other issue is careless email management.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;A workday for emails&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;The Swiss Productivity Foundation (&lt;a href=&#034;http://www.produktive-schweiz.ch&#034; class='spip_out' rel='external'&gt;www.produktive-schweiz.ch&lt;/a&gt;) wanted to learn more and estimated figures from relevant studies: Swiss employees would lose nearly 8.5 million work hours weekly due to inefficient email management. Annually, this results in a loss of 26.7 million Swiss francs. On average, employees spend 1 hour and 20 minutes checking emails. During this time, they write about 21 emails and receive 28. Weekly, employees lose nearly a full workday.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Time-wasting ping-pong...&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;Thus, it's essential to manage emails better, which also saves time. But skillful email program management alone is not enough. To boost productivity, it's crucial to avoid the ping-pong effect. This happens especially when poorly written emails lead to clarification requests, forwards, refusals, and other reactions.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;...especially due to content errors&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;The ping-pong effect is mainly caused by content errors. Experience shows that emails without a subject pose issues for nearly half of users. Other issues include emails that are too long, discussions that should have been conducted through other means, unnecessary urgency flags, chaotic and incomplete content, confusing appointments, and incorrect recipients.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Overcoming communication barriers&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;Avoid constantly sending messages without being sure that the recipient has the time to review them thoroughly; otherwise, you'll encounter unnecessary communication barriers and misunderstandings. A tip: even if they're always reachable, email recipients should impose periods of access restriction and stop constantly checking their inbox.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Message sorting&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;For many users, messages pile up in the Inbox. It's easy to lose track. A tip: create various subfolders in the inbox. You should then consistently transfer received messages to these folders. This step can be automated using filtering rules.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Establishing and following rules&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;Communication requires certain rules. The more these rules are followed, the smoother the information flow. For this, send only necessary emails, and they should be short, structured, and clearly formulated. Stick to this rule and ask the same from others. You can respond to verbose authors with: &#8220;shorter and more concise!&#8221;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;By the way: just give a quick call&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;In short, email serves many purposes in the workplace. But alongside email, alternative applications are also very useful for office life, such as instant messaging, shared calendars, collaboration tools for more effective project coordination, shared archiving, intranet for general information transfer. Ultimately, there's still the good old phone to discuss particularly complex or controversial topics without misunderstandings.&lt;/p&gt;
&lt;p&gt;&lt;i&gt;Markus Kick (Swisscontent Corp.)&lt;/i&gt;&lt;/p&gt;
&lt;/div&gt;&lt;/div&gt;&lt;div class='cs_blocs'&gt;&lt;h4 class='blocs_titre blocs_replie blocs_click' id=&#034;outil_sommaire_9&#034;&gt;&lt;a href='javascript:;'&gt;Instant messaging: staying connected, even at work&lt;/a&gt;&lt;/h4&gt;&lt;div class='blocs_destination blocs_invisible blocs_slide'&gt;
&lt;p&gt;The real-time exchange of messages as well as voice and video files over the internet via instant messaging programs is also increasingly common in companies. This method of direct and quick internet communication has numerous advantages compared to email, which is slower.&lt;/p&gt;
&lt;p&gt;Instant messaging (IM) is a software program that allows quick, real-time transmission of messages or files. Compared to chat, SMS, and email, IM offers significant advantages: almost all IM programs are free and easy to use. Messages are transmitted in real-time, unlike email, and compared to more expensive SMS, messages sent via IM are free. Many IM programs save messages sent, even if the message recipient isn't online. IM software can also forward received messages by SMS to mobile phones.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Short messages gain ground in companies&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;Experts estimate that about 500 million people worldwide use chat services, either privately or professionally; over 90% of them use IM software. Meanwhile, many companies have also discovered the benefits of IM programs, despite the risk of viruses during data transfer. According to American market research firm Gartner, companies will be unable to avoid implementing instant messaging systems. IM programs will soon become the main means of communication worldwide, not only for text messages but also for phone and video conferences. Gartner predicts that IM usage will increase from the current 25% to 100% by 2011.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Wide range of programs&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;With IM programs like &#8220;Windows Live Messenger&#8221; from Microsoft (&lt;a href=&#034;http://www.get.live.com/messenger&#034; class='spip_out' rel='external'&gt;www.get.live.com/messenger&lt;/a&gt;), &#8220;Yahoo Messenger&#8221; (&lt;a href=&#034;http://fr.messenger.yahoo.com/&#034; class='spip_out' rel='external'&gt;http://fr.messenger.yahoo.com/&lt;/a&gt;), or &#8220;Google Talk&#8221; (&lt;a href=&#034;http://www.google.com/talk&#034; class='spip_out' rel='external'&gt;www.google.com/talk&lt;/a&gt;), users can see at any time which friends or colleagues are online. You can reach out to these people online with a click of a mouse and then start a conversation. In the meantime, there is a vast choice of IM programs, so it's worth trusting well-known names: this way, you can contact the maximum number of people.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Multi-messaging as a solution to the problem&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;Unfortunately, many messaging services are not compatible. Almost all providers use their own data protocols for data transfer. A multi-messaging app, however, recognizes several protocols. Thus, you can use a single multi-messaging app to &#8220;simulate&#8221; various other messaging services. The advantage is obvious: anyone with accounts from multiple providers can use them all simultaneously on a single program interface. More information on multi-messaging can be found at &lt;a href=&#034;http://www.softonic.de/suche/multimessenger&#034; class='spip_out' rel='external'&gt;http://www.softonic.de/suche/multimessenger&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;The business model&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;Providers make money through advertising and additional services like smiley packages, extra features, and SMS forwarding. IM services are also increasingly offered for landline and mobile telephony. Based on IM technology, Microsoft will soon enter the landline market and offer devices with integrated IM software. Thus, IM services will follow us daily in various forms.&lt;/p&gt;
&lt;p&gt;&lt;i&gt;Bernhard Bircher-Suits (Swisscontent Corp.)&lt;/i&gt;&lt;/p&gt;
&lt;/div&gt;&lt;/div&gt;&lt;div class='cs_blocs'&gt;&lt;h4 class='blocs_titre blocs_replie blocs_click' id=&#034;outil_sommaire_10&#034;&gt;&lt;a href='javascript:;'&gt;Online marketing: creativity, the key to success&lt;/a&gt;&lt;/h4&gt;&lt;div class='blocs_destination blocs_invisible blocs_slide'&gt;
&lt;p&gt;Online marketing has long been an integral part of the marketing mix for companies. Reaching customers online with advertising banners and newsletters is both effective and advantageous. However, encouraging customers to spread the advertising message themselves can prove even more effective.&lt;/p&gt;
&lt;p&gt;Commercial senders have accumulated experience in this area and know that for success in electronic marketing, advertising banners must be legible, user-friendly, and generally placed at the top of the website or on the side. Pop-ups are something one must get used to, as they instantly cover the text. However, due to multimedia elements like video sequences and others, they're often worth viewing but can be removed with a single click if they're a nuisance.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Respecting Netiquette&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;Today, even newsletter senders generally respect recipients' wishes and follow the Internet community's rules, known as &#8220;Netiquette.&#8221; Only those who have expressly given their consent receive information. &#8220;Spam,&#8221; or unsolicited advertising sent to recipients, is highly disliked by the community and is now punishable by law.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Email marketing: effective and economical&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;If the sender respects Netiquette when sending emails or newsletters, the response rate, or the measurable reaction rate from users, is significantly higher. The response rate for authorized marketing is 10% to 20%, which is double that of traditional direct marketing. Additionally, email marketing is a cost-saver for companies. In fact, email advertising costs about five times less than mailing printed ads. However, the fundamental ingredients for success remain a good idea and a convincing concept. Without these essential elements, advertising messages have no positive impact on sales and end up in the virtual trash, unread.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Small budget, big effect&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;Even in viral marketing, the author's creativity is far more important than the marketing budget. Viral marketing relies on good old word-of-mouth to draw attention to brands, products, or campaigns. As contagious as a virus, news spreads via the internet. This &#8220;planned infection&#8221; leverages internet users' irresistible need to communicate, for example, in forums, blogs, and online magazines.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Shining example: &#8220;Moorhuhn&#8221;&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;A well-known example of this strategy is the free computer game &#8220;Moorhuhn.&#8221; Originally launched by whisky producer Johnnie Walker, it quickly spread like wildfire over the internet (carrying the brand logo) and captivated the fan community. Another renowned example of successful viral marketing is the webmail provider Hotmail, or the music-sharing platform Napster, which rallied 70 million users in record time. All these projects share one thing in common: they started from nothing, required no support from classic advertising, and operated on minimal financial resources. However, their advertising and distribution impact was enormous.&lt;/p&gt;
&lt;p&gt;&lt;i&gt;Gertrud Rall (Swisscontent Corp.)&lt;/i&gt;&lt;/p&gt;
&lt;/div&gt;&lt;/div&gt;&lt;div class='cs_blocs'&gt;&lt;h4 class='blocs_titre blocs_replie blocs_click' id=&#034;outil_sommaire_11&#034;&gt;&lt;a href='javascript:;'&gt;E-business security: technical aids and common sense&lt;/a&gt;&lt;/h4&gt;&lt;div class='blocs_destination blocs_invisible blocs_slide'&gt;
&lt;p&gt;Viruses or worms like &#8220;Blaster&#8221; and &#8220;Slammer&#8221; have infected millions of computers worldwide. PCs connected to the Internet are particularly vulnerable. With a bit of common sense, technical know-how, and a dash of discipline, it's possible to work safely on the internet.&lt;/p&gt;
&lt;p&gt;Viruses, worms, and Trojans are created by people with criminal intentions (data theft or destruction). The programs, or commands, are intended to spread and then attack as many computers worldwide as possible. But &#8220;spyware&#8221; (software that spies on confidential data such as passwords) and &#8220;cookies&#8221; (small text files that are transferred to the PC when visiting a web page) can also lead to data loss or a considerable invasion of privacy.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;&#8220;Phishing&#8221; and &#8220;dialers&#8221;: beware!&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;Scammers attempt through &#8220;phishing&#8221; to access the confidential data of unsuspecting Internet users. This may involve, for example, account data on an auction site (eBay, Ricardo) or access data to e-banking. &#8220;Dialers&#8221; are small programs that establish an Internet connection via the phone number. In this way, you can settle paid internet services through the phone bill. In cases of abuse, it's often difficult to convince banks or telephone companies.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Annoying &#8220;hoaxes&#8221; and spam&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;&#8220;Hoaxes&#8221; (emails warning about supposedly very dangerous new viruses) or spam are generally annoying and a waste of time. Following instructions or accepting the offers contained in these emails can be dangerous and lead to high bills. &#8220;Hoaxes&#8221; can cause data loss or render the PC unusable. But they primarily represent a loss of time and overload the Internet infrastructure.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Updateable firewalls and antivirus&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;Electronic threats from the internet can be effectively countered. It's especially important to activate a firewall. It protects computer systems by monitoring incoming and outgoing connections and, if necessary, rejecting them. Essential security software updates (patches) fill security gaps that appear almost daily. Many software applications offer an automatic update function. Up-to-date antivirus software is essential for anyone who downloads programs or data or exchanges them with others.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Backups as a safety net&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;Despite all security measures, data can still be partially destroyed or entirely lost due to a mistake, technical defect, virus, or worm. To minimize this risk, experts advise making regular backups.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;User behavior is crucial&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;In addition to technical measures, user behavior is also crucial. It's especially important to choose a secure password, handle emails carefully, and use browser security measures and caution on networks or file-sharing sites while surfing the internet. The MELANI Reporting and Analysis Center for Information Security offers concrete and useful security advice (&lt;a href=&#034;http://www.melani.admin.ch&#034; class='spip_out' rel='external'&gt;www.melani.admin.ch&lt;/a&gt;).&lt;/p&gt;
&lt;p&gt;&lt;i&gt;Markus Kick (Swisscontent Corp.)&lt;/i&gt;&lt;/p&gt;
&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;
		
		</content:encoded>


		
		<enclosure url="https://www.osi-ngo.org/IMG/pdf/article_a25.pdf?7884/42cf10ff8c2d30b781cd06beb2ddf9fad17c4057" length="972402" type="application/pdf" />
		

	</item>
	<item xml:lang="en">
		<title>Online Security</title>
		<link>https://www.osi-ngo.org/agir-vous-memes/centre-de-ressources/services/guichets/service-informatique/points-de-securite-a-respecter-en-tant-que-membre-osi/article/securite-en-ligne</link>
		<guid isPermaLink="true">https://www.osi-ngo.org/agir-vous-memes/centre-de-ressources/services/guichets/service-informatique/points-de-securite-a-respecter-en-tant-que-membre-osi/article/securite-en-ligne</guid>
		<dc:date>2010-01-22T16:22:39Z</dc:date>
		<dc:format>text/html</dc:format>
		<dc:language>en</dc:language>
		<dc:creator>*Att-Log, *Tech Informatique</dc:creator>


		<dc:subject>Checklist</dc:subject>
		<dc:subject>Security</dc:subject>
		<dc:subject>Information Technology</dc:subject>

		<description>&lt;p&gt;E-finance, Email, identity theft... prevent instead of having to cure... or failing when the damage is done!&lt;/p&gt;

-
&lt;a href="https://www.osi-ngo.org/agir-vous-memes/centre-de-ressources/services/guichets/service-informatique/points-de-securite-a-respecter-en-tant-que-membre-osi/" rel="directory"&gt;Security Points to Follow as an OSI Member&lt;/a&gt;

/ 
&lt;a href="https://www.osi-ngo.org/mot/check-list" rel="tag"&gt;Checklist&lt;/a&gt;, 
&lt;a href="https://www.osi-ngo.org/mot/securite" rel="tag"&gt;Security&lt;/a&gt;, 
&lt;a href="https://www.osi-ngo.org/mot/informatique" rel="tag"&gt;Information Technology&lt;/a&gt;

		</description>


 <content:encoded>&lt;div class='rss_texte'&gt;&lt;div class=&#034;cs_sommaire cs_sommaire_avec_fond&#034; id=&#034;outil_sommaire&#034;&gt; &lt;div class=&#034;cs_sommaire_inner&#034;&gt; &lt;div class=&#034;cs_sommaire_titre_avec_fond&#034;&gt; Sommaire &lt;/div&gt; &lt;div class=&#034;cs_sommaire_corps&#034;&gt; &lt;ul&gt; &lt;ul&gt;
&lt;li&gt;&lt;a title=&#034;How to Properly Manage Your Passwords&#034; href='https://www.osi-ngo.org/spip.php?id_rubrique=93&amp;#38;page=backend#outil_sommaire_0'&gt;How to Properly Manage Your Passwords&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a title=&#034;Surfing the Internet Without Costly Surprises&#034; href='https://www.osi-ngo.org/spip.php?id_rubrique=93&amp;#38;page=backend#outil_sommaire_1'&gt;Surfing the Internet Without Costly Surprises&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a title=&#034;Viruses and Worms: Know Your Enemies!&#034; href='https://www.osi-ngo.org/spip.php?id_rubrique=93&amp;#38;page=backend#outil_sommaire_2'&gt;Viruses and Worms: Know Your Enemies!&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a title=&#034;The PC, A True Fortress&#034; href='https://www.osi-ngo.org/spip.php?id_rubrique=93&amp;#38;page=backend#outil_sommaire_3'&gt;The PC, A True Fortress&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a title=&#034;Trojan Horses &#8211; Supposedly Useful Software&#034; href='https://www.osi-ngo.org/spip.php?id_rubrique=93&amp;#38;page=backend#outil_sommaire_4'&gt;Trojan Horses &#8211; Supposedly Useful Software&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a title=&#034;Phishing: Caution is Essential&#034; href='https://www.osi-ngo.org/spip.php?id_rubrique=93&amp;#38;page=backend#outil_sommaire_5'&gt;Phishing: Caution is Essential&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a title=&#034;Blocking Malicious Access with a Router&#034; href='https://www.osi-ngo.org/spip.php?id_rubrique=93&amp;#38;page=backend#outil_sommaire_6'&gt;Blocking Malicious Access with a Router&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a title=&#034;E-banking: high security at a low cost&#034; href='https://www.osi-ngo.org/spip.php?id_rubrique=93&amp;#38;page=backend#outil_sommaire_7'&gt;E-banking: high security at a low cost&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a title=&#034;W-LAN Security&#034; href='https://www.osi-ngo.org/spip.php?id_rubrique=93&amp;#38;page=backend#outil_sommaire_8'&gt;W-LAN Security&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a title=&#034;Social Engineering: Identity Theft with Harmful Effects&#034; href='https://www.osi-ngo.org/spip.php?id_rubrique=93&amp;#38;page=backend#outil_sommaire_9'&gt;Social Engineering: Identity Theft with (...)&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a title=&#034;Checklist: How to Optimize Online Security&#034; href='https://www.osi-ngo.org/spip.php?id_rubrique=93&amp;#38;page=backend#outil_sommaire_10'&gt;Checklist: How to Optimize Online Security&lt;/a&gt;&lt;/li&gt;&lt;/ul&gt; &lt;/ul&gt; &lt;/div&gt; &lt;/div&gt;
&lt;/div&gt;&lt;div class='cs_blocs'&gt;&lt;h4 class='blocs_titre blocs_replie blocs_click' id=&#034;outil_sommaire_0&#034;&gt;&lt;a href='javascript:;'&gt;How to Properly Manage Your Passwords&lt;/a&gt;&lt;/h4&gt;&lt;div class='blocs_destination blocs_invisible blocs_slide'&gt;
&lt;p&gt;Managing passwords is a delicate matter. Anyone who does not handle their passwords carefully risks becoming a victim of online scammers. Fortunately, there are a few simple rules that can secure your passwords and their use.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Rule No. 1: Use Appropriate Passwords&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;When it comes to quality, there are significant differences. Full words or names, for example, in any language, offer insufficient protection. You should avoid including parts of your username in your password. A password made up of only numbers is also a no-go. It is better to choose an arbitrary combination of uppercase and lowercase letters, numbers, and special characters. A password should be at least six characters long. On the Internet, there are numerous generators that can help you find a strong password.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Rule No. 2: Keep Your Passwords Safe&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;The complex passwords described above are unfortunately difficult to remember. However, it is not recommended to write them down. They should be stored in a secure place. Additionally, you should avoid saving these passwords and other security details on your computer. When the browser asks if it should save your username and password, you should decline.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Rule No. 3: Use Different Passwords&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;Even if it involves a bit more effort, you should have different passwords. If one of your passwords falls into the wrong hands, the damage remains limited. Moreover, passwords should be changed regularly. If you have trouble keeping track of your passwords, consider writing them down and keeping them in a safe place.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Rule No. 4: Never Disclose Your Passwords&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;Passwords should never be mentioned, whether in an email, by fax, or over the phone. If you ever receive a request to provide your password, it is likely a phishing attempt. Never respond to these requests.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Rule No. 5: Only Enter Your Password on an Encrypted Connection&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;If you are working with sensitive data on the Internet, make sure that the information flow is encrypted. This generally prevents hackers from reading and using the data. An encrypted connection is indicated by https:// at the beginning of the URL instead of http://. The &#8220;s&#8221; stands for &#8220;secure.&#8221; Additionally, with a secure connection, a small lock icon appears at the bottom of the window.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Rule No. 6: Never Leave Your Computer in Someone Else's Hands&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;Another risk is leaving your computer unattended and accessible to others without security measures. In such cases, you should lock your computer, even for short absences, as otherwise all your electronic security measures are useless.&lt;/p&gt;
&lt;p&gt;&lt;i&gt;Alex H&#228;mmerli (Swisscontent Corp, trad. m.r) / 05.09.2008&lt;/i&gt;&lt;/p&gt;
&lt;/div&gt;&lt;/div&gt;
&lt;p&gt; &lt;br&gt;&lt;/p&gt;
&lt;div class='cs_blocs'&gt;&lt;h4 class='blocs_titre blocs_replie blocs_click' id=&#034;outil_sommaire_1&#034;&gt;&lt;a href='javascript:;'&gt;Surfing the Internet Without Costly Surprises&lt;/a&gt;&lt;/h4&gt;&lt;div class='blocs_destination blocs_invisible blocs_slide'&gt;
&lt;p&gt;Anyone browsing the Internet needs protection against various dangers. An updated and secure browser is essential for safe Internet surfing.&lt;/p&gt;
&lt;p&gt;The Internet harbors many dangers. Hackers are increasingly able to cause significant damage to states, companies, and private individuals. So far, cybercriminals mainly targeted pornographic and illegal download pages. They used dubious offers to download dangerous software onto the visitor's computer. According to security experts, a PC can even get infected on legitimate websites. For instance, a Flash banner ad was discovered that, simply by visiting the blick.ch website, installed Trojans on the user's computer, causing considerable damage.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;The More Up-to-Date, the Better&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;The browser, which displays websites, often serves as a gateway for these malwares, especially if you browse the Internet with an outdated browser. That's why a browser should always be up to date. To do this, enable the automatic update features. Currently, secure free programs include Microsoft's &#8220;Internet Explorer&#8221; (minimum version 6.0 with Service Pack 1) or the competing &#8220;Firefox&#8221; by Mozilla (minimum version 1.5). For Mac users, &#8220;Safari&#8221; from version 1.3 or &#8220;Firefox&#8221; from version 1.5 are relatively secure. Experts disagree on which program offers the most security, and study results vary depending on the sponsor.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Install Browser Updates&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;Extended browser functions such as JavaScript, Java, ActiveX, and others require the installation of external code on the visitor's PC. While there are various protective mechanisms to prevent such program code from causing harm, security gaps are repeatedly found that eliminate these restrictions. Many of these gaps are due to programming errors and can be addressed by installing the latest automated browser patches. Some risks can only be avoided by disabling the corresponding options in the Internet browser settings.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Is My Browser Secure?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;The best defense against browser malware is knowledge and a healthy skepticism towards everything from the Web. Anyone who clicks on anything will eventually end up with malware, regardless of how new the browser or operating system is.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Security Tips&lt;/strong&gt;&lt;/p&gt;
&lt;ul class=&#034;spip&#034;&gt;&lt;li&gt; Always work with the latest browser version. Browsers have automatic update features that are easy to find in the help menu. This allows security gaps to be quickly patched.&lt;/li&gt;&lt;li&gt; Modern Internet browsers can detect unsafe websites. When a user visits such a site, they receive a warning.&lt;/li&gt;&lt;li&gt; Users not dependent on Windows have the option to switch to Mac or Linux, as these systems have a structure that is much harder to attack.&lt;/li&gt;&lt;li&gt; Limit the installation of Java scripts (Active Scripting) as much as possible through browser settings or only allow access to trusted sites.&lt;/li&gt;&lt;li&gt; Limit the installation of ActiveX controls as much as possible through browser settings. Set the Internet Explorer security settings to &#8220;high.&#8221;&lt;/li&gt;&lt;/ul&gt;
&lt;p&gt;&lt;i&gt;Bernhard Bircher-Suits (Swisscontent Corp., trad. m.r) / 05.09.2008&lt;/i&gt;&lt;/p&gt;
&lt;/div&gt;&lt;/div&gt;
&lt;p&gt; &lt;br&gt;&lt;/p&gt;
&lt;div class='cs_blocs'&gt;&lt;h4 class='blocs_titre blocs_replie blocs_click' id=&#034;outil_sommaire_2&#034;&gt;&lt;a href='javascript:;'&gt;Viruses and Worms: Know Your Enemies!&lt;/a&gt;&lt;/h4&gt;&lt;div class='blocs_destination blocs_invisible blocs_slide'&gt;
&lt;p&gt;Almost every day, both at work and at home, we are bombarded with suspicious emails that, when opened, can cause serious problems. To protect yourself from this threat, it is important to know your enemies.&lt;/p&gt;
&lt;p&gt;Malware (the &#8220;mal-&#8221; from &#8220;malicious&#8221; and &#8220;-ware&#8221; from &#8220;software&#8221;) is classified into three types of malicious software: Trojans (see special report), viruses, and worms.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Viruses&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;Computer viruses are the oldest form of malware: they replicate by self-copying and infiltrating healthy programs, documents, and data storage devices. Viruses come in many forms and cause uncontrollable changes in the operating system, some software, and hardware, for instance by manipulating connections or the graphics card. As a result, viruses can compromise the security of data and programs on the PC, causing interference and data loss.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Worms&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;Today, computer worms have almost replaced viruses. Worms are similar to viruses but spread through networks independently, for example by sending infected emails, instant messaging, or peer-to-peer programs like &#8220;Kazaa,&#8221; &#8220;Morpheus,&#8221; or BitTorrent systems. Worms do not need a host to spread. They use existing distribution lists. Since almost all computers are networked, worms spread incredibly fast.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;How Can I Protect Myself?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;Generally, worms activate automatically when downloaded to the hard drive. So, be especially cautious when opening attachments: only open files that you are sure are safe, and especially avoid &#8220;.exe&#8221; files. The file extension indicates that it is a program. Even known senders do not guarantee safe attachments. Worms spread due to users' careless behavior, excessive comfort, and ignorance. Use instant messaging, email, and peer-to-peer programs cautiously.&lt;/p&gt;
&lt;p&gt;Never forget: worms are masters of disguise. Pay particular attention to file name extensions such as &#8220;.jpg.exe&#8221; and long file names that obscure the true nature of the file. It is also risky to download files whose purpose remains unknown to laypeople. Here are some examples: .dll, .ax, .ini, .com, .pif, or .bat.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Use an Antivirus Program&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;Before opening a file from the Internet, have it checked by an antivirus program. Many virus scanners do this automatically today. However, the program must always be up to date; otherwise, new malware could slip through. Antivirus programs are particularly essential for Microsoft Windows: there are numerous viruses for this operating system, and new ones are added almost daily. For Macs, security has also become necessary as more viruses are targeting them.&lt;/p&gt;
&lt;p&gt;&lt;i&gt;Alex H&#228;mmerli (Swisscontent Corp, trad. m.r) / 05.09.2008&lt;/i&gt;&lt;/p&gt;
&lt;/div&gt;&lt;/div&gt;
&lt;p&gt; &lt;br&gt;&lt;/p&gt;
&lt;div class='cs_blocs'&gt;&lt;h4 class='blocs_titre blocs_replie blocs_click' id=&#034;outil_sommaire_3&#034;&gt;&lt;a href='javascript:;'&gt;The PC, A True Fortress&lt;/a&gt;&lt;/h4&gt;&lt;div class='blocs_destination blocs_invisible blocs_slide'&gt;
&lt;p&gt;Anyone who occasionally surfs the Internet and sometimes installs programs must protect their computer from viruses, Trojans, and other malware. In this regard, free downloadable protection programs are generally as effective as often very expensive paid programs.&lt;/p&gt;
&lt;p&gt;There is a moment in the life of every new PC or laptop, freshly configured, that all viruses, worms, and other spyware programs eagerly await: the moment when the computer first connects to the Internet. Without effective protection, malware can invade an Internet-connected PC in as little as 20 minutes, according to the American Internet Storm Center (ISC).&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Access Points and Remedies&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;How does an infected program reach a PC? It's quite simple: to access the Internet, the device is assigned an IP address that allows every PC to be identified on the Web. Sophisticated piracy software constantly tries to find IP addresses on the Internet. When found, a virus, worm, or Trojan horse can be launched onto the computer in a targeted way. Another access point is email. When a worm transmitted by email is introduced and installed without notice, it bypasses the system's security measures and spreads. Attacks on PCs are increasingly sophisticated and happen at shorter intervals. That's why security service providers must frequently perfect their protective mechanisms at breakneck speed. To ensure a high level of protection, each PC should have three different protection tools: a firewall against IP attacks on the Web, antivirus software, and spyware software against spy programs. It is also advisable to get software that allows anonymous browsing on the Internet.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Similar and Less Expensive Alternatives&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;Those who don't want to spend a fortune on protection software each year can rely on free programs. According to various studies, they are generally no less effective than paid alternatives from well-known manufacturers. In the antivirus field, Avira Antivir (&lt;a href=&#034;http://www.free-av.de&#034; class='spip_out' rel='external'&gt;www.free-av.de&lt;/a&gt;) and Avast Home (&lt;a href=&#034;http://www.avast.com&#034; class='spip_out' rel='external'&gt;www.avast.com&lt;/a&gt;) are convincing options. However, the application is only free for private users. In the realm of free software, sophisticated complete security packages are not yet available. This means that typically, for each type of threat, a specific protection software must be installed.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Paid Programs with User Interface&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;Paid security packages protect private computers quite effectively and can easily be replaced thanks to a consistent user interface. However, they are not complete, contrary to what manufacturers like to claim. The German computer magazine &#8220;c't&#8221; compared various Internet security software packages and found that in every case, at least one protection component was weak. In the worst cases, the antivirus entirely cuts off the Internet connection or gives the user a false sense of security. No program tested by this magazine constitutes real, comprehensive protection, according to &#8220;c't.&#8221; Nonetheless, installing security software is essential. As cybercriminals are highly imaginative, it is advisable to maintain a certain level of caution in all online activities, in addition to using protection software, especially when it involves sharing personal data.&lt;/p&gt;
&lt;p&gt;&lt;i&gt;Bernhard Bircher-Suits (Swisscontent Corp., trans. m.r) / 05.09.2008&lt;/i&gt;&lt;/p&gt;
&lt;/div&gt;&lt;/div&gt;&lt;div class='cs_blocs'&gt;&lt;h4 class='blocs_titre blocs_replie blocs_click' id=&#034;outil_sommaire_4&#034;&gt;&lt;a href='javascript:;'&gt;Trojan Horses &#8211; Supposedly Useful Software&lt;/a&gt;&lt;/h4&gt;&lt;div class='blocs_destination blocs_invisible blocs_slide'&gt;
&lt;p&gt;If you regularly install supposedly useful free software on your computer from the Internet, you must protect your PC against email attachments and dangerous Trojan horses.&lt;/p&gt;
&lt;p&gt;A Trojan horse, or simply &#8220;Trojan,&#8221; refers to a program that appears legitimate but is designed to surreptitiously carry out harmful actions on the user's computer. Often, free programs downloaded from the Internet or download sites are infected with these malicious programs. Trojans belong to the family of unwanted or harmful programs called &#8220;malware.&#8221; Most of the time, they infiltrate the victim's computer in a targeted and clandestine manner, though they can also arrive by chance. Generally, they disguise themselves as a useful program by, for example, using the name of a beneficial file, or offering a useful feature in addition to their concealed harmful function.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Transport Means for Criminal Purposes&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;Many Trojan horses are used to surreptitiously install harmful programs on the user's computer. These malicious programs operate autonomously on the computer, meaning they cannot be disabled simply by closing or even deleting the Trojan. The actual function of the installed file can be of any type. Thus, spyware programs like &#8220;Keylogger&#8221; may infiltrate the computer. These programs track keystrokes on the keyboard and send the collected data to criminals. The clandestine installation of programs with backdoors is also possible. Such software allows for remote control of the computer over the Internet, enabling malicious actions without the user being able to control it.&lt;br class='autobr' /&gt;
&lt;strong&gt;Access Points&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;Trojan horses can reach a computer through the same access points used for electronic data transmission, including all data storage media or network connections like the Internet. File-sharing networks, manipulated &#8220;Drive-by-Download&#8221; sites, as well as file or email attachments, are the most frequently used entry points for trojans. From the user's unsuspecting PC, they can spread to other computers. Hackers often use a computer worm as a vector to carry the Trojan.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Protection with Antivirus Programs&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;To protect yourself effectively from trojans, avoid using programs from unknown or unreliable sources. Providers of programs or services on the edge of legality are particularly dangerous. Another protective measure is installing antivirus software. Numerous antivirus programs are available on the market to combat malicious intruders, such as Panda Internet Security (&lt;a href=&#034;http://www.pandasoftware.ch&#034; class='spip_out' rel='external'&gt;www.pandasoftware.ch&lt;/a&gt;), Norton Internet Security (&lt;a href=&#034;http://www.symantec.com/de/ch/index.jsp&#034; class='spip_out' rel='external'&gt;www.symantec.com/de/ch/index.jsp&lt;/a&gt;), or Eset Smart Security (&lt;a href=&#034;http://www.eset.com/smartsecurity&#034; class='spip_out' rel='external'&gt;www.eset.com/smartsecurity&lt;/a&gt;). If a trojan is detected by antivirus software before the user distributes it, this antivirus program provides effective protection. However, once a trojan has begun its destructive mission, antivirus programs can only remove it from the system to a certain extent. If a previously installed trojan is detected, it's highly recommended to clean the PC by restoring the last &#8220;clean&#8221; disk image. A virus scanner tends to carry out this task reliably. Generally, a healthy degree of caution is advised when downloading software from the Internet or installing programs from data storage on your computer.&lt;/p&gt;
&lt;p&gt;&lt;i&gt;Bernhard Bircher-Suits (Swisscontent Corp., trans. mfp) / 05.09.2008&lt;/i&gt;&lt;/p&gt;
&lt;/div&gt;&lt;/div&gt;&lt;div class='cs_blocs'&gt;&lt;h4 class='blocs_titre blocs_replie blocs_click' id=&#034;outil_sommaire_5&#034;&gt;&lt;a href='javascript:;'&gt;Phishing: Caution is Essential&lt;/a&gt;&lt;/h4&gt;&lt;div class='blocs_destination blocs_invisible blocs_slide'&gt;
&lt;p&gt;Caution and skepticism on the Internet: if you receive an email asking for confidential information about your bank account, delete it immediately.&lt;/p&gt;
&lt;p&gt;The goal of phishing is to obtain personal information from unsuspecting internet users by using fraudulent web addresses. For example, this might include information about your online auction account (e.g., eBay or Ricardo) or login data for e-banking. Scammers exploit their victims' trust by sending emails with fake sender addresses. These messages might state, for example, that account information or login data (username and password) is no longer secure or up to date and should be changed or confirmed through a link provided in the email. The link does not lead to the original service provider's website (e.g., the bank) but to a counterfeit site created by the scammer. With the fraudulently obtained data, a scammer can, for instance, conduct banking transactions on behalf of the victim (internet user) or place bids on an auction site.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Protecting Yourself with Vigilance&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;It's essential to stay cautious when browsing the Internet. Only heightened vigilance can prevent the worst. A legitimate bank will never ask to change passwords or other sensitive data via email. Often, the recipient will be addressed with a general phrase like &#8220;Dear customer&#8221; rather than by name&#8212;another sign of forgery, as a legitimate bank would know the customer's name. Poor grammar or spelling can also indicate a phishing attempt. These emails should be deleted immediately. Using a unique password for each application is a wise practice.&lt;/p&gt;
&lt;p&gt;It's also advisable to manually enter the bank's web address each time. Under no circumstances should links in emails or on third-party websites be clicked to reach the desired website. If you do end up on &#8220;your bank's&#8221; site via a hyperlink, you must verify the site's authenticity by checking its security certificate. Encryption of the connection should also be checked by double-clicking the &#8220;closed padlock&#8221; symbol at the bottom of the browser window, where the certificate details should appear. It should be in the bank's name. If the certificate's &#8220;Fingerprint&#8221; matches that published on the bank's homepage, it's a secure, encrypted connection to the correct site.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Protecting Yourself with Software&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;Aside from required caution, software can also contribute to online security. Depending on the installed software, an antivirus program's email filter can detect phishing emails, block them, and delete them, provided the antivirus software is continuously updated. Browsers like Internet Explorer or Mozilla Firefox also warn against phishing sites. Browsers and email filters relying on blacklists published online depend on their updates. This is a significant drawback with new forms of phishing attacks, as neither the method nor the defense is yet known.&lt;/p&gt;
&lt;p&gt;&lt;i&gt;Dajan Roman (Swisscontent Corp., trans. mfp) / 05.09.2008&lt;/i&gt;&lt;/p&gt;
&lt;/div&gt;&lt;/div&gt;&lt;div class='cs_blocs'&gt;&lt;h4 class='blocs_titre blocs_replie blocs_click' id=&#034;outil_sommaire_6&#034;&gt;&lt;a href='javascript:;'&gt;Blocking Malicious Access with a Router&lt;/a&gt;&lt;/h4&gt;&lt;div class='blocs_destination blocs_invisible blocs_slide'&gt;
&lt;p&gt;To protect a computer from malicious incoming connections, a NAT router offers at least partial protection. A router essentially separates the global network from your personal computer. A router with a built-in firewall allows for setting the authorized Internet services.&lt;/p&gt;
&lt;p&gt;When connected to the Internet, there's a risk that programs or people might access your computer through weak points or security gaps, enabling them to read, manipulate, or delete files. Besides typical antivirus software and firewall software, there's another method that offers initial protection before an intruder can access your computer.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Connection Between the Computer and the Internet&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;Most operators' routers are equipped with NAT. NAT stands for &#8220;Network Address Translation.&#8221; The NAT process connects the local private network computer to the Internet. In theory, every computer connected to the Internet needs a unique identification number, the IP address. This address is generally assigned to a single computer by the Internet service provider. When installing a router, it remains the IP address holder. Computers connected to the home local network receive independent addresses separately from the Internet service provider.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Invisible Private Network from the Outside&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;With a router, multiple computers can share a single Internet connection. From a security strategy perspective, this system also has the advantage of separating the international network from the local network. Indeed, the router's private IP addresses are not visible on the Web, making malicious access to the computer difficult.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Limiting Data Flow&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;If the router has an integrated firewall, you can also define the Internet services for which data traffic is allowed. In the corresponding list within the router's user interface, select only the applications you really need, blocking unwanted data flows from outside the router. If an application does not work on the computer due to the firewall, the issue can be resolved by unblocking the port. This is possible with the &#8220;Port-Forwarding,&#8221; &#8220;Virtual Server,&#8221; or &#8220;Static Routing&#8221; options, generally found in the router configuration tool's advanced settings. The manual or the software producer's website will indicate the port of each application.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;No Substitute for Firewall Software&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;However, this overall limitation on external access should not be overestimated. It cannot replace effective firewall software. A good firewall also provides adequate protection for outbound data flows and includes additional options for regulating specific access points that a router does not offer. To optimize security, it's recommended to install firewall software on the computer in addition to using a router. If you are using a simple USB modem, firewall software is essential. This also applies to any user with an Internet connection from a cable operator without a connected router. Since Windows XP, a firewall with some basic functions has been built into the system.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Routers/modems from different Internet providers (Example from Switzerland)&lt;/strong&gt;&lt;/p&gt;
&lt;table class=&#034;spip&#034;&gt;
&lt;thead&gt;&lt;tr class='row_first'&gt;&lt;th id='id9bbb_c0'&gt; Provider &lt;/th&gt;&lt;th id='id9bbb_c1'&gt; Devices with NAT &lt;/th&gt;&lt;th id='id9bbb_c2'&gt; Devices without NAT &lt;/th&gt;&lt;/tr&gt;&lt;/thead&gt;
&lt;tbody&gt;
&lt;tr class='row_odd odd'&gt;
&lt;td headers='id9bbb_c0'&gt;Swisscom&lt;/td&gt;
&lt;td headers='id9bbb_c1'&gt;All devices&lt;/td&gt;
&lt;td headers='id9bbb_c2'&gt;None&lt;/td&gt;&lt;/tr&gt;
&lt;tr class='row_even even'&gt;
&lt;td headers='id9bbb_c0'&gt;Cablecom&lt;/td&gt;
&lt;td headers='id9bbb_c1'&gt;None&lt;/td&gt;
&lt;td headers='id9bbb_c2'&gt;All devices&lt;/td&gt;&lt;/tr&gt;
&lt;tr class='row_odd odd'&gt;
&lt;td headers='id9bbb_c0'&gt;Sunrise&lt;/td&gt;
&lt;td headers='id9bbb_c1'&gt;All devices (ZyXEL)&lt;/td&gt;
&lt;td headers='id9bbb_c2'&gt;None&lt;/td&gt;&lt;/tr&gt;
&lt;tr class='row_even even'&gt;
&lt;td headers='id9bbb_c0'&gt;Solnet&lt;/td&gt;
&lt;td headers='id9bbb_c1'&gt;All devices (ZyXEL, AVM, and Draytek)&lt;/td&gt;
&lt;td headers='id9bbb_c2'&gt;None&lt;/td&gt;&lt;/tr&gt;
&lt;tr class='row_odd odd'&gt;
&lt;td headers='id9bbb_c0'&gt;Tele 2&lt;/td&gt;
&lt;td headers='id9bbb_c1'&gt;All devices&lt;/td&gt;
&lt;td headers='id9bbb_c2'&gt;None&lt;/td&gt;&lt;/tr&gt;
&lt;tr class='row_even even'&gt;
&lt;td headers='id9bbb_c0'&gt;QuickLine&lt;/td&gt;
&lt;td headers='id9bbb_c1'&gt;Subscriptions without devices&lt;/td&gt;
&lt;td headers='id9bbb_c2'&gt;None&lt;/td&gt;&lt;/tr&gt;
&lt;tr class='row_odd odd'&gt;
&lt;td headers='id9bbb_c0'&gt;Backbone (for businesses only)&lt;/td&gt;
&lt;td headers='id9bbb_c1'&gt;All devices (ZyXEL and Cisco)&lt;/td&gt;
&lt;td headers='id9bbb_c2'&gt;None&lt;/td&gt;&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p&gt;Source: data from selected Internet providers&lt;/p&gt;
&lt;p&gt;&lt;i&gt;Christian Iten (Swisscontent Corp., trans. mfp) / 09.05.2008&lt;/i&gt;&lt;/p&gt;
&lt;/div&gt;&lt;/div&gt;&lt;div class='cs_blocs'&gt;&lt;h4 class='blocs_titre blocs_replie blocs_click' id=&#034;outil_sommaire_7&#034;&gt;&lt;a href='javascript:;'&gt;E-banking: high security at a low cost&lt;/a&gt;&lt;/h4&gt;&lt;div class='blocs_destination blocs_invisible blocs_slide'&gt;
&lt;p&gt;By following a few basic security measures, you can perform online payments without issues. The key is to secure your computer and stay vigilant during e-banking sessions.&lt;/p&gt;
&lt;p&gt;Many people remain skeptical about e-banking. Fearing their account may be emptied, they have little trust in the systems and prefer to conduct banking operations via paper and mail. However, anyone can tamper with a mailbox, whereas accessing a PC requires a minimum level of computer knowledge. The risk can also be minimized quite simply by following some advice (&lt;a href=&#034;http://www.melani.admin.ch&#034; class='spip_out' rel='external'&gt;www.melani.admin.ch&lt;/a&gt;).&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Computer Protection&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;For secure e-banking, it is highly recommended to use only a computer with firewall software and antivirus software. Regularly update all software and use the latest versions of the browser and other programs. If available, enable the automatic update function, especially for antivirus software. When the firewall is active, it blocks unwanted Internet connections. Never open emails from unknown sources or install unreliable programs.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Before Logging In&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;Before logging onto the e-banking platform, close all browser windows. To start an e-banking session, reopen the browser and always manually enter the address. During the session, keep all other connections closed, and do not visit other websites. Password rules must also be followed. Financial institutions require multi-level authentication for online clients (e.g., contract number, tick-off list, and password or similar). Most of the time, the client can choose their password freely. Choose a hard-to-guess password with letters, numbers, and special characters (at least 8 characters), and change it regularly. Do not share this or any other passwords with anyone, not even with the bank. The bank will never ask you to provide your password. Never write down your password or save it on your computer.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;During the E-Banking Session&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;Verify the authenticity of the website with the authenticity certificate and check the encryption of the connection (see article on &#8220;phishing&#8221;). Take any error or warning messages seriously. If in doubt, contact your bank immediately.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Ending the E-Banking Session&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;It is important to log out and properly end the e-banking session. All banking interfaces have a dedicated function for this, called &#8220;end,&#8221; &#8220;logout,&#8221; or &#8220;quit.&#8221; Usually, a new page will confirm the session has ended correctly. After leaving the e-banking session, it is advisable to delete temporary Internet files stored in the browser's cache to clear the &#8220;memory&#8221; of your session from your computer.&lt;/p&gt;
&lt;ul class=&#034;spip&#034;&gt;&lt;li&gt; Internet Explorer: Extras/Internet Options/delete cookies/OK.&lt;/li&gt;&lt;li&gt; and: Extras/Internet Options/delete files/delete all offline content/OK&lt;/li&gt;&lt;li&gt; Firefox: Extras/settings/privacy/delete everything&lt;/li&gt;&lt;li&gt; Safari: Safari/empty cache&lt;/li&gt;&lt;/ul&gt;
&lt;p&gt;&lt;i&gt;Dajan Roman (Swisscontent Corp., trans. mfp) / 09.05.2008&lt;/i&gt;&lt;/p&gt;
&lt;/div&gt;&lt;/div&gt;&lt;div class='cs_blocs'&gt;&lt;h4 class='blocs_titre blocs_replie blocs_click' id=&#034;outil_sommaire_8&#034;&gt;&lt;a href='javascript:;'&gt;W-LAN Security&lt;/a&gt;&lt;/h4&gt;&lt;div class='blocs_destination blocs_invisible blocs_slide'&gt;
&lt;p&gt;Internet users who surf wirelessly or exchange data via a wireless network risk encountering unscrupulous hackers in the network. A few simple W-LAN router settings are enough to enhance security.&lt;/p&gt;
&lt;p&gt;Surfing the Internet wirelessly on a PC or laptop, or exchanging data between devices in a wireless network, is very convenient. However, when using W-LAN (Wireless Local Area Network), often referred to in advertising by the technical term Wi-Fi, caution is advised. If the wireless network is not secured well enough, intruders could use the Internet connection for illegal activities or even spy on the data saved on the computer. A few simple W-LAN router settings can minimize the risk.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Protect Router Access with a Password&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;To keep the router installation private, it's best to connect the computer by cable. The first rule is to choose a personal password for router access. But be careful: if you forget the password, you will not be able to reconfigure the setup and must reset the computer manually, losing all previous settings!&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Encryption, the Essential Measure&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;The most important measure for W-LAN security is encryption. Several methods are generally available in the configuration interfaces. The safest method is called Wi-Fi Protected Access (WPA or WPA2). All current routers support this method. Older W-LAN components may not yet support WPA2. It's also worth checking the router provider's website. A software update might be available for download and installation on the router.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Allow Only Known Devices&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;To enhance the security of your W-LAN network, you can enable MAC filtering: if you input the MAC addresses of authorized devices into the router's corresponding list, only these devices will have access to the W-LAN network. The MAC address, represented by 12 digits, is unique and allows identification. It cannot be modified. However, security is not 100% guaranteed. Skilled hackers can forge MAC addresses. By systematically trying random addresses, they could access the W-LAN network.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Enable the Firewall and Change the Network Name&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;Generally, a W-LAN router has a built-in firewall. If your computer has this option in the settings menu, it is worth enabling it. Another protection measure is to change the default SSID set in the router to a general description for Wi-Fi access, without associating it with the owner or location of the wireless network. This SSID is simply the name of the W-LAN network.&lt;/p&gt;
&lt;p&gt;&lt;i&gt;Christian Iten (Swisscontent Corp., trans. mfp) / 09.05.2008&lt;/i&gt;&lt;/p&gt;
&lt;/div&gt;&lt;/div&gt;&lt;div class='cs_blocs'&gt;&lt;h4 class='blocs_titre blocs_replie blocs_click' id=&#034;outil_sommaire_9&#034;&gt;&lt;a href='javascript:;'&gt;Social Engineering: Identity Theft with Harmful Effects&lt;/a&gt;&lt;/h4&gt;&lt;div class='blocs_destination blocs_invisible blocs_slide'&gt;
&lt;p&gt;Social engineering is one of the most dangerous and effective forms of cybercrime. The biggest risk is the human factor.&lt;/p&gt;
&lt;p&gt;&#8220;Social engineering&#8221; is a technique designed to extract information, confidential data, or unauthorized services from people by exploiting their trust. Security measures are manipulated. Social engineering can be divided into three areas: based on personal approach, based on computer systems, and reverse social engineering.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Personal Approach-Based Social Engineering&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;In this form of social engineering, criminals try to directly access information by posing as authorities or trusted individuals. Disguised in this way, they fraudulently obtain sensitive data. Dumpster diving is also a tactic used in social engineering. Company or private trash bins are searched for passwords, files, photos, and other information. This data can be used directly, for instance, as leverage in cases of blackmail, or indirectly, by providing the attacker with information to create a false identity.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Computer-Based Social Engineering&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;In this form of social engineering, identities are impersonated through technical means such as emails or websites to obtain desired data. &#8220;Phishing&#8221; is the prime example of this type of fraud. Read more on this topic in other articles within this dossier. Many sweepstakes or prize games also fall into this category of social engineering. The goal is to collect personal data, which is later misused for advertising purposes.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Reverse Social Engineering&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;The objective of reverse social engineering is to deceive the victim by posing as a supposed emergency rescuer, prompting them to disclose sensitive information or engage in harmful actions. Most often, this type of attack creates a problematic situation that causes stress or anxiety for the victim. Reverse social engineering hackers may simulate, for example, a computer attack or system failure that immediately requires access to the user account of a supposed technician.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Protection Against Social Engineering&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;Protection against social engineering can hardly be guaranteed by a technical solution, as such defenses are circumvented. Thus, only the victim can contribute the most to security by ensuring the true identity and legitimacy of the person they are dealing with, and only then should they provide sensitive data. In case of doubt, it is essential to ask for the name, phone number, and location of the caller to verify all these details afterward. Seemingly harmless information, such as an out-of-office message, should not be freely shared, as it could help an attacker create a false identity. It is particularly important to prevent the attacker from obtaining the desired information through skillful questioning and cross-referencing. Additionally, old files, papers, hard drives, and other sensitive documents should be carefully destroyed.&lt;/p&gt;
&lt;p&gt;&lt;i&gt;Alex H&#228;mmerli (Swisscontent Corp., trans. mfp) / 09.05.2008&lt;/i&gt;&lt;/p&gt;
&lt;/div&gt;&lt;/div&gt;&lt;div class='cs_blocs'&gt;&lt;h4 class='blocs_titre blocs_replie blocs_click' id=&#034;outil_sommaire_10&#034;&gt;&lt;a href='javascript:;'&gt;Checklist: How to Optimize Online Security&lt;/a&gt;&lt;/h4&gt;&lt;div class='blocs_destination blocs_invisible blocs_slide'&gt;
&lt;p&gt;The Internet harbors numerous dangers: visitors to legitimate websites can also infect their PCs, as cybercriminals may distribute malicious software through dubious online offers. However, PC users are not defenseless against these cyber attacks. By knowing potential intrusions and following a few simple tips, Internet users can easily protect themselves.&lt;/p&gt;
&lt;p&gt;To safeguard your computer, your online behavior is crucial. This starts with the proper use of passwords, which should be appropriate, securely stored, varied, and encrypted. Passwords should also be entered only on encrypted network connections to ensure the encrypted transmission of sensitive information. A running computer should not be left unattended unless secured with a password; otherwise, intruders could access confidential data without control.&lt;/p&gt;
&lt;p&gt;If you browse the Internet, your browser should always be secure and kept up to date. Outdated Internet browsers that display websites often become entry points for malicious software. A few simple tips can help you improve your browser's security.&lt;/p&gt;
&lt;p&gt;If you surf wirelessly or exchange data over a wireless network, you risk malicious hackers breaking in. A few simple settings on the W-LAN router are enough to enhance security.&lt;/p&gt;
&lt;p&gt;When securing your computer against potential malicious external attacks, a NAT router provides at least partial protection, as it separates the global network from the home computer. With a router equipped with a built-in firewall, you can also define the Internet services you want to allow access to.&lt;/p&gt;
&lt;p&gt;Security programs are also essential. Without these software programs, virtual threats can quickly compromise an unsecured computer. For complete protection, four security tools should be installed on every PC: a firewall against network attacks, antivirus software against malware, spyware protection, and a reliable browser.&lt;/p&gt;
&lt;p&gt;Viruses, worms, and trojans are dangerous. Viruses and worms are often spread via dubious emails that users open unsuspectingly. Trojans are software disguised as useful applications but perform other functions in the background without the user's knowledge. Free software from the Internet or download sites is often infected with these malicious programs. You can protect yourself from malware by not opening files whose contents are unclear or by refusing to use programs from unknown or unreliable sources.&lt;/p&gt;
&lt;p&gt;Another risk for Internet users is &#8220;phishing.&#8221; Its goal is to obtain confidential data from unsuspecting users through falsified addresses. To avoid this, caution and vigilance are essential.&lt;/p&gt;
&lt;p&gt;One of the most dangerous and effective forms of cybercrime is certainly social engineering. The greatest risk factor is the human element. This technique aims to extract information, confidential data, or unauthorized services from individuals by exploiting their trust. Security measures are manipulated. Therefore, only the victim can significantly contribute to security by ensuring the true identity and legitimacy of the contact.&lt;/p&gt;
&lt;p&gt;Jeannette Schl&#228;pfer (Swisscontent Corp., trans. mfp) / 09.05.2008&lt;/p&gt;
&lt;/div&gt;&lt;/div&gt;
&lt;p&gt; &lt;br&gt; &lt;br&gt;&lt;/p&gt;&lt;/div&gt;
		
		</content:encoded>


		
		<enclosure url="https://www.osi-ngo.org/IMG/pdf/article_a24.pdf?7853/a32f6d946a91ac58db48e630c4cae307270be623" length="967344" type="application/pdf" />
		

	</item>


 
	


 
	

</channel>
</rss>
