Your company has implemented network security and you have installed the latest security hotfixes on your servers,...
By submitting your email address, you agree to receive emails regarding relevant topic offers from TechTarget and its partners. You can withdraw your consent at any time. Contact TechTarget at 275 Grove Street, Newton, MA.
but is your Security Administrator being stalked? While you are busy keeping hackers out of your network, is an Internet stalker creeping into your life? Is there a Goliath invading your privacy or threatening your world? How do you know that a stalker hasn't already obtained your private information?
Join me on a journey as I focus on the profiles of Internet stalkers and provide security (and sleuthing) tips to reduce your odds of falling prey to these predators.
Script kiddies-stalkers -- on a quest to learn
Similar to script kiddies, these Internet stalkers have limited technical capabilities and operate in a random fashion scouring the Internet for vulnerable users registered in chat rooms and public forums. The script kiddies-stalkers probe (often copying other probing tactics) for personal information and quickly move on if resistance is detected along their search path. While harmless compared to other serious Internet stalkers, nevertheless, these novice stalkers are on a quest to learn more information about you than you are prepared to divulge to strangers.
Use new nicknames
Avoid using your family's real or known name online, especially in chat rooms or forums. Use a new nickname that only your close relatives can use to identify and communicate with you. You may also want to set up a secret code/theme to verify it is one of your relatives online. Use a separate nickname for your friends and don't disclose your family's nickname to anyone outside your immediate family. Avoid sharing passwords and secret codes/themes and change this information frequently (e.g., every 15-30 days).
Pedophiles-stalkers -- on a quest to lure
Similar to experienced hackers, who are electronically attracted to your data, these Internet stalkers are physically attracted to your kids. Unlike script kiddies-stalkers, these stalkers are serious with the power to attract other kids online. They hang out in chat rooms and forums and appear on your screen disguised as another innocent kid online that just happen to find your kid. Eventually, the conversations turn into a subtle interrogation session with an invitation to an in-person meeting.
Monitor chat, forums, and online games (such as Xbox)
Avoid meeting strangers online and monitor your kids' sessions in chat rooms, forums, and even with online gaming services as some now offer Chat services, such as Xbconnect.com. Instruct your kids not to entertain any questions and instead direct any inquiries to you immediately. Observe your child's response behavior online periodically and verify – don't assume – that their relative, schoolmate, or friend is indeed at the other end of the chat or game.
Predator-stalkers -- on a quest to invade
Similar to sophisticated hackers, predator-stalkers thrive on invading and threatening your privacy. These stalkers are very serious about their mission and often like to show off how much they know about you. They observe your online and offline habits and become obsessed with you. Sometimes, these stalkers will obtain enough information to break into your house or car.
again; there is nothing new under the sun."
The Internet is the new messenger of our civilization; it is the electronic carrier of our communications and global marketplace for the 21st century. However, stalking is nothing new. Ask yourself the following questions:
Why is the Internet stalker focused on you or your family? How severe is the threat(s)? How much information has the stalker revealed to you? What other private information could the stalker have obtained? Do you think anyone in your family triggered this action? Where online did you provide this private information?
Defense and sleuthing
No doubt, if you find yourself on the defense against an Internet stalker, it can be a psychological strain; however, it is possible to track the Internet stalker with good sleuthing and patience.
Please write to me and let me know if this article has provided a better understanding of stalkers on the Internet.
Luis Medina is the author of "The Weakest Link Series," which offers network managers an opportunity to identify ongoing network security issues. Luis also answers security questions in SearchNetworkings Ask the Expert section. Submit a security question to Luis here or view his previously answered Ask the Expert questions.