IN THIS CHAPTER
As more people, businesses, and organizations establish a presence online, the world becomes an increasingly connected place. And the more connected the world becomes, the more opportunities arise for communicating with others, doing research, sharing information, and collaborating on projects. The flip side to this new connectedness is the increased risk of connecting with a remote user whose intentions are less than honorable. It could be a packet sniffera person who monitors network traffic to steal sensitive datawho steals your password or credit card number, a cracker who breaks into your Internet account, a virus programmer who sends a Trojan-horse virus attached to an email, or a spammer looking to dupe you out of your hard-earned money. Admittedly, online security threats are relatively rare and are no reason to swear off the online world. However, these threats do exist, and people fall victim to them every day. Luckily, protecting yourself from these and other e-menaces doesn't take much effort or time, as you'll see in this chapter, in which I discuss the security tools built into Microsoft Outlook. |