❌

Reading view

Reducing Spam

Spam is the electronic version of Ò€œjunk mail.Ò€ The term spam refers to unsolicited, often unwanted, email messages. Spam does not necessarily contain virusesÒ€”valid messages from legitimate sources could fall into this category.
  •  

Protecting Your Privacy

Before submitting your name, email address, or other personal information on a website, look for the site's privacy policy. This policy should explain how the information will be used and whether or not the information will be distributed to other organizations.
  •  

Protecting Against Malicious Code

What is malicious code? Malicious code is unwanted files or programs that can cause harm to a computer or compromise data stored on a computer. Various classifications of malicious code include viruses, worms, and Trojan horses.
  •  

Good Security Habits

There are some simple habits you can adopt that, if performed consistently, may dramatically reduce the chances that the information on your computer will be lost or corrupted.
  •  

Choosing and Protecting Passwords

Passwords are a common form of authentication and are often the only barrier between you and your personal information. There are several programs attackers can use to help guess or crack passwords.
  •  

2009 National Infrastructure Protection Plan Released

Risk management and stakeholder engagement are key elements of TSA's surface transportation initiatives. Unlike in aviation, where TSA has employees performing security functions, we utilize stakeholder partnerships, grant funding and rulemaking to enhance security in surface modes.
  •  
❌