The discussion of the potential threats which the use of it has
introduced
Scenario, there are many forms of potential
threats which it has introduced like, an unknown person is hacking into your
account from their own computer and trying to steal your personal files, with
private information and the unknown person is using many forms of hacking and
more that’ll be stated in the subsequent, and to those whom have concerns of
being attacked, by viruses, hacking, malware, then they should keep in mind that
an unauthorised access is when a data is addressed by controlling the access
rights, however, there are even more potential dangers and security issues.
Security issues is a person(s) whom can
access a single computer, they can access the rest and entire of the computers
which is very, potentially dangerous in which the wrong person can access other
work files, personal information, privacy, personal documents and more, the
reason is, once they have accessed them computer system, they can then access
all the other entire computers, however, the hacker can be stopped by
installing antivirus protection such as, firewall, Norton security,
furthermore, this way the personal information and documents will be safe and
secure knowing your computer secure.
The forms of potential threats which the use of it has introduced
The forms of potential threats which the use
of it has introduced are in the subsequent and not only should a people keep in
mind that their account can get hacked but, there are many other forms of the
hackers using their advantages to steal, take a look, duplicate the private and
personal information, and privacy including confidentiality, which is what
every computer user should keep safe and secure from hackers and the other
forms they can use to get to you by accessing your email, social networking
site(s), and through your webcam and this is considered an criminal offence and
unlawful.
Hackers can use have many forms, advantages,
and ways to get to you but, with great security with 1 or 2 installations of
antivirus, the person(s) are safe and secure which will keep safe your privacy,
confidentiality, and personal information furthermore, there are not only
hackers but, other forms of threats which the use of it has introduced and this
can be done by installing viruses and they come in many forms and in the
subsequent there are the forms of potential, high risk, viruses, and how their
purpose and uses they have which is explained and what can occur once they have
gained access.
The sort of viruses that are potential threats which it has introduced
Malware also, known as, (malicious software)
is a software program which includes viruses like, worms, trojans, is designed
to cause dangers and have potential security issues,
Viruses are what damages files and can be
prevented by installing antivirus software and by not opening attachments to
emails from unknown sources,
Hacking is an act in which person(s), breaks
into your computer system plus, hacking can be prevented through installing a firewall
which creates a software barrier, preventing other network users gaining access
to your data on the computer,
Backups
are what we use in case, a disaster strikes, the reason is, the users need
backups and is essential that plenty backups and to try to recover files,
documents, personal, information, privacy, and confidentiality, to prevent
corruption, damage and loss of data, files, and personal information and to
especially avoid the loss of data,
The security issues that the use of potential threats of it has
introduced
The potential security issues people whom
have personal computers have should be aware of the issues that can affect them
and their pc and this is where security issues to keep in mind, the reason is,
there are hackers that can access your pc, your networking sites such as, face
book and twitter, they can also, access your personal information, pictures,
videos, images, documents, confidentiality files and documents and their
privacy and etc, however, the installing of antivirus they can protect their pc
and files, and prevent them from corruption, damage or even loss of data which
is to be kept in mind,
Their personal computers can be accessed
through their social networking site(s) through friends or to everybody and
this way they have found their way to get to your pc that includes, your
personal information, pictures, videos, images, documents, etc, and to just
allow friends this way you won’t be hacked and this is another way to prevent
hacking and this is an advantage for the people and the vice versa for the
hacker also, this can be prevented on emails, you tube, Gmail accounts etc,
The potential threats of it and the forms it includes
Cyber bullying is the use of communication
through networks to bully an individual by, typically sending to them messages
that are intimidating or of threatening nature and this is can be prevented by
reporting the individual(s) whom are bullying and cyber bullying is considered
as, an criminal offence which is unlawful,
Virus bug is a piece of code that is capable
of coping itself and typically has a corruption effect, such as, damaging
files, or destroying the data and a virus bug can be prevented by installing a
firewall which is a software that creates a barrier of antivirus software to
keep the virus bug at bay to prevent any loss of data, and this is done by
downloading a virus bug,
Spam is unknown individual(s), using viruses
that send the same message indiscriminately to large numbers of people on the
internet, through social networking sites mostly and the reply of the
individual can be prevented,
Phishing is stealing identities, private
information and confidential files and documents as well as, passw3ords, usernames,
and more etc, furthermore, phishing is an activity seen as, defrauding an
online account holder of financial information by posing as an actual company
with a fake website setup, and is a trap that can be avoided,
The forms of hacking a personal computer to identity theft to rejection
of service attack
Computer hacking is an, individual is trying
to gain access by breaking through the barriers of antivirus with the use of a
threat of virus which is extremely complex and this can be done though either
the many computers they can have to get to you or by using the internet, plus,
hacking in fact is most noticed amongst teenagers and young adults, there are
many elder hackers as well moreover, the many hackers there are, are known as,
it buffs who enjoy learning about how computers work and which they consider
hacking as , an ‘art’ form,
However, this is a problem that can be
overcome with solutions by setting security questions and answers and answers
for your account along with an alternative email which is an great advantages,
people whom have pc’s should be aware of making sure their usernames aren’t
too, simple especially their passwords which is the complex part, the way to
prevent this is to have letters, numbers and symbols, to make it complex for the
hacker and the password should be about , 8 characters for the password, there
are as, many advantages, with many other disadvantages,
Identity theft is considered as, an offence
and unlawful which have stern consequences for the actions of those individual(s),
whom have done this act and are considered as, an criminal, identity theft is
basically, to find information on people to like, their personal information,
private and confidential files and documents as well as, personal details and
more, they can use these to open bank accounts, credit card details, documents
like, passports ad driving licenses in the people’s names and surnames’ to
overcome this problem there is a straightforward solution,
The problem can be overcome is to be careful
what information people enter in the computer or on the internet websites, for
social networking sites such as, face book and twitter whom can see ‘knowing
me’ the people can alter that to friends only, which is people whom accept you
and this way people can overcome identity thefts, furthermore, there are many
websites that have viruses, spam, malware, trojans, spy’s, hacking, identity
theft, rejection of service attacks, and popup, which is harmful to the pc and
can trap you on the website with spam and steal your personal information,
Rejection for service attacks is for i.e.
malware, usually comes as popup ads and can hijack your browser, redirect your
research attempts and you get pop-up’s
that the computer may have a virus of some sort and you would then need
t buy a an antivirus like, firewall which creates a software and acts as, an
barrier to keep the viruses at bay and an AVG scanner which detects any viruses
and eliminates them straight away and should be done daily and this way it will
prevent the hackers using their ‘art’ form, and will be denied access even if
they tried which is an elegant system,
However, pc users need to keep in mind that
you cannot use certain, virus scanners, the reason is, its blocked and can make
the pc users computer slow and therefore, they won’t be able to open most of
the programmes, the reason is, the hackers want them pc users to buy, a new virus scanner, and you click
buy, and so, it doesn't work then you would need to buy their virus scanner
again, and this is an advantages which hackers use to get to people and by
stealing you money and the hackers see them as, a host, by taking over their
entire computer,
How to stay safe and secure from potential threats which the use of it
has introduced
The subsequent is stated about the safety and
security of the pc users and this has linked with e-safety, which keeps people
from troubles with hacking, social networking sites, identity theft, and
viruses, conference calls, and more, however, it has helped many pc users
overcome these problems with ultimate solutions,
The internet is a virtual world wide web in which
millions of people uses all over the world to communicate with each other and
most information is set up. The internet offers and provides useful information
and provides many opportunities to explore create and collaborate. But it’s
important to keep yourself safe and secure so that you can make the most of it.
The growing popularity on the Internet in recent years
has brought about many concerns about online safety. Many users are concerned
about the protection of information online, and others are troubled about
safety of minors browsing online. The Internet offers so many opportunities o
explore, create, and collaborate. But, it’s important to keep yourself safe and
secure so that you can make the most of it. Whether, you’re a new Internet user
or an expert, the tips and tools online help you to navigate the web safely and
securely.
A criminal might try to gain access to your personal
information such as email password, bank details, or national insurance number, et ...they might do this by storing some kind of virus such as malware on your
computer, by tricking you into your own account or tricking you into giving
them the information. Then they could steal from you, impersonate you or even
sell your details and personal information to the highest bidder.
People can also get in to your personal
details though phishing, phishing is a method of online identity theft.
Phishing emails are designed to trick the users into visiting the links in the
email that are designed to steal personal information such as usernames,
passwords, credit card information et
So it is very important to be aware of these dangers and not go on
harmful website.
The forms of staying safe & secure online to prevent issues
Secure passwords - learn more about how to create strong
passwords
Prevent identity theft - know the common tricks that
criminals employ to help you protect yourself from online fraud and identity
theft.
Avoid scams - the web can be a great place, but not
everyone online has good intentions. Learn three simple ways to avoid scammers
and stay safe on the web.
Keep you device clean - find out some common signs that
your device might be infected with malware - malicious software designed to
harm your device or network and how you can protect yourself.
Signing in & out - signing into your Google account
is simple and useful - but know when it is important to sign out as well.
Lock your screen or device - you wouldn't go out for the
day leaving your front door wide open, right? Find out why you should lock you
screen or device.
Report abuse and illegal activity - help you and others
to stay safe online by reporting people or companies who send spam, try to sell
counterfeit goods, distribute malware or are otherwise abusing our systems.
Check your G mail settings - if you use G mail, you can
follow these steps to help make sure that your account stays safe.
Use secure networks - are extra careful whenever you go
online using a network you don’t know and learn about settings up your home
router and Wi-Fi network securely.
How to ensure the pc users data is safe & secure
To ensure that your computer data is safe and
secure by avoiding viruses and using some forms of Protection. An great example
would be Phishing and what this performs is its attacks can be avoided and
prevented, by guarding against spam, avoid Phishing attacks by communicating
personal information only through phone or though websites that are secure such
as Hotmail and G mail and to find out and ensure that your personal information
is safe also, never enter personal information on a pop up screen.
The sorts of protection to
prevent security issues
Smart screen filter is like firewall in which
it helps, prevent spyware, trojan s and viruses et. From entering your
computer system and personal information i.e. my documents, pictures, emails,
social networking sites, passwords, accounts, and your webcam.
i.
Ensure
that your computer is protected with a firewall, spam filters, anti-virus
protection and anti-spyware software. Keep in mind to ensure you don’t reply do
a random email message(s) and to avoid going on fake websites, which may harm
you or your computer.
ii.
You
should minimise security issues in the browsers.
iii.
Use
trustworthy websites, certificates
iv.
Use a
strong password and prevent anyone from going into your account
v.
Have
private browsing so that only you know what you’re undertaking
vi.
Pop up
blocker is useful and helps prevent any pop ups which may be harmful to you or
your computer
Knowing when to trust a legitimate website & how to identify a
secure website
Many websites require you to enter your
personal information such as Hotmail, G mail & Social Networking Sites such
as, Face book & Twitter before you can access areas on the site or purchase
an item or service. Before you trust a website with your personal information,
ensure the subsequent;
i.
If you
arrive at a website from a link in an email message, verify with the sender of
the email message that the website is legitimate before you provide any
information to the site. Phishing websites can sometimes send email messages
that mimic, or spoof, legitimate email addresses.
ii.
Make sure
that the website’s address begins with HTTP S, and that a lock icon
appears in the Address Bar. You can click the
icon view to view your security information and certificate details.
iii.
Check the
web address in the Address Bar and in the certificate details to make sure it
matches the address you want. Phishing or Fraudulent websites will use similar
website names to trick visitors into believing they’re visiting trusting
websites.
iv.
Check to
see if the website displays an Internet trust organisation logo. The logo
indicates that a site has a privacy statement and allows users to choose how
their information is sued.
For more information on secure websites, just
click the link about how to know if an online transaction is secure in Internet Explorer 9. Note, however, that many legitimate websites aren't registered with
trust organizations, and some websites display fraudulent logos. However, if
you aren't sure whether a trust logo is legitimate, contact the trust
organization to see if the website is registered with them.
You should cover the subsequent t in order to
make sure that your data is safe:
A firewall is a software or hardware item
which provides security for a computer or local network by preventing illegal
access.
Encryption defines to mixing data in a way
that only the PC user with the secret code can interpret it.
Backups imply making one or more copies of
your data somewhere else; in case a harmful virus wipes out your operating
system you will still have the work and data as you had backed it up.
5 Tips for Staying Safe on the Web
i.
Use
strong passwords
ii.
Enable
2-step verification
iii.
Install
updates right away
iv.
Be wary
of suspicious emails and offers
v.
Scan
regularly for viruses
You can learn how you can stay safe and
secure online, how you can protect your family online, learn how Google helps
to protect you, and know you web. The next are safe sites: to verify whether
these sites are safe or not, the way to notice it is to look on the after HTTP,
it then has an S at the end and looking across the link the site will have a
padlock to show that their site is safe.