Wednesday, 26 June 2013

The discussion of the potential threats which the use of it has introduced
Scenario, there are many forms of potential threats which it has introduced like, an unknown person is hacking into your account from their own computer and trying to steal your personal files, with private information and the unknown person is using many forms of hacking and more that’ll be stated in the subsequent, and to those whom have concerns of being attacked, by viruses, hacking, malware, then they should keep in mind that an unauthorised access is when a data is addressed by controlling the access rights, however, there are even more potential dangers and security issues.
Security issues is a person(s) whom can access a single computer, they can access the rest and entire of the computers which is very, potentially dangerous in which the wrong person can access other work files, personal information, privacy, personal documents and more, the reason is, once they have accessed them computer system, they can then access all the other entire computers, however, the hacker can be stopped by installing antivirus protection such as, firewall, Norton security, furthermore, this way the personal information and documents will be safe and secure knowing your computer secure.


The forms of potential threats which the use of it has introduced
The forms of potential threats which the use of it has introduced are in the subsequent and not only should a people keep in mind that their account can get hacked but, there are many other forms of the hackers using their advantages to steal, take a look, duplicate the private and personal information, and privacy including confidentiality, which is what every computer user should keep safe and secure from hackers and the other forms they can use to get to you by accessing your email, social networking site(s), and through your webcam and this is considered an criminal offence and unlawful.
Hackers can use have many forms, advantages, and ways to get to you but, with great security with 1 or 2 installations of antivirus, the person(s) are safe and secure which will keep safe your privacy, confidentiality, and personal information furthermore, there are not only hackers but, other forms of threats which the use of it has introduced and this can be done by installing viruses and they come in many forms and in the subsequent there are the forms of potential, high risk, viruses, and how their purpose and uses they have which is explained and what can occur once they have gained access.


The sort of viruses that are potential threats which it has introduced
Malware also, known as, (malicious software) is a software program which includes viruses like, worms, trojans, is designed to cause dangers and have potential security issues,
Viruses are what damages files and can be prevented by installing antivirus software and by not opening attachments to emails from unknown sources,
Hacking is an act in which person(s), breaks into your computer system plus, hacking can be prevented through installing a firewall which creates a software barrier, preventing other network users gaining access to your data on the computer,
Backups are what we use in case, a disaster strikes, the reason is, the users need backups and is essential that plenty backups and to try to recover files, documents, personal, information, privacy, and confidentiality, to prevent corruption, damage and loss of data, files, and personal information and to especially avoid the loss of data,


The security issues that the use of potential threats of it has introduced
The potential security issues people whom have personal computers have should be aware of the issues that can affect them and their pc and this is where security issues to keep in mind, the reason is, there are hackers that can access your pc, your networking sites such as, face book and twitter, they can also, access your personal information, pictures, videos, images, documents, confidentiality files and documents and their privacy and etc, however, the installing of antivirus they can protect their pc and files, and prevent them from corruption, damage or even loss of data which is to be kept in mind,
Their personal computers can be accessed through their social networking site(s) through friends or to everybody and this way they have found their way to get to your pc that includes, your personal information, pictures, videos, images, documents, etc, and to just allow friends this way you won’t be hacked and this is another way to prevent hacking and this is an advantage for the people and the vice versa for the hacker also, this can be prevented on emails, you tube, Gmail accounts etc,


The potential threats of it and the forms it includes
Cyber bullying is the use of communication through networks to bully an individual by, typically sending to them messages that are intimidating or of threatening nature and this is can be prevented by reporting the individual(s) whom are bullying and cyber bullying is considered as, an criminal offence which is unlawful,
Virus bug is a piece of code that is capable of coping itself and typically has a corruption effect, such as, damaging files, or destroying the data and a virus bug can be prevented by installing a firewall which is a software that creates a barrier of antivirus software to keep the virus bug at bay to prevent any loss of data, and this is done by downloading a virus bug,
Spam is unknown individual(s), using viruses that send the same message indiscriminately to large numbers of people on the internet, through social networking sites mostly and the reply of the individual can be prevented,
Phishing is stealing identities, private information and confidential files and documents as well as, passw3ords, usernames, and more etc, furthermore, phishing is an activity seen as, defrauding an online account holder of financial information by posing as an actual company with a fake website setup, and is a trap that can be avoided,


The forms of hacking a personal computer to identity theft to rejection of service attack
Computer hacking is an, individual is trying to gain access by breaking through the barriers of antivirus with the use of a threat of virus which is extremely complex and this can be done though either the many computers they can have to get to you or by using the internet, plus, hacking in fact is most noticed amongst teenagers and young adults, there are many elder hackers as well moreover, the many hackers there are, are known as, it buffs who enjoy learning about how computers work and which they consider hacking as , an ‘art’ form,
However, this is a problem that can be overcome with solutions by setting security questions and answers and answers for your account along with an alternative email which is an great advantages, people whom have pc’s should be aware of making sure their usernames aren’t too, simple especially their passwords which is the complex part, the way to prevent this is to have letters, numbers and symbols, to make it complex for the hacker and the password should be about , 8 characters for the password, there are as, many advantages, with many other disadvantages,
Identity theft is considered as, an offence and unlawful which have stern consequences for the actions of those individual(s), whom have done this act and are considered as, an criminal, identity theft is basically, to find information on people to like, their personal information, private and confidential files and documents as well as, personal details and more, they can use these to open bank accounts, credit card details, documents like, passports ad driving licenses in the people’s names and surnames’ to overcome this problem there is a straightforward solution,
The problem can be overcome is to be careful what information people enter in the computer or on the internet websites, for social networking sites such as, face book and twitter whom can see ‘knowing me’ the people can alter that to friends only, which is people whom accept you and this way people can overcome identity thefts, furthermore, there are many websites that have viruses, spam, malware, trojans, spy’s, hacking, identity theft, rejection of service attacks, and popup, which is harmful to the pc and can trap you on the website with spam and steal your personal information,
Rejection for service attacks is for i.e. malware, usually comes as popup ads and can hijack your browser, redirect your research attempts and you get pop-up’s  that the computer may have a virus of some sort and you would then need t buy a an antivirus like, firewall which creates a software and acts as, an barrier to keep the viruses at bay and an AVG scanner which detects any viruses and eliminates them straight away and should be done daily and this way it will prevent the hackers using their ‘art’ form, and will be denied access even if they tried which is an elegant system,
However, pc users need to keep in mind that you cannot use certain, virus scanners, the reason is, its blocked and can make the pc users computer slow and therefore, they won’t be able to open most of the programmes, the reason is, the hackers want them pc users  to buy, a new virus scanner, and you click buy, and so, it doesn't work then you would need to buy their virus scanner again, and this is an advantages which hackers use to get to people and by stealing you money and the hackers see them as, a host, by taking over their entire computer,


How to stay safe and secure from potential threats which the use of it has introduced
The subsequent is stated about the safety and security of the pc users and this has linked with e-safety, which keeps people from troubles with hacking, social networking sites, identity theft, and viruses, conference calls, and more, however, it has helped many pc users overcome these problems with ultimate solutions,
The internet is a virtual world wide web in which millions of people uses all over the world to communicate with each other and most information is set up. The internet offers and provides useful information and provides many opportunities to explore create and collaborate. But it’s important to keep yourself safe and secure so that you can make the most of it.
The growing popularity on the Internet in recent years has brought about many concerns about online safety. Many users are concerned about the protection of information online, and others are troubled about safety of minors browsing online. The Internet offers so many opportunities o explore, create, and collaborate. But, it’s important to keep yourself safe and secure so that you can make the most of it. Whether, you’re a new Internet user or an expert, the tips and tools online help you to navigate the web safely and securely.
A criminal might try to gain access to your personal information such as email password, bank details, or national insurance number, et ...they might do this by storing some kind of virus such as malware on your computer, by tricking you into your own account or tricking you into giving them the information. Then they could steal from you, impersonate you or even sell your details and personal information to the highest bidder.
People can also get in to your personal details though phishing, phishing is a method of online identity theft. Phishing emails are designed to trick the users into visiting the links in the email that are designed to steal personal information such as usernames, passwords, credit card information et   So it is very important to be aware of these dangers and not go on harmful website.


The forms of staying safe & secure online to prevent issues
Secure passwords - learn more about how to create strong passwords
Prevent identity theft - know the common tricks that criminals employ to help you protect yourself from online fraud and identity theft.
Avoid scams - the web can be a great place, but not everyone online has good intentions. Learn three simple ways to avoid scammers and stay safe on the web.
Keep you device clean - find out some common signs that your device might be infected with malware - malicious software designed to harm your device or network and how you can protect yourself.
Signing in & out - signing into your Google account is simple and useful - but know when it is important to sign out as well.
Lock your screen or device - you wouldn't go out for the day leaving your front door wide open, right? Find out why you should lock you screen or device.
Report abuse and illegal activity - help you and others to stay safe online by reporting people or companies who send spam, try to sell counterfeit goods, distribute malware or are otherwise abusing our systems.
Check your G mail settings - if you use G mail, you can follow these steps to help make sure that your account stays safe.
Use secure networks - are extra careful whenever you go online using a network you don’t know and learn about settings up your home router and Wi-Fi network securely.




How to ensure the pc users data is safe & secure
To ensure that your computer data is safe and secure by avoiding viruses and using some forms of Protection. An great example would be Phishing and what this performs is its attacks can be avoided and prevented, by guarding against spam, avoid Phishing attacks by communicating personal information only through phone or though websites that are secure such as Hotmail and G mail and to find out and ensure that your personal information is safe also, never enter personal information on a pop up screen.
 The sorts of protection to prevent security issues
Smart screen filter is like firewall in which it helps, prevent spyware, trojan s  and viruses et.  From entering your computer system and personal information i.e.  my documents, pictures, emails, social networking sites, passwords, accounts, and your webcam.

          i.            Ensure that your computer is protected with a firewall, spam filters, anti-virus protection and anti-spyware software. Keep in mind to ensure you don’t reply do a random email message(s) and to avoid going on fake websites, which may harm you or your computer.
        ii.            You should minimise security issues in the browsers.
       iii.            Use trustworthy websites, certificates
        iv.            Use a strong password and prevent anyone from going into your account
         v.            Have private browsing so that only you know what you’re undertaking
        vi.            Pop up blocker is useful and helps prevent any pop ups which may be harmful to you or your computer
Knowing when to trust a legitimate website & how to identify a secure website
Many websites require you to enter your personal information such as Hotmail, G mail  & Social Networking Sites such as, Face book & Twitter before you can access areas on the site or purchase an item or service. Before you trust a website with your personal information, ensure the subsequent;
          i.            If you arrive at a website from a link in an email message, verify with the sender of the email message that the website is legitimate before you provide any information to the site. Phishing websites can sometimes send email messages that mimic, or spoof, legitimate email addresses.
        ii.            Make sure that the website’s address begins with HTTP S, and that a lock icon Picture of lock icon appears in the Address Bar. You can click the icon view to view your security information and certificate details.
       iii.            Check the web address in the Address Bar and in the certificate details to make sure it matches the address you want. Phishing or Fraudulent websites will use similar website names to trick visitors into believing they’re visiting trusting websites.
        iv.            Check to see if the website displays an Internet trust organisation logo. The logo indicates that a site has a privacy statement and allows users to choose how their information is sued.
For more information on secure websites, just click the link about how to know if an online transaction is secure in Internet Explorer 9. Note, however, that many legitimate websites aren't registered with trust organizations, and some websites display fraudulent logos. However, if you aren't sure whether a trust logo is legitimate, contact the trust organization to see if the website is registered with them.
You should cover the subsequent t in order to make sure that your data is safe:
A firewall is a software or hardware item which provides security for a computer or local network by preventing illegal access.
Encryption defines to mixing data in a way that only the PC user with the secret code can interpret it.
Backups imply making one or more copies of your data somewhere else; in case a harmful virus wipes out your operating system you will still have the work and data as you had backed it up.
5 Tips for Staying Safe on the Web
                      i.            Use strong passwords
                    ii.            Enable 2-step verification
                   iii.            Install updates right away
                    iv.            Be wary of suspicious emails and offers
                     v.            Scan regularly for viruses
You can learn how you can stay safe and secure online, how you can protect your family online, learn how Google helps to protect you, and know you web. The next are safe sites: to verify whether these sites are safe or not, the way to notice it is to look on the after HTTP, it then has an S at the end and looking across the link the site will have a padlock to show that their site is safe.

No comments:

Post a Comment