Wed - May 18th, 2022 2:58 am
  • Login
  • Register
  • Home
  • FB
  • Twitter
  • Google
  • Online Safety
  • Social Media
  • Censorship
  • Fox
No Result
View All Result
  • Home
  • FB
  • Twitter
  • Google
  • Online Safety
  • Social Media
  • Censorship
  • Fox
No Result
View All Result
No Result
View All Result
Home Social Media

Basic knowledge of internet security

03/07/2021
in Social Media
0
0
SHARES
1.4k
VIEWS
Share on FacebookShare on Twitter

The population of Internet users is expanding year by year, and it is now use for various purposes. Along with this, the damage and troubles of crimes related to the Internet are increasing. Here, we will inform you about the basic knowledge of Internet security so that you will not suffer from these damages.

What is Internet Security?

Byconnecting your computer to the Internet, you can view various homepages around the world and easily exchange information with people you have never met. While this is very convenient, it also involves the risk of connecting with a malicious third party, receiving unsolicited information, malicious programs, or stealing your information. It is also true that people on the other side of the network are vulnerable to fraud because it is difficult to identify them. When using the Internet, you should always remember this danger and take measures to prevent damage.

What are the threats to using the Internet?

There are various threats on the Internet, and it is important to understand the specific dangers in order to deal with them. For example, viruses, worms, and Trojan horses are security threats. Viruses are special programs that are install in e-mails and homepages. It is also called malware. The damage caused by viruses includes those that only display messages and images on the screen of a PC, and those that destroy the data stored on the hard disk. Worms are a type of malware that finds network vulnerabilities and penetrates inside your computer. It overloads the system and sends self-replicating emails to the outside without permission, leading to information leakage.

What is damage?

The damages caused by using the Internet are as follows. These are called “attacks” by malicious third parties, and they can be used to steal information and misuse it by exploiting weaknesses in software to cause unauthorized behavior, or by taking advantage of the lack of alertness of users. It is something to do. Correct knowledge and countermeasures are required to prevent these.

What is a computer virus?

A program invades a computer without permission (infection), repeats replication (proliferation), and does nothing for a while (latent), but is executed (onset) under certain conditions. It’s called this because it resembles a virus in the biological world, but in reality it’s mostly an annoying program created by malicious users on the Internet to show off their technology. is. Most of the infection routes are via email attachments or access to homepages. The details of the damage are various, and if the files stored on the computer are destroy, a large number of emails are sent without permission, or if it becomes malicious, the system may even be destroyed.

Countermeasures

If the sender is not clear in the email sent, or if the title is an alphabetic character, an incomprehensible character string, a blank, etc. even from a person you know, it may be an email with a virus.

Attachments will not open You may be infect with a virus by opening the file.
Don’t click the URL Unwanted programs may be download from the reference destination without permission, which is extremely dangerous.
Do not reply By replying, you will tell the other party that you are using the email address. In addition, there is a risk that personal information will be leak from the signature.
Consider using antivirus software Even with the above points in mind, it is often difficult to completely prevent recent malicious viruses. It is also effective to use antivirus tools provided by providers and manufacturers.

Leakage of personal information

When using the Internet, there are many opportunities to enter personal information through online shopping and bulletin boards. At this time, if the entered information is misused and junk mail or direct mail is sent, or if the credit card number, user ID or password is stolen, there is a risk of financial damage. In addition, there are homepages on the Internet that have traps for illegally collecting personal information and dangerous homepages that change browser settings without permission.

Countermeasures

Please note the following points when using online shopping or auctions.

Uses encryption mechanism by a third party Since the information being transmit is encrypt and there is no risk of eavesdropping, and the company information used when using the encryption mechanism is register with a third party, it is unlikely that it is a fictitious company. Become.
A well-known company with a proven track record in online shopping Determine if a socially credible company provides the service, and make sure that shipping and handling, return methods, billing methods, handling of personal information, etc. are clearly stated.
Change your password regularly User IDs and passwords are important information to prove yourself on the Internet. Avoid using passwords that can be easily guess, such as date of birth, and change them regularly in case of leakage.
Do not browse suspicious homepages Adult sites of unknown origin or sites that try to download unintelligible files may have malicious traps in place.

Internet fraud

In Internet shopping and auctions, there are many reports of fraudulent damages such as even though the product price is paid in advance, the product does not arrive no matter how long you wait, and you cannot contact the other party. In Internet shopping, etc., avoid dealing with a partner whose contact information is not clear, and in the unlikely event of damage, do not fall asleep and prepare e-mails and documents certifying payment when dealing with the other party.

Fictitious billing email

Indiscriminate billing emails that you do not remember may be sent. If you do not pay, you may have threatening complaints such as “charge late fees, collect”, but you do not have to send money at all.

Let us protect the information firmly with thorough measures!

Information is a valuable asset for businesses. Therefore, many people want this kind of information. Take strong security measures and protect them firmly.

 

Tags: Facebook
Previous Post

Basic Knowledge of Twitter

Next Post

8 questions to decide why to use a new social network and whether to use it

Related Posts

Facebook

Nigeria asks Facebook, other platforms to curtail hate speech

05/17/2022
Google

Google will start distributing a security-vetted collection of open-source software libraries

05/17/2022
Social Media

Enough about Elon Musk’s Twitter deal. It’s time to talk about social media reform

05/17/2022
Hot News

Dr. Peterson Leaves Twitter After Controversial Yumi Nu Tweets

05/17/2022
Facebook

What’s working for local TV stations on Facebook? Posting early, killing hashtags, skipping sports

05/16/2022
Next Post

8 questions to decide why to use a new social network and whether to use it

GTranslate

en English
af Afrikaanssq Shqipam አማርኛar العربيةhy Հայերենaz Azərbaycan dilieu Euskarabe Беларуская моваbn বাংলাbs Bosanskibg Българскиca Catalàceb Cebuanony Chichewazh-CN 简体中文zh-TW 繁體中文co Corsuhr Hrvatskics Čeština‎da Dansknl Nederlandsen Englisheo Esperantoet Eestitl Filipinofi Suomifr Françaisfy Fryskgl Galegoka ქართულიde Deutschel Ελληνικάgu ગુજરાતીht Kreyol ayisyenha Harshen Hausahaw Ōlelo Hawaiʻiiw עִבְרִיתhi हिन्दीhmn Hmonghu Magyaris Íslenskaig Igboid Bahasa Indonesiaga Gaeligeit Italianoja 日本語jw Basa Jawakn ಕನ್ನಡkk Қазақ тіліkm ភាសាខ្មែរko 한국어ku كوردی‎ky Кыргызчаlo ພາສາລາວla Latinlv Latviešu valodalt Lietuvių kalbalb Lëtzebuergeschmk Македонски јазикmg Malagasyms Bahasa Melayuml മലയാളംmt Maltesemi Te Reo Māorimr मराठीmn Монголmy ဗမာစာne नेपालीno Norsk bokmålps پښتوfa فارسیpl Polskipt Portuguêspa ਪੰਜਾਬੀro Românăru Русскийsm Samoangd Gàidhligsr Српски језикst Sesothosn Shonasd سنڌيsi සිංහලsk Slovenčinasl Slovenščinaso Afsoomaalies Españolsu Basa Sundasw Kiswahilisv Svenskatg Тоҷикӣta தமிழ்te తెలుగుth ไทยtr Türkçeuk Українськаur اردوuz O‘zbekchavi Tiếng Việtcy Cymraegxh isiXhosayi יידישyo Yorùbázu Zulu
  • Perverse family haunted house | Preserve Family Twitter Full Video| Perverse Family Real Movie Video

    0 shares
    Share 0 Tweet 0
  • B.C. flooding: Volunteers band together to deliver hot meals to stranded truckers in Hope – BC

    0 shares
    Share 0 Tweet 0
  • AEGIS Capital Ship Security Facility – EVE Online First Look Exploration New Dawn

    0 shares
    Share 0 Tweet 0
  • Aquatics Job Fair, Online Water Safety Class Through Prince George’s

    0 shares
    Share 0 Tweet 0

Browse by Category

  • Censorship
  • Facebook
  • Fox
  • Google
  • Hot News
  • Online Safety
  • Social Media
  • Twitter
  • Video
InmNews

© 2021 Copyright - All rights reserved.

Navigate Site

  • Home
  • Privacy Policy
  • Register & Login

Follow Us

No Result
View All Result
  • Home
  • FB
  • Twitter
  • Google
  • Online Safety
  • Social Media
  • Censorship
  • Fox
  • en English
    af Afrikaanssq Shqipam አማርኛar العربيةhy Հայերենaz Azərbaycan dilieu Euskarabe Беларуская моваbn বাংলাbs Bosanskibg Българскиca Catalàceb Cebuanony Chichewazh-CN 简体中文zh-TW 繁體中文co Corsuhr Hrvatskics Čeština‎da Dansknl Nederlandsen Englisheo Esperantoet Eestitl Filipinofi Suomifr Françaisfy Fryskgl Galegoka ქართულიde Deutschel Ελληνικάgu ગુજરાતીht Kreyol ayisyenha Harshen Hausahaw Ōlelo Hawaiʻiiw עִבְרִיתhi हिन्दीhmn Hmonghu Magyaris Íslenskaig Igboid Bahasa Indonesiaga Gaeligeit Italianoja 日本語jw Basa Jawakn ಕನ್ನಡkk Қазақ тіліkm ភាសាខ្មែរko 한국어ku كوردی‎ky Кыргызчаlo ພາສາລາວla Latinlv Latviešu valodalt Lietuvių kalbalb Lëtzebuergeschmk Македонски јазикmg Malagasyms Bahasa Melayuml മലയാളംmt Maltesemi Te Reo Māorimr मराठीmn Монголmy ဗမာစာne नेपालीno Norsk bokmålps پښتوfa فارسیpl Polskipt Portuguêspa ਪੰਜਾਬੀro Românăru Русскийsm Samoangd Gàidhligsr Српски језикst Sesothosn Shonasd سنڌيsi සිංහලsk Slovenčinasl Slovenščinaso Afsoomaalies Españolsu Basa Sundasw Kiswahilisv Svenskatg Тоҷикӣta தமிழ்te తెలుగుth ไทยtr Türkçeuk Українськаur اردوuz O‘zbekchavi Tiếng Việtcy Cymraegxh isiXhosayi יידישyo Yorùbázu Zulu

© 2021 Copyright - All rights reserved.

Welcome Back!

OR

Login to your account below

Forgotten Password? Sign Up

Create New Account!

OR

Fill the forms bellow to register

*By registering into our website, you agree to the Terms & Conditions and Privacy Policy.
All fields are required. Log In

Retrieve your password

Please enter your username or email address to reset your password.

Log In

Add New Playlist

This website uses cookies. By continuing to use this website you are giving consent to cookies being used. Visit our Privacy and Cookie Policy.