The population of Internet users is expanding year by year, and it is now use for various purposes. Along with this, the damage and troubles of crimes related to the Internet are increasing. Here, we will inform you about the basic knowledge of Internet security so that you will not suffer from these damages.
What is Internet Security?
Byconnecting your computer to the Internet, you can view various homepages around the world and easily exchange information with people you have never met. While this is very convenient, it also involves the risk of connecting with a malicious third party, receiving unsolicited information, malicious programs, or stealing your information. It is also true that people on the other side of the network are vulnerable to fraud because it is difficult to identify them. When using the Internet, you should always remember this danger and take measures to prevent damage.
What are the threats to using the Internet?
There are various threats on the Internet, and it is important to understand the specific dangers in order to deal with them. For example, viruses, worms, and Trojan horses are security threats. Viruses are special programs that are install in e-mails and homepages. It is also called malware. The damage caused by viruses includes those that only display messages and images on the screen of a PC, and those that destroy the data stored on the hard disk. Worms are a type of malware that finds network vulnerabilities and penetrates inside your computer. It overloads the system and sends self-replicating emails to the outside without permission, leading to information leakage.
What is damage?
The damages caused by using the Internet are as follows. These are called “attacks” by malicious third parties, and they can be used to steal information and misuse it by exploiting weaknesses in software to cause unauthorized behavior, or by taking advantage of the lack of alertness of users. It is something to do. Correct knowledge and countermeasures are required to prevent these.
What is a computer virus?
A program invades a computer without permission (infection), repeats replication (proliferation), and does nothing for a while (latent), but is executed (onset) under certain conditions. It’s called this because it resembles a virus in the biological world, but in reality it’s mostly an annoying program created by malicious users on the Internet to show off their technology. is. Most of the infection routes are via email attachments or access to homepages. The details of the damage are various, and if the files stored on the computer are destroy, a large number of emails are sent without permission, or if it becomes malicious, the system may even be destroyed.
If the sender is not clear in the email sent, or if the title is an alphabetic character, an incomprehensible character string, a blank, etc. even from a person you know, it may be an email with a virus.
|Attachments will not open||You may be infect with a virus by opening the file.|
|Don’t click the URL||Unwanted programs may be download from the reference destination without permission, which is extremely dangerous.|
|Do not reply||By replying, you will tell the other party that you are using the email address. In addition, there is a risk that personal information will be leak from the signature.|
|Consider using antivirus software||Even with the above points in mind, it is often difficult to completely prevent recent malicious viruses. It is also effective to use antivirus tools provided by providers and manufacturers.|
Leakage of personal information
When using the Internet, there are many opportunities to enter personal information through online shopping and bulletin boards. At this time, if the entered information is misused and junk mail or direct mail is sent, or if the credit card number, user ID or password is stolen, there is a risk of financial damage. In addition, there are homepages on the Internet that have traps for illegally collecting personal information and dangerous homepages that change browser settings without permission.
Please note the following points when using online shopping or auctions.
|Uses encryption mechanism by a third party||Since the information being transmit is encrypt and there is no risk of eavesdropping, and the company information used when using the encryption mechanism is register with a third party, it is unlikely that it is a fictitious company. Become.|
|A well-known company with a proven track record in online shopping||Determine if a socially credible company provides the service, and make sure that shipping and handling, return methods, billing methods, handling of personal information, etc. are clearly stated.|
|Change your password regularly||User IDs and passwords are important information to prove yourself on the Internet. Avoid using passwords that can be easily guess, such as date of birth, and change them regularly in case of leakage.|
|Do not browse suspicious homepages||Adult sites of unknown origin or sites that try to download unintelligible files may have malicious traps in place.|
In Internet shopping and auctions, there are many reports of fraudulent damages such as even though the product price is paid in advance, the product does not arrive no matter how long you wait, and you cannot contact the other party. In Internet shopping, etc., avoid dealing with a partner whose contact information is not clear, and in the unlikely event of damage, do not fall asleep and prepare e-mails and documents certifying payment when dealing with the other party.
Fictitious billing email
Indiscriminate billing emails that you do not remember may be sent. If you do not pay, you may have threatening complaints such as “charge late fees, collect”, but you do not have to send money at all.
Let us protect the information firmly with thorough measures!
Information is a valuable asset for businesses. Therefore, many people want this kind of information. Take strong security measures and protect them firmly.