Friday, November 29, 2013

Communication and Security: Protect Yourself!

Securing your computer is like protecting your house. Imagine if someone breaks into your property and steals your belongings. In computer world, you could be hacked into. That is where cyber security comes to your rescue and protects your property. Cyber security (or computer security) is the protection of computing systems and networks for individuals, families, governments, businesses, and educational institutions. Similar to my hacking post, “Hacking: Hackers and Crackers,” your computer would be hacked if cyber security does not exist. In this post, I will enlist the risks that you need to take precaution against and realize that cyber security is important to you. For more information on this topic, you can also go to “Cybersecurity: Everyone’s Responsibility” on www.cisco.com.

Every individual who owns a computer needs to recognize the risks that exist in the cyber world. Taking care of our personal information responsibly is the key to computer security. Below, I will be listing some risks that exist in the cyber world and some actions that we as computer users must take.

Phishing: Fraudsters gain access to our personal and financial information by one wrong click made on our side. Those malicious soliciting emails that we get, which seem to be from reputable sources are actually baits. When we click and open those emails, if we provide our emails, these fraudsters will gain access to our accounts. How should we prevent it? The answer would be to never open messages or attachments from people or sources you do not know.

Spyware: Two key elements one must know about spyware as: 1) They download themselves themselves without permission and 2) they take control of your computer.

Dell provides the following steps for us to protect ourselves from spyware:
    1. “Adjust your browser security settings for your Internet zone”
    2. “Practice your safe web-surfing habits and download cautiously”
    3. “Install and use anti-spyware software”
    4. “Install a firewall with outbound pattern”

Password protection: Create difficult multi-letter, multi-number, and multi-character passwords. Change your passwords regularly and don’t make them easy to guess, such as your name or date of birth.

Social media: Do not compromise your identity or safety by spilling your information on a social media website.

Plan Ahead: Store all of your records on an external hard drive. This will assure safety for your credit and school records, family photos, and business information.

The five steps mentioned above are like a lock to your house or car. As for your computer, you have to either log off or change your password to keep your data safe. Cyber security is always there to keep you from danger in your computer system! Use it!


References

1) “Cybersecurity: Everyone’s Responsibility.” Cisco. 2010. Web. 25 Nov. 2013. <http://www.cisco.com/web/strategy/docs/education/C45-626825-00_Cyber_Security_Responsibility_AAG.pdf>

2) “Cyber Security.” Zen Internet. 2013. Web. 26 Nov. 2013. <http://www.zen.co.uk/blog/cyber-security/>

3) “Prevent Spyware.” Dell. 2013. Web. 27 Nov. 2013. <http://support.dell.com/support/topics/global.aspx/support/security/security_spyware_help?c=us&l=en&s=gen&~mode=popup&DoNotRedirect=y#WhatCanIDotoPreventMyComputerfromGettingInfectedwithSpyware?>

2 comments:

  1. Mari,
    Excellent blog post!
    I like your overall theme and the concern you portray throughout the blog. Cyber security is a big deal, and your blog effectively demonstrates the needs and possible measures one can take to protect their cyber life. the link and tips from Cisco are noteworthy too!
    Good job!

    ReplyDelete
  2. Hi Mari,
    Since this is the first time reviewing a post let me commend you on the clean layout of the blog ! On to the blog topic, I think that the topic was to explain more about security when communicating over the computer. However, I guess it is open to more than one interpretation. You have researched your topic well before writing it. Additionally you have structured your post well. I would like to mention that a bit of the content in Phishing is unclear, however the rest of the post is accurate and raises the necessary important issues for your interpretation of the topic.
    Good work!

    ReplyDelete