Главная Случайная страница


Полезное:

Как сделать разговор полезным и приятным Как сделать объемную звезду своими руками Как сделать то, что делать не хочется? Как сделать погремушку Как сделать так чтобы женщины сами знакомились с вами Как сделать идею коммерческой Как сделать хорошую растяжку ног? Как сделать наш разум здоровым? Как сделать, чтобы люди обманывали меньше Вопрос 4. Как сделать так, чтобы вас уважали и ценили? Как сделать лучше себе и другим людям Как сделать свидание интересным?


Категории:

АрхитектураАстрономияБиологияГеографияГеологияИнформатикаИскусствоИсторияКулинарияКультураМаркетингМатематикаМедицинаМенеджментОхрана трудаПравоПроизводствоПсихологияРелигияСоциологияСпортТехникаФизикаФилософияХимияЭкологияЭкономикаЭлектроника






Internet Threat and Ways to Escape





The Internet is a powerful medium that allows millions of users to chat, play games, download music, gather important information, and perform other various activities. All this has made the Internet an indispensable part of our daily lives. Although the Internet is useful, it also puts our personal and confidential information at substantial risk. This article lists the most common threats that exist when using the Internet. Although you might think you will never face these threats it is clear that everyone should be aware of them.

 

1. Suspicious E-Mail with attachments.

A report says that 90% of messages are spam messages. If you receive a suspicious e-mail from a stranger or even from your friend remember to be cautious with the attachment files. You all heard about lottery scam these days. It is unexpected email with notification “You have won!!” It asks you to contact agent for details. After contacting the agent, the target of the scams will be asked you to pay “processing fees” or “transfer charges” so that winnings can be distributed, but will never receive any lottery payment. It is wise not to believe such lottery E-Mail.

If the language used in the message is not normal, it contains a lot of spelling errors, or the message is written by foreign language, it is wise not to open the attachment file. It can be a spam message sent by a virus or even someone trying to get you runs a program in order to gain access to your computer. 95 percent of these files have the extensions of.pif,.scr,.exe,.com,.vbs,.bat,.cmd or.hta and users should immediately delete any such files without running them, unless they are explicitly aware of their origin and purpose.

Installing anti-malware software and using it to scan even trusted file types is essential, although it cannot guarantee 100 percent protection against such threats.

If you are not sure that the attached file is safe it’s a good idea to send a reply and ask more info about it. If the message is clearly pure spam – which can be usually determined just by looking at the subject of the message – just ignore it and delete the message without even opening it.

 

2. Social network attacks are a serious cyber security threat due to the popularity of social networks, which users can access not only by computer, but also by mobile phone.

”The more personal information you put out, the easier hackers can reach you,”

Hackers use new techniques called ”intelligence information gathering”, which is more advanced than searching by Google, to carry out targeted attacks. Hackers use software that can link to the back-office of Facebook and Twitter and can search in-depth information from web servers. Many users also don’t know that the information they publish on social networks is easily searched by Google. Users must use social network programs conscientiously and avoid unnecessarily publishing any sensitive or personal information.

 

How to protect yourself from social engineers:

a) Be careful not to disclose information to someone you don’t know over the phone, through email, or when using the Internet.

b) Don’t share personal information through Internet chat rooms.

c) Understand how information will be used before sharing it with merchants.

d) Don’t include your Account Number, Passport details or other personal information on requests.

 

3) Communication.

Internet is a great medium for being in touch with people. And just like you do in your normal everyday life you should pay attention to who are you giving your personal information. You should pay perhaps even more attention since you can’t tell anything about the other person as you do in real life eye-to-eye situation. Anyone can pretend to be anything in the Internet. If you are going to meet someone you’ve met online, you would like to do it in a public place.

These are the most common risks almost everyone will face when using the Net. Even if you don’t run into any of these threats it is important to realize that they exist.

 

4) Automatically downloading programs.

 

Some websites try to install programs or add-ons to your computer. Usually you will be prompted by a window asking rights to the installation. A good rule of thumb is to always decline the installation. If the web site is hosted by some big and trusted company you can rely on it is okay to install the software. However, you should always pay careful attention to what you install to your computer.


 

5) Fake pages.

These pages are made for pretending to be something they are not. User may receive a fake e-mail with a link to a page that looks just like an authentic webpage of some service he/she is using. The user is tricked to enter the fake page and when he/she enters the confidential information e.g. username and password, the data is not send where the user supposes it is, but instead collected and afterwards used for illegal purposes.

 

6. Misleading popup windows.

 

A popup window is a window that pops up in front of the other windows when you are browsing the web. Because of their great visibility popup windows have become a common way to show advertisements in the Internet. You should avoid popup windows. In some messages user may be showed an official-looking window announcing the user’s computer is infected by a virus or an ultra colorful blinking message telling they have just won a million dollars. These are nothing but blatant lies. If you click one of those messages it is most likely that you are brought to a webpage that tries to install some software, very likely containing some nasty things such as adware or spyware.

 

Ways you can protect yourself from viruses, worms and trojans:

a) Purchase or install free Anti-Virus software and update it daily before checking your email.

b) Obtain all Microsoft security updates.

c) Be SUSPICIOUS.

d) Do not open ANY unexpected email attachments.

e) Do not download or install unauthorized software.

f) Do not leave a Pen Drive in the floppy disk drive when you shut down or restart the computer. Write-protect your floppy disks after you have finished writing to them.

g) Verify that the author of the email has sent the attachments. Newer viruses can send email messages that appear to be from people you know or sites you routinely visit.

In conclusion, the Internet is full of useful material but this comes at a risk. It is important to develop safe surfing habits and a strong security plan before connecting to and utilizing the Internet.

COMPREHENSION







Date: 2015-09-26; view: 307; Нарушение авторских прав



mydocx.ru - 2015-2024 year. (0.007 sec.) Все материалы представленные на сайте исключительно с целью ознакомления читателями и не преследуют коммерческих целей или нарушение авторских прав - Пожаловаться на публикацию