Professional Documents
Culture Documents
Unit 4 (Cybersecurity)
Unit 4 (Cybersecurity)
Plug your modem into the electrical outlet to power it on. If you have a
separate router, plug that in as well.
Plug one end of the coaxial cable carrying the Internet signal into the
back of your modem firmly for a cable modem setup.
Plug one end of the phone cord into the back of the modem for DSL
connections.
Connect another Ethernet cable between your router or combined
modem/router to the back of your laptop's Ethernet connection.
If you have a wireless router, skip this step. Your laptop will have only
one Ethernet port that fits the Ethernet cable.
Activate Bluetooth on your cell phone. Locate the Settings menu and set
the device to "Discoverable" or "On" to make it discoverable.
When the phone appears in the list of devices, double-click on the name
of the phone to pair it with your computer.
Write down the PIN number that appears on your computer and enter it
into the phone when prompted.
Wireless Broadband
Plug the wireless network card or modem into the PCMCIA port,
Express Card slot or USB port of your computer, depending on the type
of network device you received from your service provider.
Confirm that you accept the terms and conditions and begin browsing
the Internet.
PDA
Facebook needs to spend more time listening to its users. Although the
company realizes that it can’t always give in to users’ demands, it also needs to
realize that the users need to be happy with the way things are going. They
don’t want to have to deal with complicated privacy settings. They also don’t
want to have to worry about security when talking to friends. If Facebook
started listening to its users more often, it would have a much easier time
running its business.
Part of the reason Facebook is facing all this trouble today is its desire to
increase its bottom line through advertising. The company fully understands
that the more open profile information is, the easier it is to attract advertisers
that want to target a specific portion of its user base. Advertising revenue can
still be a key component in its revenue, but it can’t dedicate its operation to
that.
Currently, Facebook’s privacy features are quite good. They allow users to
control almost every facet of their profiles, including who can see the content
they or others share with friends. But they’re too difficult for the average,
novice Web user to find. And when they finally find those settings, there isn’t
enough information to help users adequately determine what to do with each
setting. That could be a serious problem.
Consumers might not care about how Facebook’s privacy and security controls
affect corporations, but the enterprise certainly does. Nowadays, more and more
people are accessing social networking sites from the office. Although they
don’t see the dangers of that, the IT staff does. It’s a constant struggle for IT
professionals to stay ahead of social network use. But if Facebook added
security controls designed specifically for IT administrators to use in their
operations, that would change everything. Not only would it make users who
want to be able to access social networks at work happy, it would make it easier
for companies to safeguard their networks if trouble erupts on the site.
In recent months, Facebook might have lost its way. It became too complacent,
believing that its success would continue indefinitely. It also figured that its
users wouldn’t care nearly as much about privacy as they actually do. It was a
mistake. Going forward, Facebook needs to remember that it has a
responsibility to keep its site secure. It also has a responsibility to keep its users’
privacy intact. If it can achieve both of those goals, everything will be fine.
4. E-mail security
Email security is a term for describing different procedures and
techniques for protecting email accounts, content, and communication
against unauthorized access, loss or compromise.
Email security is the process of ensuring the availability, integrity and
authenticity of email communications by protecting against the risk of
email threats.
Email is often used to spread malware, spam and phishing attacks.
Some of the proactive email security measures, from an end user’s
standpoint, include:
1. Strong passwords
2. Password rotations
3. Spam filters
4. Desktop-based anti-virus or anti-spam application
Email security best practices
While email is not secure by default, there are proactive best practices that
individuals and organizations can take to significantly improve email security,
including the following:
A virus is code that can damage your computer, system, and data by
copying itself.
Malware is used as a catch-all term for malicious software such as
spyware, ransomware, trojans, adware, worms, and viruses.
Malware is ever evolving whereas viruses have been around for a long
time and continue to stay generally the same.
AVG Business – AVG Business offers security tools geared to small business
security needs with software that automatically updates to keep your security up
to date always.
Keep up-to-date
Update your system, browser, and important apps regularly, taking advantage of
automatic updating when it's available. These updates can eliminate software
flaws that allow hackers to view your activity or steal information. Windows
Update is a service offered by Microsoft. It will download and install software
updates to the Microsoft Windows Operating System, Internet Explorer,
Outlook Express, and will also deliver security updates to you.
Antivirus software
Antivirus software protects your device from viruses that can destroy your data,
slow down or crash your device, or allow spammers to send email through your
account. Antivirus protection scans your files and your incoming email for
viruses, and then deletes anything malicious. You must keep your antivirus
software updated to cope with the latest "bugs" circulating the internet.
Antispyware software
Firewalls
Some operating systems have built-in firewalls that may be shipped in the "off"
mode. Be sure to turn your firewall on. To be effective, your firewall must be
set up properly and updated regularly. Check your online "Help" feature for
specific instructions.
Protect your devices and accounts from intruders by choosing passwords that
are hard to guess. Use strong passwords with at least eight characters, a
combination of letters, numbers and special characters.
Choose unique passwords for each online account you use: financial institution,
social media, or email. If you have too many passwords to remember, consider
using password manager software, which can help you create strong individual
passwords and keep them secure.
Many social media, email, and financial accounts allow the use of stronger
authentication methods. These methods can include using a fingerprint, one-
time codes sent to a mobile device, or other features that ensure a user is
supposed to have access to the account.
Phishing attacks where hackers send seemingly genuine messages to trick you
to hand over personal information are becoming more sophisticated. For
instance, you may receive an urgent message stating that your bank account has
been locked and requiring you to enter your password and Social Security
number to unlock it. Think twice before clicking on links in messages such as
this. Most genuine messages from financial institutions will not ask for personal
information directly, but will instead instruct you to call or visit a website
directly. You can also verify the email address that sent the message to ensure it
came from the expected sender.
Shop safely
When shopping online, check out the website before entering your credit card
number or other personal information. Read the privacy policy and look for
opportunities to opt out of information sharing.
Social media allows sharing of all aspects of life, but it's important to control
who has access to the information you share. Information thieves can use social
media postings to gather information and then use the information to hack into
other accounts or for identity theft.