What are the Internet security threats?
Due to growth in Internet usage, data sent over the Internet from personal e-mail message to online shopping order or banking transaction has been increased. As a result hackers have opportunities to track the information. The threats impact the network, data security and other Internet connected systems.
Following are some of the Internet security threats:
- Mobile Worms
- Malware
- PC and Mobile ransomware
- Large scale attacks to destroy infrastructure
- Hacking
- Spam
- Phishing
--------------------------------------------------
--------------------------------------------------
What are the Best Practices for Internet Security?
1) Use strong password
Using strong password reduces the risk of the security threats. A combination of alphanumeric and special characters could be used for creating a password, since it is not so easy to crack by other users. It is advised to avoid obvious choices like your favorite color, date of birth, best friends or parents name, pet name etc. These passwords are easy to guess if a user knows you personally.
2) Do not share personal information
Websites require you to fill out forms with fields such as name gender, age, email address, school etc. You should be cautious when filling out online forms. Don’t give your personal information such as your password, bank or card details.
3) Use Antivirus Software
Computers are prone to attacks from malware such as virus, worm, Trojan horse, ransomware or spyware that could hard the computer. Malware track browsing behavior or transmit personal data from your computer: such as keyloggers could be installed on your computer track and transmit every key that is pressed on a keyboard.
4) Update Antivirus Regularly
New viruses are coming out all the time. It is the job of the antivirus software to keep up with the latest threats. So, keep your Antivirus and Anti spyware software always up to date, this can help in protecting your from all types of malware threats.
5) Use data encryption software
You will not
want your data to go into wrong hands, so make sure your data is encrypted. Data
encryption software is usually available within the operating system to protect
your data from unauthorized users. If it is not available in operating system,
you may use third-party software.
Chapter 1 – Digital Documentation
Chapter 2– Electronic Spreadsheet
Chapter 3 – Database Management System
Chapter 4 –Web Application
--------------------------------------------------
6) Install Firewalls
Firewalls can be implemented as both hardware and software. Network firewalls are used to prevent unauthorized Internet users from accessing private network connected to the Internet. firewalls is primarily a security measure, forming a virtual checkpoint to protect computers and other network devices from attacks.
7) Regularly update Operating System (OS) and Application Software (AS)
Keep the OS and AS up to date and free from security holes. However, OS and AS are designed, tested and distributed sometimes they may have security holes through which a hacker can take advantage.
8) Registering with Websites
You must read the privacy statement or policy whenever you register with a website, the statement or policy will include information about how the website use personal data.
Chapter 1 – Digital Documentation
Chapter 2– Electronic Spreadsheet
Chapter 3 – Database Management System
Chapter 4 –Web Application
9) Secure Transactions
If you are engaged in e-commerce are most vulnerable to Internet security threats. Websites may store your credit card or online banking personal information such as your credit card number, account details. This information can be easily tracked and used by hackers. Make sure that the website is authentic and uses secure practices for performing and maintaining online transactions.
10) Do not respond to mails from unknown accounts
It may be a fake mail trying to gather personal information such as your bank details, home address. At other times some mails could promise you jobs or announce lottery which in turn could be a Trojan horse in the moment of excitement you may click the link and invite malware to destroy the system.
11) Never install software from unknown sources
An internet user can be tricked into downloading software that can be a malware. Don’t download or use pirated software.
--------------------------------------------------
Sample Paper of Class 10 IT 402
CBSE Class 10 IT (402) Sample Paper
- IT (402) Sample Paper 2020 - 21
- IT (402) Sample Paper 2021 - 22
- IT (402) Sample Paper 2021 - 22
- IT (402) Sample Paper 2022 - 23
12) Scan portable devices before use
Pen drives and external storage devices are used to transfer data from one system to another, but it has been observed that they become the common source as carrier of infection of computers. The antivirus should scan the portable devices automatically every time.
13) Clear browser cookies frequently
Cookies (also called Internet cookies) are programs that are created on your local computer when you visit website. Thought cookies store data based on your activity during your visit, but it can be tracked by unauthorized users. Microsoft, Google and Firefox are implementing do-not-track features into their browsers.
14) Clearing Data stored in browser
Web browsers have built-in password management designed to store password. You may have noticed that the browsers often prompt to save username and password when users attempt to logon to website. So users should clear their data from browsers.
Sample Paper of Class 10
- English Sample Paper 2022 - 23
- Hindi A Sample Paper 2022 - 23
- Maths (Standard) Sample Paper 2022 - 23
- Maths (Basic) Sample Paper 2022 - 23
- Science Sample Paper 2022 - 23
- Social Science Sample Paper 2022 - 23
No comments:
Post a Comment