Online Networking Case Study

Improved Essays
The purpose of this paper is to discuss the potential risk of connecting any computer to World Wide Web or any network. With they’re being many threats such as hackers and malicious virus’s; attacks are going to happen whether you’re an organization or just an online shopper. In this day and age it is more often that a security breach is most likely to happen on a personal computer than at a company because the home user is not as secure and the average user is not as “computer savvy”. With that being the case, by the end of this paper I hope to show the end-user simple techniques to help secure their network.
Starting with the first step the router, many people use it as the instructions say, “plug and play”. As we think the router should
…show more content…
Equipped with a location and telephone number one individual can do a lot of harm. In terms of online networking you truly need to be mindful of whom it is your corresponding with and you ought to never convey any individual data or photos.
There are a couple of diverse steps you can use to verify none of your data is stolen, whether it is your machine getting hacked into due to poor security or whether it is a result of absence of attention to the dangers of online networking. Verify you have a decent encryption on your machine, upgrade your passwords routinely and never store them on your machine. I make it a propensity to never click the container that states to "spare your secret word" just in light of the fact that any individual who hacks in has prepared access to all your data.
To be persistent in your computers security and you interpersonal interaction security in conjunction with your system switch encryption verify you have an overhauled against infection, make beyond any doubt you hostile to malware is upgraded since it will get what your against infection will miss and finally, on the off chance that you don 't have an inherent firewall verify you get out there and get one today! Not everything recorded here will guarantee that you never get hacked or have an unnecessary interruption however it will help clients and keep you from being utilized as a bot or an initial point of criminal

Related Documents

  • Improved Essays

    Another way to prevent identity theft is by making sure the web page you’re purchasing an item from or putting your personal information on has a little lock symbol in the web search bar. This lets you know you’re on a secure and legit page that will protect all your information. Also do not make purchases from websites that advertise the ‘too good to be true’ specials. These websites are usually scams that make you enter your information and then say something like ‘sorry, this webpage is unavailable’ or something to that effect. Never make purchases from a site that you’ve never been on.…

    • 1031 Words
    • 5 Pages
    Improved Essays
  • Superior Essays

    Computers are a valuable tool, but they are not a filing cabinet. The opposition is not just a couple people in the U.S. however, nearly every American that owns a computer has at least some personal information stored in their non-trusty computers. We need to realize we do not possess the technology to keep these hackers out of our beeswax. The only way to stop our information from being stolen is to remove it from your computer, because once it is in there it is gone in a blink of an…

    • 1796 Words
    • 7 Pages
    Superior Essays
  • Great Essays

    Desert Safari Essay

    • 1834 Words
    • 8 Pages

    Considering that you most probably log in to your computer as administrator, it would take just a few seconds for someone to install some form of spyware or malware that is designed to evade detection by popular antivirus software. One good way to avoid becoming a victim is to lock your device with a password when you are away from it. 2. Use a virtual private network (VPN) when connecting to Wi-Fi. A primary concern of security-conscious users is having an intruder spy on your online activities and becoming a target for phishing attacks or hijacked connections.…

    • 1834 Words
    • 8 Pages
    Great Essays
  • Improved Essays

    Passwords are another important concept to consider when thinking about computer crime. It is important to not use the same password for everything [2]. It is also very critical that passwords are never shared with others. Passwords are meant to be confidential and should never be shared. Passwords should not be something simple that are easily guessable.…

    • 1873 Words
    • 8 Pages
    Improved Essays
  • Improved Essays

    Cybercrime: The increasing access to and subsequent use of technology has dramatically impacted the way in which people communicate and conduct their daily lives. The internet for example connects people and companies from opposite sides of the world quickly, easily, and relatively cheaply. However, the internet and computer can be used in negative ways, which can have destructive impact on societies. Cybercrime is a threat against different organisations and people who computers connected to the internet and particularly mobile technology. Cybercrime can be defined as a type of crime committed by cybercriminals who use a computer as a tool and the internet as a connection in order to reach a variety of objectives such as fraud, illegal downloading…

    • 1448 Words
    • 6 Pages
    Improved Essays
  • Improved Essays

    In regards to personal activities, Cook states, “we have used encryption to protect our customers’ personal data because we believe it’s the only way to keep their information safe. We have even put that data out of our own reach, because we believe the contents of your iPhone are none of our business”. Cook obviously believes that everyone is entitled to their own privacy and that nothing should invade it. This is supported by his corporation going to the extent of preventing themselves from accessing the data of their users. As technology continues to envelop our lives, people continue to put more information about themselves on the internet.…

    • 1482 Words
    • 6 Pages
    Improved Essays
  • Superior Essays

    Without proper probable cause, there is no reason to surveilling innocent citizens. Which is why there need to be stricter regulations on NSA employees and what they’re allowed to access. If someone is trying to hide something, digital evidence plays a key role. Secrets never stay a secret because someone or something out there knows the truth. Orwell said it best in 1984, “If you want to keep a secret, you must also hide it from yourself…(37)”.…

    • 1027 Words
    • 5 Pages
    Superior Essays
  • Improved Essays

    Computer Viruses Research

    • 2066 Words
    • 9 Pages

    The way to prevent phishing is not to open any spam mails unless you are hundred percent sure it is not a junk mail. Also, when you get an email on confirming any information, do not use the link in the email. Type it on Google and go to the official website and then confirm the information if…

    • 2066 Words
    • 9 Pages
    Improved Essays
  • Improved Essays

    An Intrusion Detection System (IDS) alert any intrusion attempts to the security administrator while the firewall generally will not. They both can succumb to false positive. These false positives, or warning patterns don't really show an attack but because of a rule that is already in place if something is written ambiguously it may get flag as an intrusion (Writer, 2013). While it is not needed to have both/neither on a system they are consider the first and last line of defense for a computer network and should be use as such to keep the user…

    • 711 Words
    • 3 Pages
    Improved Essays
  • Superior Essays

    Anytime we can add a layer of security to protect your information, and we ensure SDKs will be the harder for hackers to access that information. No persistent sessions By eliminating persistent sessions, we can make it very difficult for an attacker to establish a beachhead in your organization. Because they do not have endless amounts of time to strategize paths to our IP. Use VPN instead of public Wi-Fi The biggest security threat is interfacing our devices to the public Internet or deploying any software to the public Internet. As we know, there are mainly four techniques of VPN to secure the data: Tunneling, Encryption & Decryption, Key Management…

    • 1105 Words
    • 5 Pages
    Superior Essays