Skip to main content

Internet Safety



Internet Safety

In this article we would discuss the term internet safety. We would tell you about the threats you face while you are connected to the internet, the type and severity of these threats, how these threats can harm you, your privacy and your computer and in the end what measures you should take to overcome these challenges, ensure internet safety and protect yourself and your computer from these threats.
Today internet connects billions of computer world wide and it had become a personification of the real world. You can meet people, chat, play, shop, do business, watch movies, meet friends and study using an internet. But the bad news is, by personifying or making its self an extension of the real world, internet became vulnerable to the threats we face in the real world, which means your internet safety is at stake. Today it’s a reality that we face serious threats like identity theft, fraud, etc on internet. It is an ironic fact that the activities that you think are productive for you like sharing information, doing research, sending instant messages and emailing are the ones that make your internet infrastructure more vulnerable and fragile. Each time you turn on your computer and connect to the internet, you face multiple threats from cyber criminals. According to computer Economics “New security threats such as web attacks, spyware, malicious mobile code, and phishing cost organizations worldwide an estimated $16.7 billion by the close of the year 2004.”
Based on recent research and analysis the internet safety threats that we face today on internet are listed below:
1.      Malicious programs
2.      Spying
3.      Hacking
4.      Identity fraud
5.      Denial of Service Attacks
6.      Phishing
7.      Spam
8.      Pornographic content

Malicious Programs:

Malicious programs can be further divided into viruses, Trojans, rootkits and worms. The basic purpose of these programs is to disrupt the normal functionality of computer by reprogramming its features and forcing the system to act in a way not facilitated by the administrator or the legal owner. These programs find their way to the system via email attachments and downloads. Extreme care therefore should be taken while downloading files from internet. We must use a standard and good quality antivirus to protect our computer from malicious programs. Firewall also help us protect internet safety from these programs.

Spying:

Spywares and adware are used as spying tools. Keyloggers are also used to obtain confidential information such as passwords, login ids and pin numbers that are stored in our computer. A good quality anti spyware program must be used and all attachments must be verified and checked by an antivirus program before downloading to ensure internet safety. Computers must be protected by passwords. Intrusion detection software must be used.

Hacking:

Hacking comprises one of the most serious threats that we face on internet. Hackers get into our computers by sending malicious code or spywares. These programs are engineered to transfer the control of our system to the prospective hacker. That person than in turn use the victim’s computer for cyber crime. Extreme care must be taken while downloading files from internet. Some websites also act as ‘traps’, by visiting these websites the malicious code automatically gets installed in computer. Good antivirus, firewall and intrusion detection software can help us protect our computers from hackers.

Identity fraud:

Identity theft or identity fraud means somebody steals your id and password and then uses your id and passwords for illegal purposes. Strong passwords and anti spyware programs can protect you from Identity fraud. Encryption must be used while transferring confidential information to guarantee internet safety.

Denial Of Service Attacks:

Denial of service attack or distributed denial of service attacks are generally targeted at websites and servers. The basic purpose of these attacks is to knock off a website or server and made it unavailable for its intended users. The attacker uses a host of computers called bots to send multiple ping requests to the server, eventually knocking it offline due to large volume of requests.

Phishing:

Phishing is the process of gaining confidential and valuable information by camouflaging a fake website to look like a trustworthy or authentic website. Users are lured via instant messaging or email to enter confidential information to a fake site that looks exactly like the original one. This information then can be used to harm the users. To protect yourself from phishing you must verify the authenticity of website before entering your personal information by checking the certificate and looking for the SSL connection symbol.

Spam:

Spam means use of electronic networks like instant messaging and email to send unsolicited bulks of information to multiple users indiscriminately.  According to European Union Internal Market commission junk email and spam cost internet users 10 billion Euros every year. Spam also consumes the email service resources and is a waste of time for everyone making it a threat for internet safety and your computer.

Pornographic Content:

Pornographic content is extremely harmful for children. The websites containing pornographic material are also main cause of spreading malicious programs which can damage your computers and put internet safety at stake. By using parental control features found in antivirus programs and operating systems we can block access to these websites and protect our computers.

Comments

Popular posts from this blog

How to turn off Ringbacks on Rogers

Rogers just update you to the latest iPhone value pack, or figure out some other way to stick you with their ringbacks service, and you’re desperate to find out how to turn it off? They don’t want to make it easy — they want you to pay money for more Ringbacks — but after over an hour of waiting on 3 different customer service and tech support reps, I got the answer. Here it is: From your Rogers iPhone, text 555 with the word OFF. You’ll get an autoreponder with a link to http://rogers.com/ringbacksoff Tap the link. You need to be on Rogers’ network (i.e. not Wi-Fi) to access this page! Scroll down to the bottom and turn OFF both Ringbacks and Voice Greetings. (Yes, Ringbacks are so annoying they require and additionally annoying Voice Greeting to beg the people who call you not to hang up while they’re annoyed by the Ringback.) Rogers tried to get me to give Ringbacks a chance, saying if I loved the Beatles and my friends new I loved the Beatles, I could entertain them w...

How to Reload Operating System on Nuked or Bricked BlackBerry

Good Afternoon Class! I’ve been a bit slack in my  BlackBerry 101  lectures as of late – I blame the  Smartphone Round Robin , all the  Contests  we’ve been running on the site and the busy Holiday Season. My apologies! This will be the last 101 lecture of the year… but we’ll be back in 2008 bigger and better than ever. Today’s lecture isn’t really a “newbie” topic, but it’s one that I wanted to cover because in the past three weeks I’ve gone through it half a dozen times and that is  Reloading the Operating System on a BlackBerry that’s totally “Nuked” . I’m not sure if nuked is the technically appropriate word for it (I also use one that starts with an F and ends in an ED and has a CK in the middle), but it is how I refer to a BlackBerry that is stuck in a permanent reboot cycle and is completely, completely unusable. With a Nuked Berry, essentially the device turns on (red LED comes on for a few seconds), then you see the white screen with the hou...

Best Ipad and Iphone Photography Apps

Longtime Exposure Calculator Price: Free/ Available for iPhone, iPod touch, iPad Long-exposure photography fanatics will know that an ND filter can be essential when it comes to extending exposure time for those all-important open shutter shots. Longtime Exposure Calculator by HPR-Solutions is a free iPhone,iPad and iPod touch app that enables you to dial in a projected shutter speed to one column and then 'add' an ND filter as graded in both f/stops and filter names (eg 3 stop or ND8) in the other column. The app then calculates the adjusted exposure. While it is, in part, possible to TTL meter with an ND filter attached to the front of a camera's lens, the results won't always be accurate, and there's a point where things get so dark that it's not possible - especially with in-vogue super-dense filters. Having an off-camera calculation method such as this makes it quick and easy to figure out exposures without so much as needing to put those brain...