Cyber Security
What
is Cyber Security?
The Cyber Security refers to the safe
and responsible use of Internet so as to ensure security of personal
information and not posing threat to anyone else information.
How
to Safely Browsing the Web?
Nowadays working on web has become really
very inevitable and thus it is very important to know the threats it offers in
many ways. You need to know that not every site is 100% safe to visit. Whatever
you post online is visible to others and they can misuse them. Safeguarding
your computer is very crucial before you go online. And there are other things
that you must know so that you can counter or face unknown dangers.
How
to Identify Protection While Using
Internet?
All of us surf the Internet for a
variety of reasons like using social media, buying and selling goods etc. and
many more. When we give out our private data to businesses and other Internet
users like while filling forms or making payment etc. we trust them to use that
information for legitimate purposes.
This is not always the case though and
financial and personal data can be used for harmful reasons like hacking,
stalking, and identify fraud. Identify fraud is when personal details that have
accessed or stolen are used to commit fraudulent acts posing as someone else
with stolen identity.
The most common solution to this is
using private browsing or Anonymous Browsing on Internet.
The
ways how Website Tracks you:-
Tracking is generally used by
advertising networks to build up detailed profiles for pinpoint ad-targeting
even tracking down users for special purpose such as affecting their political
choices. And then recall the Data tracking reported in US elections, Brazil
elections and much more.
The type of information is compiled
through your web page usage patterns for tracking you. This includes:
- IP Address – IP Address is a unique address of your device when you connect to Internet.
- Cookies and Tracking Scripts – Cookies are small pieces of information websites can store4 in your browser. It can be First party cookies, Third party cookies.
- HTTP Referrer – When you click the link your browser loads the web page linked to it and tells the website where you came from.
- Super Cookies – Super cookies are also cookies but these are persistent cookies i.e. they come back even after you delete them.
- User Agent – This tells websites your browser and operating system, providing another piece of data that can be stored and used to target ads.
Private
Browsing:-
There are many others ways to use the
Internet without revealing your search history and sharing your data. These
are:- Incognito browsing
- Proxy
- Virtual Private Network (VPN)
What
is Confidentiality of Information?
Internet is a public platform. The sites
you visit, the things you search on it, the post that you put on social
networking sites are visible to public means all. But there must be some
details like bank details, your mails etc. which you don’t want to make public.
Therefore you want to make them confidential. Confidentiality of information
ensures that only authorized users get access to sensitive and protected Data.
Some
practices to ensure Confidentiality of Information:-
Best practices used to ensure
confidentiality are as follows:
- Use firewall wherever possible
- Control browsers setting to block tracking
- Browse privately wherever possible
- Be careful while posting on Internet
- Ensure safe sites while entering crucial information
- Carefully handle emails
- Do not give sensitive information on wireless networks
- Avoid using public computers:
- Browse privately
- Do not save your login details
- Never save passwords while using public computer
- Disable feature that store passwords
- Properly logout before leaving public computer
- Clear history and cookies
What
is Cyber Crime?
Cybercrime refers to any criminal
offense that is facilitated by, or involves the use of electronic
communications or information system, including any electronic devices,
computer, or the Internet.
What
Is Cyber Trolls?
Cyber trolls refer to derogatory
messages or comments posted online targeting people are called Cyber trolls.
What
is Cyber Bullying?
Harassing, demeaning, embarrassing,
defaming or intimidating someone using modern technologies like Internet, cell
phones, instant messengers, social networks etc. is called Cyber Bullying.
What
is Cyber Stalking?
This is kind of online harassment
wherein the victim is subjected to a barrage of online massages and emails.
Cyber stalkers often do this to trouble
their victims:
- They collect all personal information about the victim such as name, family background, telephone numbers, date of birth etc.
- The stalker may post this information on any illegal websites posting as if the victim is posting this information.
- Some stalkers keep on sending repeated e-mails asking for various kinds of favors or threaten to victim.
- Stalkers will almost always make contact with their victims through email having friendly or threatening content.
Common
Social Networking Sites:-
A Social networking site is a web
application or online platform where people can setup their public profile and
communicate with other online people all over the world.
Pythonpedia |
There are many social networking sites
but some and popular networks are:
- Facebook
- Twitter
- Instagram
- Hike
- Skype
And many more …….
Some
usages rules you should follow while using social media:-
While using social media you should
follow some rules which are given bellow:
- Be Authentic
- Use a Disclaimer
- Don’t Pick Fights Online
- Don’t Use Fake Names
- Don’t Use Fake Pseudonyms
- Protect Your Identity
- Respect Your Audience
- Respect Others Sentiments
- Monitor Comments
-Thank
you
I think this is an informative post and it is very useful and knowledgeable. therefore, I would like to thank you for the efforts you have made in writing this article. Spear Phishing
ReplyDeleteThis is my first time visit to your blog and I am very interested in the articles that you serve. Provide enough knowledge for me. Thank you for sharing useful and don't forget, keep sharing useful info: Cyber security in west texas
ReplyDelete