Logo video2dn
  • Сохранить видео с ютуба
  • Категории
    • Музыка
    • Кино и Анимация
    • Автомобили
    • Животные
    • Спорт
    • Путешествия
    • Игры
    • Люди и Блоги
    • Юмор
    • Развлечения
    • Новости и Политика
    • Howto и Стиль
    • Diy своими руками
    • Образование
    • Наука и Технологии
    • Некоммерческие Организации
  • О сайте

Скачать или смотреть Security Aspects of Using the Internet | O Level Notes Computer science 2210

  • Notes Reel
  • 2022-05-14
  • 162
Security Aspects of Using the Internet | O Level Notes Computer science 2210
O Level NotesCSS NotesPMS NotesPPSCSPSCKPSCBPSCNotes ReelMatric NotesMatriculation NotesVideo NotesCambridgeGCE Ordinary LevelCSS ExamsBusiness StudiesManagement SciencesManagementAccounting and FinanceBankingOpportunity CostSelectionhrmhuman resource managementRecruitment and SelectingMarket ChangesBusiness marketingFundamentalsAssetsLabelBinary SystemsComputer scienceSecurityAspectsUsing the Internet
  • ok logo

Скачать Security Aspects of Using the Internet | O Level Notes Computer science 2210 бесплатно в качестве 4к (2к / 1080p)

У нас вы можете скачать бесплатно Security Aspects of Using the Internet | O Level Notes Computer science 2210 или посмотреть видео с ютуба в максимальном доступном качестве.

Для скачивания выберите вариант из формы ниже:

  • Информация по загрузке:

Cкачать музыку Security Aspects of Using the Internet | O Level Notes Computer science 2210 бесплатно в формате MP3:

Если иконки загрузки не отобразились, ПОЖАЛУЙСТА, НАЖМИТЕ ЗДЕСЬ или обновите страницу
Если у вас возникли трудности с загрузкой, пожалуйста, свяжитесь с нами по контактам, указанным в нижней части страницы.
Спасибо за использование сервиса video2dn.com

Описание к видео Security Aspects of Using the Internet | O Level Notes Computer science 2210

Security Concerns:

• The use of the internet has been increased dramatically over the past few years.

• People use it for communication, share files and use it to explore the pool of information available to them.

• With this increased usage the threats have also seen an uplift for the internet users worldwide e.g. spyware, Trojans, etc.

• These threats if encountered can corrupt data file, crash the system or can even breach your sensitive information like account details.

• Therefore, it is crucial to protect yourself from these malicious attacks and for this, some precautions must be taken by every internet user.

• Let’s see some security aspects:



Internet Confidentiality & Privacy:

• The Internet does not ensure your privacy and confidentiality in any major way. It should be your concern.

• Anonymizers, firewalls and sometimes encryption are used to reduce the risks.

• When it comes to the confidentiality and privacy you must keep the following considerations in mind:



Silent Communication & the Firewall:

• The internet connects you to the world, one disadvantage is there are also some infected computers and rogue actors who are on the lookout to find vulnerable machines to get control off.

• These silent communications are trackable fortunately because they are unsolicited and the difference can be easily identified e.g. the packets can be from a website that is unknown to you etc.

• To protect from this threat, ‘firewall’ is used i.e. a program that not only monitors but also traps these suspicious packets.

• But windows firewall traps only the incoming packets and leave the completely open access to the internet from your machine.

• The windows firewalls' weakness lets every program installed over your computer to contact its home company for updates automatically etc.

• However, to resolve this issue, a third-party firewall can also be used to monitor and trap both incoming & outgoing communications.



Your Surfing Track & Anonymizers:

• Websites track your surfing behavior over their sites and search engines build a record of your activities under your profile for this your IP address, internet network address, system names, etc. are used.

• Some advertising sites that are displaying their ads on different websites also use cookies to record your surfings on not only that site but also on future websites that you visit.



• To protect yourself from these trackings you can also set your browser settings to block cookies or you can use anonymizer to conceal your IP.



Posting Information Publicly:

• If you are posting or commenting anything to a public chat group, mailing list or discussion board then your information can be used even after several years.

• To protect this, always try to conceal your email address while posting and also try not to post any personal or sensitive information over there.



Never Ignore Privacy Policy:

• Websites that require you to set up your profile with personal information like date of birth, address, credit/debit card details can be approached by big companies to record your buying habits.

• While giving away your data, it is recommended to read carefully the privacy policy of the website to know what type of security the website promises you.

• Also, make sure the website uses an https link.



Information Interception:

• Information interception is another security concern.

• Entire communication/information/data that passes over the line near your home can be copied using direct physical interception, software taps or even radio frequency

• Interception over the copper lines is easier and uses inexpensive equipment.



• Fiber optic is difficult to intercept but it is also possible.

• The only way to protect your communication from interception is encryption.



Internet Risks Associated with Malware,

Including Viruses, Spyware, And Hacking



Hacking:

• It can be defined as the act of gaining control over your system illegally.

• If your system is hacked then the hacker can gain access to your information i.e. identity theft.

• The hacker will be able to delete, modify or corrupt your data.



Prevention:

• To protect yourself from hackers, use firewalls, strong ID/password, and anti-hacking software.

• Another term similar to hacking that you may come across is ‘cracking’.

• Hacking is breaking into the system while cracking involves the malicious modification of the program.



Viruses:

• Viruses make computer programs replicate itself again and again to corrupt or delete files.

• It creates a malfunction, corrupt files and the system often crashes down.

#Security #Aspects #Internet #Computerscience

Комментарии

Информация по комментариям в разработке

Похожие видео

  • О нас
  • Контакты
  • Отказ от ответственности - Disclaimer
  • Условия использования сайта - TOS
  • Политика конфиденциальности

video2dn Copyright © 2023 - 2025

Контакты для правообладателей [email protected]