Internet Safe Practices

Internet Safe Practices

Making Safe Choices.

Introduction

Virtually no restrictions apply to what you can do online. Instant information access, international communication, and many other things are made possible by the Internet. Sadly, online threats like malware, spam, and phishing can also be found there. If you want to be secure online, you must be aware of these hazards and learn how to reduce them. We are frequently duped by computers into thinking we are secure. Ultimately, no one can physically injure you through a computer screen. But if you want to stay safe online, you should exercise extra caution. Or, to put it another way, think of the Internet as you would a shopping center. With this knowledge, let's start by discussing the internet of things.

What is the Internet?

Wikipedia describes the Internet as a collection of globally interconnected computer networks that use the TCP/IP protocol suite to exchange information. Private, public, academic, business, and government networks are connected using a wide range of electronic, wireless, and optical networking technologies, with local to international reach. One of the many information sources and services accessible on the Internet is the World Wide Web (WWW), composed of interconnected hypertext pages and applications. Other services and resources include electronic mail, phone service, file sharing, and phone service. According to Hobbes' Internet Timeline, the Soviet Union launched the first satellite into orbit in 1957. Wikpedia

What are the Internet Safe Practices?

The practice of following practical guidelines, understanding modern technology, and safely operating one's gadgets is known as internet safety practices. It aims to safeguard your electronics from the harmful elements of the online world. Understanding the internet, its content, uses, and functions are essential for practicing internet safety.

How to make safe choices?

The key to online safety is developing the ability to make wise decisions. These options consist of:

  1. Confirming a person's identity using reputable social media sites like Linkedin, Twitter, etc.
  2. Confirm the security of a link. (For links containing HTTP and HTTPS, the S in HTTPS denotes the use of a secure socket layer, which is effectively an additional layer of security that safeguards information by the website.
  3. Recognizing Online Fraud.
  4. Privacy protection.
  5. Recognizing online bullying.
  6. Making use of ad blockers.
  7. Using a Virtual Personal Network (VPN). The VPN creates a connection between a user's device and the proxy server.

How can safe online practices be implemented?

By using the suggestions below, any internet user can take safety precautions when using the internet and contribute to the protection of their equipment.

  1. Select a strong password by using a combination of symbols, alphanumeric keys, and alphabetic letters. Use separate passwords for different websites; strong does not necessarily equate to complex.
  2. You might want to enable two-factor authentication (2FA). The safest method to safeguard your account is 2FA. To approve access to your account on a mobile device, utilize Google Authenticator, Authy, and other authenticator apps.
  3. Configure your security and privacy settings.
  4. Adhere to safe account procedures.
  5. Be on the lookout for dubious websites and files.
  6. Never divulge any account details.
  7. Treat phishing with respect.
  8. Prevent using free WiFi. To check emails and other things, only use reputable, secure Wi-Fi.

Forms of Internet Attack.

Although there are many different internet attacks, malware and phishing are my main areas of interest. phishing-image-1.jpg

Malware

Any intrusive program created by cyber criminals (often referred to as "hackers") to steal data and harm or destroy computers and computer systems is referred to as malware, which is short for "malicious software." Malware types that are frequently encountered include worms, Trojan horses, spyware, adware, and ransomware. Credit: Malware The following are recommendations for keeping a computer system secure:

  1. Use an anti-malware program.
  2. Use your browser's pop-up blocker.
  3. Maintain PC updates. Software upgrades typically include security updates, which help stop malware assaults by plugging potential security gaps.
  4. Run regular PC scans.
  5. Make use of a reliable antivirus program.
Phishing

Phishing attacks are one of the most frequent security problems that people and businesses deal with while trying to protect their data. To steal sensitive data, such as credit card numbers, passwords, and other private information, hackers employ email, social media, phone calls, and any other available communication method. Businesses are obviously a particularly worthwhile target. Attackers use a variety of phishing methods, including:

  1. Putting a link in an email that directs you to a dangerous website and requests personal data
  2. Installing a Trojan through a malicious email attachment or advertisement that will allow the hacker to exploit security flaws and gather vital data
  3. Altering an email's sender address to make it seem like a reputable entity is asking for sensitive information.
  4. Calling a reputable business vendor or IT department and posing as someone else to obtain information.
Additional Resources

The following antivirus resources might be beneficial. They include:

  1. Avast Antivirus.
  2. 360 Total Security.
  3. Brave Browser.
  4. Google Chrome.
  5. Adblock Addon for Chrome.
References
  1. Wikpedia
  2. Malware
  3. Gaoler_SlidesCarnival.pptx