how to stay safe online
- Artificial Intelligence, Digital Marketing, Social Media, Training Institute

How to Stay Safe online on Internet

Like the Post ???Feel To Share

Todays’ Discussion

  • Overview of Computer and Internet Security
  • What is Computer and Internet Security
  • Who Should be Concerned
  • Why Should I Care
  • General Computer Security Tips
  • Securing Mobile Devices and Social Networks
  • Mobile Devices – Risks
  • How are Location Sharing Technologies used
  • Protecting Your Passwords
  • Using Social Media and Email Safely
  • Using Safe Sites and Networks

What is Computer and Internet Security?

  • Protecting computers, information, and services from unauthorized access, change or destruction.
  • Internet security extends this concept to systems that are connected to the Internet
  • Browsing the Internet
  • Electronic Commerce
  • Social Networking
  • Emailing

Who Should be Concerned?

Anyone who uses

  • Computers
  • Mobile Devices
  • The Internet
  • Email
  • Social Networks
shy should i care for internet security

Why Should I Care for Internet Security?

Virus – Program designed to infect your computer replicates itself and usually causes lost or corrupt data. Infections from viruses, spyware, or malware

Spyware –Spyware is a type of malicious code that tracks your habits on the internet without You knowing it; usually collects personal information

Phishing, Hoaxes, Malware, Scams and Spam

The most prevalent and persistent threats to your security come to you in your Inbox. They come by different names and may even appear legitimate and even supposedly from people you may know.

They all have this in common: they are designed to get you to click on an item like an attachment, link or picture.

Broken device

Devices that do not work when needed or as expected. Privacy and personal security concerns.

Preventing private, personal, or sensitive information from being disclosed

what hackers do

Also Read: Step by Step Guide to Email Marketing

Who is a hacker and what do Hackers do?

  • Someone who bypasses the systems and Passwords.
  • Taking advantage of weaknesses left in the system by developers.
  • This person knows computer programming
  • Can be a Hacker Subculture
  • Access confidential information
  • Broadcast confidential documents e.g. Name, address, etc.

Methods of Hacking

  • Over the internet
  • Over Lan
  • Locally
  • Offline
  • Theft
  • Deception
  • Ip Addresses
  • Telephone
  • Email

List of Hackers

  • Black Hat Hackers ( The bad guy Violates computers)
  • White Hat Hackers (The Hero Breaks security for good reasons)
  • Blue Hat Hacker (consults firms, system tested before launch)
  • Grey Hacker(Mixture of white & Black offers their service to improve for a small fee)
  • Hacktivist (Utilizes Technology)
  • Script Kiddie (Skiddie)Kid- Child lacking knowledge, Immature
  • Elite Hacker (The most skilled Hacker)(Masters of deception)
  • Ethical Hacker(employee and authorized Hacker)
  • Bots ( software tools the hackers use )

SQL Injection

SQL injection is a type of attack often used against data driven applications.
It is a technique that exploits an applications security weaknesses.
Used to steal databases full of credit card information, passwords, or personal details.

DDOS Attacks

  • Distributed Denial of Service.
  • Used to make a machine or network resource inaccessible to users.
  • DDOS attacks usually utilize botnets.

ALSO READ:How to Make a Successful Career in Social Media Marketing

Social Engineering

  • Social engineering is the art of manipulating people into divulging personal and confidential information.
  • Requires very little technical skill.
  • Relies heavily on human interaction to get results.
  • Most often used in tandem with other exploits.

Malware and Viruses

Malicious Software.

  • Used by an attacker to steal data, disrupt operations or access a private network.
  • Used to describe many different types of software including viruses, worms, Trojans, keyloggers, spyware and others.

Computer Virus

  • Any computer program that can replicate itself and spread from one computer to another without input from its creator.
  • Needs to attach itself to an existing program in order for it to work.
  • They are used to deliver many different payloads.

Computer Worm

  • A program similar to a virus; it can replicate itself and spread from one computer to another.
  • Unlike a virus, a worm does not need to be attached to an existing program in order to function.
  • Always cause harm to the network, even if it is just increased bandwidth consumption, whereas a virus will always corrupt and/or modify files on a computer.

Trojan Horse

  • A program that pretends to do one thing, but in reality does something else.
  • Used to record keystrokes input by a user
  • Can be used to steal usernames, passwords, credit card information, personal details and so on.
  • Usually, employ a form of social engineering.

Firewalls

  • The program used to monitor network traffic.
  • Have a set of rules that they use to filter packets trying to enter the network.
  • Usually placed between a trusted network and one that is less trusted.

ALSO READ:How to Make Quick Money on Internet using Affiliate marketing?

Antivirus Software

  • Used to prevent access to computer systems by unwanted programs.
  • Utilises many different methods to protect the computer.
  • Often search for signs of viruses on every website that is visited and do regular scans of the computer to check for infections.

Types of Hacking/Data Theft

Password Cracking-Attempting to guess a password using a program.

Brute Forcing– A program that guesses a password by inputting as many randomly generated passwords using the computer’s processing power.

Dictionary Hack- A program that guesses passwords based on words in a dictionary or the program’s vocabulary.

Packet Sniffing-Sniffing packets sent over the internet to gain security details over unsecured connections.

Phishing-Legitimate looking sites designed to farm information inputted by the user.

Rootkit-Stealth software which inhibits use of programs executed by the user and hides (usually malicious) processes.

Keyloggers-records keystrokes and can be software or hardware.

Scareware-A form of software designed to scare the user into divulging information (such as credit card information) much like social engineering.

IP Spoofing-Masks the IP address of a hacker and prevents them from being found

Use anti-virus and anti-spyware Software

  • Detects and removes viruses and spyware from your computer
  • Must be kept up to date
  • Install security patches
  • Enable Firewalls
  • Protects computers by preventing
  • unauthorized access

Think before you click on links

Most threats are targeted in hopes that you will click on a harmful link, attachment, picture, video or icon in an email or web page.

Stop: Do not automatically click on Internet links until you have confidence in them.

Think: Look at the actual address for the links in question. For instance if the link indicates “Click Here” be sure to hover your mouse pointer over the link and investigate before you proceed.

Click: Only after you are confident that the site is safe.

Security for Mobile Devices

Mobile Devices have become the devices of choice for communicating and connecting to the Internet

  • Smartphones
  • Tablets
  • Laptop Computers

Mobile Devices – Risks

Mobile devices are easy to lose or stea. Can carry large amount of data

  • If stolen, an unsecured Smartphone grants access to your private information: email correspondence, address books, and any unsecured documents. Often unprotected
  • Data may be “sniffed” during unprotected
  • wireless communications

ALSO READ:Learn how to Generate Leads for your business online

Security Guidelines – Mobile Devices

  • Enable auto-lock
  • Enable password protection
  • Keep the phone OS and apps up-to-date
  • Enable remote wipe feature where possible
  • Avoid connecting to a public wireless network
  • when possible.

Risks of Location Sharing Technologies

  • Location Sharing
  • Location-aware applications deliver online
  • content to users based on their physical location.
  • Technologies employ GPS, cell phone
  • Infrastructure or wireless access points to
  • Identify where cell phones or laptops are
  • located and users can share that information
  • with location-aware applications.
  • Makes users “human homing beacons”
  • Increases the chances of being stalked
  • May reveal when you are home or away

Examples of Location-Sharing Technologies

GPS Geo-tagging of photos, Location details added to photographs

Facebook places:Allows users to “share where you are with your friends, see where your friends are and discover new places around you.

Google Latitude – Allows you to see where your friends are and what they doing

Security Guidelines for Location Sharing

  • Most apps offer privacy controls – enable them
  • Know what applications you have and
  • Research privacy controls
  • Disable GPS capabilities and geotagging
  • Features

Security Guidelines – Social Networks

Before you post, ask the following:

  • Will this post/picture cause a problem for me?
  • Would I say this in front of my parents?
  • Limit the number of people that see it
  • Share public information with the public
  • Share inner thoughts and personal feelings
  • with close friends
  • Limit your visibility on services
  • Do not Friend or Connect with people
  • That you have not met in person or know well
  • Limit your check-in information to friends only
  • Never check in at your home, school, work
  • Avoid public lists for a location
  • Review posts you are tagged in
  • Turn off geolocation data in photos
  • Turn off “find my face” in photos and videos
  • Disable location data for tweets
  • Delete old location data too
  • Make your profiles private
  • Review posts you’re tagged in before approving them.
  • Never give personal information to someone you met online.
  • Use caution when meeting in-person with someone you met online.

ALSO READ:Best Digital Marketing Institutes in India

Tips for Recognising Phishing

  • Spelling or grammar mistakes. Real companies hire copy editors to check their emails before they go out.
  • It doesn’t use your name.
  • It’s from someone you don’t know, or it refers to a transaction that is unfamiliar to you.
  • It asks for your personal information.
  • It seems too good to be true. Or too bad to be true.
  • The tone is urgent or even threatening.
  • The return address of the email or the URL of the link doesn’t look right. It asks you for money or a donation.

Protecting Your Passwords

  • Use strong, unique passwords
  • Include a mix of numbers, symbols, and letters, both uppercase and lowercase
  • Longer passwords are always stronger
  • Use a password manager to keep passwords safe and organized
  • Enable multi-factor authentication on your accounts
  • Sign up for accounts on legitimate sites only
  • Log out of any site you use on a public computer or network

Using Safe Sites and Networks

  • Avoid clicking on sites that look fake or scammy
  • Clear your browsing history often to maintain your privacy
  • Do online shopping on encrypted sites.
  • Use private WiFi networks, never public ones
  • Use an antivirus extension on your browser.
  • Install a firewall to protect your home network
  • Keep your computer’s software up to date.

Skills to Prevent Cyber Crime

  • Spam Blocker
  • Anti Virus software
  • Firewall protection
  • Encryption software
  • Caution in providing personal information
  • Secure Shopping
  • Avoidance of scans
  • Monitoring of your child’s computer activities

Like the Post ???Feel To Share

Summary
How to stay safe online on Internet (Internet safety rules) - Internet Security
Article Name
How to stay safe online on Internet (Internet safety rules) - Internet Security
Description
Stay safe online while using the internet with these basics tips and tricks. Follow guideline to stay safe online, protect passwords and safely use social media.
Author
Publisher Name
Digital Marketing Wiki
Publisher Logo
Pankaj Singh

About Pankaj Singh

Digital Marketing Consultant, Author and Web Developer.Pankaj Singh has 5+ years of Experience in SEO, Digital Marketing and Web Development. You Can Read More of his Articles www.digitalmarketing-wiki.com
Read All Posts By Pankaj Singh

Leave a Reply

avatar
  Subscribe  
Notify of