Submitted by: Submitted by Mixtras
Views: 549
Words: 541
Pages: 3
Category: Business and Industry
Date Submitted: 10/30/2011 01:12 AM
Cyber Security
It was obvious how James was able to use an unprotected Wi-Fi signal and looking into the personal records stored on the family’s computer. The Family first off was not very educated in threats and vulnerabilities by not creating a user name and password on this Wi-Fi signal and should consider countermeasures to protect vial information. (p. 462). With identity theft so high in today’s world a person needs to consider how to better protect them by watching for: shoulder surfing, snagging phone conversations, dumpster diving, social engineering, and other high tech methods (p.463-464). Make sure to shred all vital information after paying bills, watch who is around you when talking on the phone giving credit information, if a company calls asking you for login information ask if you can call them back and use a number to the company on your bills, buy a security system to protect your computer, and change your network or internet connections password every month. Do not talk freely about your personal life to people you do not know on places such as Facebook or other social media sites.
The average home computer users have many options on software they can purchase for protection against any threats on the internet. Kaspersky, Norton, AVG, and MacAfee offer many packages for computers protections. Also there is freeware such as the new Microsoft Security Essentials and CCleaner that clean cookies and safely removes unwanted programs.
One of the most important things I consider before entering any new computer online my Security software. Without security we are wide open to anything. Enabling firewalls to at least medium leaves would be advisable. Additionally making sure any cookies are notified before the site is allowed to place information on your pc (pg. 465-466). I always have the site ask me if I want them to install anything on my computer even updates to my existing software. Watch what you’re downloading on your computer. Many times...