Preview

GOOD ONLINE SECURITY HABITS

Satisfactory Essays
Open Document
Open Document
334 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
GOOD ONLINE SECURITY HABITS
GOOD ONLINE SECURITY
HABITS

Submitted by: Rashi
Kashyap
Submitted to: Miss
Aarti Vig

CREATE STRONG PASSWORDS AND
CHANGE THEM ACCORDINGLY
Passwords are the keys to the kingdom and are often the only thing standing between your private information and the rest of the world.
 Make passwords long and complex
 Use a mix of upper and lower case letters  Use numeric and special characters when possible
 Use abbreviations of phrases which are not guessable

LOCK YOUR COMPUTER SCREEN
If you leave your computer unlocked and unattended, you never know who might use it.
These people pose a threat in the sense that they may potentially turn private information public or download malware or other unwanted viruses.

USE PUBLIC WI-FI SAFELY
Do not enter sensitive personal information such as bank account details
 Ensure websites use HTTPs and display a lock icon
 Try to avoid ever using a public computer to access personal and sensitive information
 Use it only for general web browsing such as weather forecasts or restaurant reviews


BACK UP YOUR DATA
Backing up your data save you a lot of stress down the road, especially if you are unfortunate enough to lose you data. There is also no real reason not to. It is extremely simple to back up your information and the benefits definitely outweigh the costs. So if you haven’t already, then do so today!

THINK BEFORE YOU POST TO
SOCIAL MEDIA
Ask friends and family to keep your personal information private on social media
 Be cautious when participating in games and surveys or when clicking on links shared by others  Review and update your social media privacy and security settings often


SOME OTHER MEASURES TO FOLLOW


Use anti-virus and separate anti-spyware software and keep it up to date.



Do not open e-mails or attachments from unknown sources. Be suspicious of any attachments, even if it appears to be from someone you know.



Disconnect from the internet when it is not in use.



Adjust the security

You May Also Find These Documents Helpful

  • Better Essays

    Concept Check 5-2 and 5-5

    • 500 Words
    • 2 Pages

    Use a secure browser, keep records of online transactions, review your monthly statements; read the privacy and security policies, keep your personal information private, never…

    • 500 Words
    • 2 Pages
    Better Essays
  • Good Essays

    So how do you secure your connection and block unwelcome visitors and stay away? It doesn’t require you to become IT professionals but simple things will secure your system.…

    • 367 Words
    • 2 Pages
    Good Essays
  • Good Essays

    Some sites use https:// only on the sign in page but not throughout the entire website, so be sure to check every page you go to throughout the website. Never send personal or financial information through e-mail unless you are sure to encrypt it first! The very best way to be sure your information is safe when using a public wireless network is using a VPN – Virtual Private Network, to encrypt data between your computer and the internet. You can use VPNs on a computer or a mobile device. Turning off your Wi-Fi when not using it is very good idea when on a public hotspot. If you need to check your bank accounts or access e-mail or social media accounts while you are traveling, using the banks app on your phone is safer than accessing the bank…

    • 356 Words
    • 2 Pages
    Good Essays
  • Powerful Essays

    The CNC Machinist: Quiz

    • 7255 Words
    • 53 Pages

    A virus is software that is written with malicious intent to cause annoyance or damage. Question options:…

    • 7255 Words
    • 53 Pages
    Powerful Essays
  • Satisfactory Essays

    Security

    • 409 Words
    • 2 Pages

    Michael Nhan SE578-Practices for Administration of Physical & Operations Security Prof: Rodney Smith How do Administrative, Technical, and Physical Controls introduce a false sense of security? According to research and studies, the leading broadband providers have accumulated a total of over 17.4 million high-speed Internet subscribers in the US” This means that in the United States alone there are more than 17 million computers with fast connections most of which are connected to the Internet 24 hours a day, 7 days a week and that number continues to grow. Having a false sense of security is very common among consumers who own and operate a PC within their homes. Nothing is ever secured. I would never say something is secured within the terms of information security. Administrative, Technical, and Physical introduce a false sense of security by the idea of what we use to safeguard sensitive data and protect consumers’ privacy. The idea of purchasing a virus protection identifies that all personal information will be safeguarded and protected, which gives consumers a false sense of security. Having a false sense of security means that I entrust beliefs that I’m guaranteed protection at all times and, that I should not be concerns about my computer being compromised because I took the necessary precautions in purchasing a virus protection. What are the consequences to the strategy if there are no verification practices? disclosure of proprietary corporate information. What can a firm do to bolster confidence in their Defense-in-Depth strategy? How do these activities relate to “Best Practices”? How can these activities be used to demonstrate regulatory compliance? Sarbanes-Oxley_Act. (n.d.). Wikipedia, the free encyclopedia. Retrieved September 21, 2008, from Reference.com website: http://dictionary.reference.com/browse/Sarbanes-Oxley_Act M2PressWIRE; 08/12/2008 Dublin: “Data New Report Details the Data Center Automation Solutions Market for 2007-2010"…

    • 409 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    Security Self Assessment

    • 1535 Words
    • 7 Pages

    This report is a derivative of security self-assessment based on the National Institute of Standards and Technology (NIST) special publication 800-26 (SP 800-26) (Swanson). The organization being assessed is an electronics and computer manufacturer’s technical support division technical and physical controls to support the information technology security. We will refer to this organization as Tech Inc., which is a fictitious name for this company.…

    • 1535 Words
    • 7 Pages
    Powerful Essays
  • Satisfactory Essays

    There are several ways that you can contribute to a safe and secure environment being maintained.…

    • 311 Words
    • 2 Pages
    Satisfactory Essays
  • Better Essays

    Explain why an owner would decide to rent a server for an e-business site. Give an example of a situation in which a rented server would be the best option.…

    • 996 Words
    • 4 Pages
    Better Essays
  • Powerful Essays

    Security

    • 4786 Words
    • 20 Pages

    net Extending Netsparker® Netsparker is the first false-positive free scanner. This document explains Netsparker’s user extensibility features, including step-by-step tutorials that show you how to build your own extensions to achieve a variety of common goals. Mavituna Security Ltd. Finance House, 522A Uxbridge Rd.…

    • 4786 Words
    • 20 Pages
    Powerful Essays
  • Better Essays

    Security

    • 1340 Words
    • 6 Pages

    In the security world today many organizations have developed a more concise communication tools that will enable a security personal department, to teach, and help there officers observe the various behaviors that individuals display. For instance a security officer notices an individual is seen walking around a facility or retail establishment acting in a very suspicious way. It could be possible that this particular individual is going commit a crime or has a severe mental issue. With the officer learning the certain skills to detect this type of behavior it very well could prevent either a crime being committed or the individual from hurting himself or other people who are around the situation. In these instances a trained security personal may have to use their communication skills to read what the person is doing by watching their gestures and emotions. Unfortuannally In many security settings personal deal with many challenging, and frustrating individuals that have many nonverbal language barriers. From ant where to people who are death, or don’t understand the language or is trying to convey a certain message to the security officers or other authority figures. Accordingly to University of Phoenix (2011). Introduction to Security a quote” If security personnel accurately assess the nonverbal behavior they would be able to save lots of people. If the nonverbal communication would not be considered important then the security personnel would not be able to save people unless they communicate verbally and it sometimes becomes difficult when an individual is at gun point”. The security team must provide and learn to properly observe and report the nonverbal behavior to qualified personnel so it will more lives. Verbal communication is a very important tool to use, because it helps security…

    • 1340 Words
    • 6 Pages
    Better Essays
  • Satisfactory Essays

    Network Security

    • 1344 Words
    • 6 Pages

    Rain Ottis is a scientist at the Cooperative Cyber Defence Centre of Excellence (CCDCOE) in…

    • 1344 Words
    • 6 Pages
    Satisfactory Essays
  • Powerful Essays

    Security Essentials

    • 11670 Words
    • 55 Pages

    Even the perception that a system is more vulnerable than it really is (as with paying with a credit card over the Internet) can significantly hold up economic development.…

    • 11670 Words
    • 55 Pages
    Powerful Essays
  • Better Essays

    Personal Security

    • 1519 Words
    • 5 Pages

    CERTIFICATE OF ORIGINALITY: I certify that the attached paper, which was produced for the class identified above, is my original work and has not previously been submitted by me or by anyone else for any class. I further declare that I have cited all sources from which I used language, ideas and information, whether quoted verbatim or paraphrased, and that any and all assistance of any kind, which I received while producing this paper, has been acknowledged in the References section. This paper includes no trademarked material, logos, or images from the Internet, which I do not have written permission to include. I further agree that my name typed on the line below is intended to have, and shall have the same validity as my handwritten signature.…

    • 1519 Words
    • 5 Pages
    Better Essays
  • Powerful Essays

    Security

    • 49264 Words
    • 198 Pages

    In 2007, the Major Cities Chiefs (MCC) approached the Bureau of Justice Assistance (BJA) with a new and bold idea to address the rising violence on campus—increase the coordination between local and campus law enforcement to better protect students. With the safety and security of 15 million college and university students in America at stake, the need to act was clear. MCC and BJA developed the Campus Security Guidelines in order to make a genuine difference in how law enforcement prevents, prepares, responds to and recovers from critical incidents on campus. The Guidelines are real operational policies, developed by the experts—local and campus law enforcement—that can be implemented across the nation. We all agree that coordination among law enforcement agencies is complicated, but the unique challenges in the campus environment make coordination even more important. To secure the safety of students and faculty on college campuses, local law…

    • 49264 Words
    • 198 Pages
    Powerful Essays
  • Good Essays

    Central idea: There are the safest ways they can shop online using a secure websites, on what to look for and where to shop safely.…

    • 674 Words
    • 3 Pages
    Good Essays

Related Topics