Preview

independent

Good Essays
Open Document
Open Document
759 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
independent
Securing Yourself Online
Final Version

1 Attention Catcher: You are at risk. All of us are at risk. I’m not talking about STDs, global warming, or terrorism. I’m talking about your life online. You’re at risk of having your computer taken over so that perfect strangers can read your e-mail, access your bank accounts, pilfer your credit card numbers, and even steal your identity.
2 Listeners Link: Speakers Credibility: As college students, we’re particularly vulnerable because we spend so much time online. According to David Tatar, manager of Wisconsin’s Consumer Office of Privacy Protection, 32 percent of all identity theft claims are filed by people between the ages of 18 and 29 years old. That’s the largest percentage of any age group.
3 Speakers Credibility: I’ve seen this over and over again at my summer job as a computer technician at a nationwide computer store. You wouldn’t believe how many computers are compromised and infected.
4 Thesis Statement: Today I’d like to explain three steps that experts recommend for online security
5 Preview: The three steps are using strong passwords, using secure connections, and double checking links before clicking on them.
Main Point One
6 Step one: The first step is using strong passwords—for e-mail accounts, bank accounts, and everything else that you do online. What makes a strong password? Take a look at this example: IwbiP;;4387-CSamFF. Now this is a long password, but that’s part of its strength. The first criterion of a strong password is having 10 characters; 15 or more is even better—like the one I showed you. It should also include uppercase and lowercase letters, numbers, and punctuation such as semicolons, hyphens, and underscores.
According to Microsoft’s online guide to creating strong passwords, when your passwords contain long combinations of seemingly random letters, numbers, and punctuation, your security increases exponentially—meaning that a password like the one I showed you is

You May Also Find These Documents Helpful

  • Better Essays

    Concept Check 5-2 and 5-5

    • 500 Words
    • 2 Pages

    Use a secure browser, keep records of online transactions, review your monthly statements; read the privacy and security policies, keep your personal information private, never…

    • 500 Words
    • 2 Pages
    Better Essays
  • Satisfactory Essays

    Consider the various amounts of social media sites and email accounts, along with the millions of passwords that are used to access these sites. Society continues to crave more social media interactions and email accounts but yet there is not a cohesive effort to secure the passwords that are used for these sites. In a recent article by SC Magazine, it reported the compromise of over two million accounts. The goal of this evaluation will be to reference numerous aspects of this security article, describe each aspect, with comments on its usefulness…

    • 605 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    When planning password policy’s stress extra protection, in some cases, a good password is enough protection to keep out intruders. In others, it’s just a start. Encryption and one-time passwords add extra protection to systems. Encryption means garbling the password to protect from sniffers or other onlookers, through a particular scheme that can be deciphered from the other end of the connection. Users should exercise extreme caution when writing down or storing passwords. Stories of hackers obtaining passwords through shoulder-surfing and dumpster diving are not urban myths, they are real. Here a good practice for a company to…

    • 428 Words
    • 2 Pages
    Good Essays
  • Good Essays

    Nt1310 Unit 3

    • 541 Words
    • 3 Pages

    Yes, after reviewing the material I understand how to secure my computer. First, I should keep my operating system and all software up to date, have a firewall and antivirus software, use strong passwords, use protection devices such as surge protectors, back up data, and follow guidelines to limit unauthorized access and use to my computer. The most important part of computer security is me, the operator.…

    • 541 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Security Interview

    • 1458 Words
    • 5 Pages

    Contact a security manager and conduct the interview listed in Part I (space has been provided for extra questions, should you ask any). Once the interview has been completed, answer the questions in Part II.…

    • 1458 Words
    • 5 Pages
    Good Essays
  • Satisfactory Essays

    Although the internet can be a valuable tool both educationally and socially, there are some serious risks associated with using the internet and other technologies. As in the real world, children and young people are vulnerable and may knowingly or unknowingly expose themselves to danger when using the internet, mobile phones and other technologies.…

    • 320 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Adhering to regulations and policies provide the best solutions to enforce security. Adversaries continue to deploy new software to breach systems infra-structures. Users must utilize the same vengeance in seeking additional training to aid in protecting communities with relevant information. The best security approach is proactive not reactive.…

    • 827 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    In conclusion, although most people do not think that using the internet or a mobile phone will put them at risk, there is actually much more of a risk both physically and mentally. If inappropriate information or details are given then this can lead to serious consequences such as sexual abuse or bullying. It is important for people of all ages to be aware of the information they are giving out online or via email…

    • 329 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    Term Paper

    • 1470 Words
    • 5 Pages

    AbstractThis paper focuses on five major areas of security issues on the Internet. Security concerns relate useful information to the average web surfer at home. There are tips on safeguarding one’s security and privacy over a network connection, plus some definitions of typical security problems individuals will come into contact with. The second focus of this paper includes the initial internet security measures. It will discuss the early security protocols and how technology has increased the security of the internet numerous times. Invention of internet security is the third topic of this project and focuses the invention and its impact on the Internet. The forth topic deals with the legal measures which have taken place regarding internet security issues. Finally, the fifth topic deals with the consumer privacy concerns, for the most part, people are becoming aware of internet security as online activities continue to skyrocket. As the technology becomes more available and easy to use, people seem to accept security risks in exchange for the convenience.…

    • 1470 Words
    • 5 Pages
    Powerful Essays
  • Satisfactory Essays

    Survillance Privacy

    • 325 Words
    • 2 Pages

    Privacy is something that is all around us, and the internet usage is one way where privacy is being invaded. The internet is becoming a huge threat to many people lives. Since privacy is becoming a big concern, the internet is threatening our ability to keep secrets and to keep personal information confidential. There are many Americans who lives have been affected through internet usage. Searching the internet for either personal reasons or informational reasons, people privacy can be easily accessed by others.…

    • 325 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Independence

    • 590 Words
    • 3 Pages

    Okay so i wanted to write about teenage rights. this is what iv got so far:…

    • 590 Words
    • 3 Pages
    Good Essays
  • Good Essays

    INTERNET SECURITY

    • 1356 Words
    • 4 Pages

    Internet Security. How safe is your computer?Robert WilliamsSAINT LEO UNIVERSITYCOM201Professor Gary RogersNovember 22, 2013Internet Security. How safe is your computer?The Internet is a very powerful tool that we use to navigate and communicate with the rest of the world. Internet users often rely on interacting with other computers and programs to accommodate their different needs. Anytime you place your technology device on the Internet, there will always be a possibility of attracting a virus. There are numerous viruses and Trojans online today that can damage an unprotected computer. The question I have for you is, how safe is your computer?…

    • 1356 Words
    • 4 Pages
    Good Essays
  • Good Essays

    The safety of the Internet is one of the most controversial debates at the moment. Although the Internet is disturbing, its advantages are quite awesome, like communication, access to information, comfortable life and entertainment.…

    • 563 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Have you asked yourself what's the impact of the information that you leave in the internet? The risk of identity theft is high due to leaving of the internet footprints. Internet fraudsters can join up your information and generate username and password of your other online accounts. According to internet security experts, three quarters of Facebook users leave their profiles open to all risking identity fraud. Last year, Sky News reported, in every ten seconds someone in Britain become a victim of cyber crime.…

    • 604 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Cyber Crime Outline

    • 266 Words
    • 2 Pages

    1. “Viruses, malware and other online threats mutate within seconds, making it tough to trace them with an Internet security or anti-virus syste,.” (Ismail)…

    • 266 Words
    • 2 Pages
    Good Essays