Get help now
  • Pages 3
  • Words 581
  • Views 398
  • Download

    Cite

    Cameron
    Verified writer
    Rating
    • rating star
    • rating star
    • rating star
    • rating star
    • rating star
    • 5/5
    Delivery result 2 hours
    Customers reviews 339
    Hire Writer
    +123 relevant experts are online

    Related Topics

    Cyber Security Essay (581 words)

    Academic anxiety?

    Get original paper in 3 hours and nail the task

    Get help now

    124 experts online

    From social networks to online banking, today the Internet has penetrated into our lives and activities. In addition to computers and laptops, we connect smart phones, tablets, refrigerators, televisions and many other portable devices to the World Wide Web. The speech about the importance of the Internet nowadays calls for knowing as much as possible about cyber security.

    Cyber security is a state of protection of information that the individual, society and the state need. It ensures its existence and progressive development, regardless of the presence of internal and external information threats.

    It is necessary to find the right ways to protect our privacy when we are online. Many people think that cybersecurity is an illusion, and it is impossible to be protected now because sites collect confidential information so subtly that we do not even know what they know. This may be so, but this uncertainty is another reason to keep your privacy and avoid the leakage of personal data on the Internet.

    Is there something we can do to be more secure when surfing on the Internet, besides, do not show your passwords, or do not provide a lot of personal information?

    • Update

    The best protection against viruses is not anti-virus protection, but timely software update. After all, its developers are monitoring possible threats and trying to protect their products with innovations. Therefore, when the device offers updates do not ignore it.

    • Checking sites

    It is strongly recommended not to enter personal information (login, password, phone number or payment card) to requests of unverified sites. Such data can be provided only to those resources that have already passed your verification, or to well-known networks (for example, Google, Facebook, your blogs on information resources, etc.).

    And yet – always check the name of the site in the address bar of the browser (www.google.com and not www.goolge.com).

    You can enter information from payment cards or passwords from them only on sites with a lock icon in the address bar. Such a connection is considered protected, and your data will not fall into the hands of unauthorized persons

    • Phishing

    Recently, such type of fraud as phishing has become popular. The purpose of phishing is to gain access to the user’s confidential information (logins, passwords, payment card data, etc.).

    Phishing messages, as a rule, come to e-mail and prompt for immediate action, leaving no time for reflection. Fraudulent messages most often come from well-known brands, friends or banks and affect the emotional perception of information. They can:

    – trigger an alarm for the state of their bank accounts;

    – promise cash benefits with the application of minimal efforts (lottery, a message about a possible unexpected inheritance, etc.);

    – offer financial transactions with incredibly favorable conditions;

    – call for donations after news of natural disasters or something or appeal to your charity, offering to help sick children.

    Phishing can use not only the sending of letters to e-mail addresses but also online ads, search engine results, simulation of pop-up windows with system messages, SMS messages disseminating information in social networks.

    • Password

    As a conclusion, do not forget about the password.  A secure password is the first guarantee that your personal information is under a secure lock. It must be complex, and it shouldn’t contain personal data. Passwords for important resources need to be changed at least once in 3 months. If you have a lot of passwords for different resources, write them down or use password-storing applications, for example, KeePass.

    This essay was written by a fellow student. You may use it as a guide or sample for writing your own paper, but remember to cite it correctly. Don’t submit it as your own as it will be considered plagiarism.

    Need custom essay sample written special for your assignment?

    Choose skilled expert on your subject and get original paper with free plagiarism report

    Order custom paper Without paying upfront

    Cyber Security Essay (581 words). (2018, Sep 06). Retrieved from https://artscolumbia.org/cyber-security-essay-57953/

    We use cookies to give you the best experience possible. By continuing we’ll assume you’re on board with our cookie policy

    Hi, my name is Amy 👋

    In case you can't find a relevant example, our professional writers are ready to help you write a unique paper. Just talk to our smart assistant Amy and she'll connect you with the best match.

    Get help with your paper