Page 144 - Webapplication11_C11_Flipbook
P. 144
Ð ÐDon’t Share Personal Information: Never share your passwords, social security number, or bank details through
email or text.
Ð ÐReport Suspicious Emails: If you receive a phishing email, report it to your email provider or your IT department at
work.
Ð ÐUse Security Software: Install antivirus software to help detect and block phishing attempts.
Spam
Spam refers to unsolicited and often irrelevant or inappropriate messages sent in bulk over the internet, primarily for
advertising or malicious purposes. It can occur in various formats, including emails, text messages, comments on social
media, and more.
Cyber Crime
Theft, fraud, and forgery are examples of cybercrimes that include the misuse of computers or the Internet. Cybercrime,
according to the IT Act, is an illegal act in which a computer is used as a tool, a target, or both. Some of these offences
are listed below:
ÐSending spam emails to those who aren’t interested.
Ð
Ð ÐHacking into another person’s account or system.
Ð ÐPhishing is a method of stealing someone’s personal information.
Ð ÐHosting a malware-infested website or serving as a conduit for the dissemination of malware.
Ð ÐHarassment of someone by e-mail, text messages, or social media.
Ð ÐPosting or transmitting offensive content to anyone on any website.
ÐUsing the Internet to defame someone.
Ð
Ð ÐForgery of a person’s digital signature
Ð ÐUsing Internet resources to provide misleading information to clients/the general public in order to engage in
fraudulent financial transactions
Ð ÐPlagiarism, illegal downloads, and intellectual property theft
1.12 NETWORK SECURITY TOOLS AND SERVICES
Since the Internet became a popular tool for sharing resources and accessing data, an ever-increasing number of
people have been using it for both good and negative purposes. Everyone who uses the Internet should be aware of
security concerns and take precautions to resolve them.
Firewall
A firewall protects an organization’s, home’s, or individual’s internal network against malicious traffic from outside
networks. For this reason, a router or a computer (typically devoted to function as a firewall) may be deployed between
the exterior and internal networks. The network traffic is inspected by the firewall, and only data that does not break
the security constraint is allowed to pass through. Malicious malware is prevented from entering your network using
hardware firewalls in the form of routers. Software firewalls built on home computers, on the other hand, prevent
unwanted access or malware from obtaining access to them. In addition to providing additional security, network
firewalls can encrypt incoming data by transforming it to an unreadable format.
142 Touchpad Web Applications-XI

