Page 144 - Webapplication11_C11_Flipbook
P. 144

Ð ÐDon’t Share Personal Information: Never share your passwords, social security number, or bank details through
                 email or text.

              Ð ÐReport Suspicious Emails: If you receive a phishing email, report it to your email provider or your IT department at
                 work.

              Ð ÐUse Security Software: Install antivirus software to help detect and block phishing attempts.
              Spam

              Spam refers to unsolicited and often irrelevant or inappropriate messages sent in bulk over the internet, primarily for
              advertising or malicious purposes. It can occur in various formats, including emails, text messages, comments on social
              media, and more.

              Cyber Crime

              Theft, fraud, and forgery are examples of cybercrimes that include the misuse of computers or the Internet. Cybercrime,
              according to the IT Act, is an illegal act in which a computer is used as a tool, a target, or both. Some of these offences
              are listed below:
               ÐSending spam emails to those who aren’t interested.
              Ð
              Ð ÐHacking into another person’s account or system.

              Ð ÐPhishing is a method of stealing someone’s personal information.
              Ð ÐHosting a malware-infested website or serving as a conduit for the dissemination of malware.
              Ð ÐHarassment of someone by e-mail, text messages, or social media.

              Ð ÐPosting or transmitting offensive content to anyone on any website.
               ÐUsing the Internet to defame someone.
              Ð
              Ð ÐForgery of a person’s digital signature

              Ð ÐUsing Internet resources to provide misleading information to clients/the general public in order to engage in
                 fraudulent financial transactions

              Ð ÐPlagiarism, illegal downloads, and intellectual property theft
                 1.12 NETWORK SECURITY TOOLS AND SERVICES

              Since the Internet became a popular tool for sharing resources and accessing data, an ever-increasing number of
              people have been using it for both good and negative purposes. Everyone who uses the Internet should be aware of
              security concerns and take precautions to resolve them.

              Firewall

              A firewall protects an organization’s, home’s, or individual’s internal network against malicious traffic from outside
              networks. For this reason, a router or a computer (typically devoted to function as a firewall) may be deployed between
              the exterior and internal networks. The network traffic is inspected by the firewall, and only data that does not break
              the security constraint is allowed to pass through. Malicious malware is prevented from entering your network using
              hardware firewalls in the form of routers. Software firewalls built on home computers, on the other hand, prevent
              unwanted access or malware from obtaining access to them. In addition to providing additional security, network
              firewalls can encrypt incoming data by transforming it to an unreadable format.






                142     Touchpad Web Applications-XI
   139   140   141   142   143   144   145   146   147   148   149