There is a wide variety of issues and dangers related to the internet and the actions people take online.
Network Security can be generally separated into 3 aspects. These are protection, reaction, and detection. Protection includes the use of Anti-malware and antivirus softwares and the implementation of firewalls. The use of VPNs is also incredibly useful in ensuring online privacy. (1) Safe internet use is also very important in the process of staying safe online. Google provides a service called "Google Safe Browsing" that allows users to know what websites contain phishing content or malware. (4) Phishing content is also available through emails or other messaging services. This is the process of sending fraudulent messages with false claims with the intention of gaining the recipients personal information. In 2019, phishing accounted for 90% of data breaches and they have grown 65% in the last year. (5)
An easy recommendation to help with password safety is to just use more complex passwords. Using a mixture of capitalization, numbers, and symbols can create a less simple and less crackable password. This makes it more difficult for hackers to gain access to your personal accounts and data.
Another tip to protect your data, is to make sure you're using different passwords for all of your accounts. This prevents an individual from gaining access to all of your accounts by cracking just one password. If one account is hacked, the rest will remain safe as the passwords are not the same. Additionally, changing your password from time to time can also help to ensure the safety of your accounts. Make sure to not change it to a password too similar to the previous and not one that you've used in the past. (2)
ID Fraud can have a variety of impacts on a person. These range from committing crimes using the stolen credentials, making purchases or renting apartments and cars, opening new bank accounts, and changing passwords on online accounts. Your identity may be stolen through a range of methods. One of these is the theft of direct personal identification which may include a passport, drivers license, or bank cards. Constantly checking financial statements and credit card bills may help you determine if someone has stolen your identity. If you see any transactions or withdrawals that you don't recognize, immediately contact your bank or credit card company. The earlier you realize it, the earlier you can prevent the thief from further use of your identity. (3)
The term "DDoS '' stands for Distributed Denial of Service which is a type of online attack. It is one of the more common types of "hacking" that is done, especially by younger and more inexperienced "hackers". It can be done relatively easily allowing these people with very little knowledge about the topic to conduct these attacks (7). The process essentially renders a network or server overwhelmed by flooding it with an intense amount of internet traffic. The traffic often comes from other exploited and devices that the hacker has control over. These can be referred to as botnets which are just a system of connected computers or devices that can be used to carry out a variety of malicious acts online. They can use the power of the machine to contribute in these DDoS attacks or to spoof online traffic (8). Another common type of online attack is Doxing. Doxing is when one gains access to someone's personal information through a range of tactics and releases it online. This may be done to anyone but is quite often done towards celebrities, large companies, or other people of importance. Doxing may seem like a less dangerous type of network attack, but it can be just as harmful. The information becomes available to everybody and anybody who wants to see it. Doxing is just as Illegal as DDoSing despite its simpler nature of resource gathering. The information released and spread may be anything from one's phone number, home or work address, email address, full name, or pictures. These pieces of data take away ones anonymity online and reveal their identity to everyone. (9)
The rates at which we are posting personal content online are steadily increasing. Every minute of everyday we are sharing over 3600 pictures on Instagram and over 100 000 tweets. These posts stay on the internet forever and can very often be seen by unwanted eyes. The majority of employers in today's day and age do checks of ones online presence before hiring. The posts you make can be detrimental to your future and if the company were to hire you, their image would be at risk as well. There are many things to consider before posting online (10). Imagine if you were to look back at this post in 10 years. Would you still think that it is a reasonable thing to post, or would you regret it? Consider if the post is offensive, shows any illegal activity, or is just generally inappropriate to post for others to see. Online disputes are another frequent cause to ruin someone's image. Arguments or online toxicity can affect how others see you as an individual and also result in companies choosing not to hire you. There are 5 important features of online etiquette.
Q.What 3 aspects can network security be separated into?
Q2. What is a tip to protect your data?
Q3. What is one method of identity theft?
(1.) Fruhlinger, J. (2018, July 3). What is network security? Definition, methods, jobs & salaries. Retrieved from https://www.csoonline.com/article/3285651/what-is-network-security-definition-methods-jobs-and-salaries.html
(2.) 15 Tips To Better Password Security. (2018, March 16). Retrieved from https://www.mcafee.com/blogs/consumer/15-tips-to-better-password-security
(3.) How to avoid or recover from identity theft. (n.d.). Retrieved from https://www.ontario.ca/page/how-avoid-or-recover-identity-theft
(4.) Newman, L. H. (2018, July 18). How Google's Safe Browsing Helped Build a More Secure Web. Retrieved from https://www.wired.com/story/google-safe-browsing-oral-history/
(5.) Retruster. (n.d.). Retrieved from https://retruster.com/blog/2019-phishing-and-email-fraud-statistics.html
(6.) Symanovich, S. (n.d.). What is a VPN? Retrieved from https://us.norton.com/internetsecurity-privacy-what-is-a-vpn.html
(7.) "What Is a DDoS Attack." Cloudflare, www.cloudflare.com/en-ca/learning/ddos/what-is-a-ddos-attack/.
(8.) "What Is A Botnet?" What Is a Botnet?, us.norton.com/internetsecurity-malware-what-is-a-botnet.html.
(9.) Beal, Vangie. "Doxing." What Is Doxing? Webopedia Definition, www.webopedia.com/TERM/D/doxing.html.
(10.) McCarra, Darren. "Internet Permanence and Posting Online: A Simple Guide." The Sociable, 11 Sept. 2012, sociable.co/web/internet-permanence-and-posting-online-a-simple-guide/.
(11.) "Online Etiquette." Centenary University ™, www.centenaryuniversity.edu/academics/academic-resources-advising/online-coursework-tips/online-etiquette/.
(1.) Krause, Kevin. "Why You Need a Password Manager." Phandroid, 23 Mar. 2016, phandroid.com/2015/02/18/benefits-of-password-manager-software/.
(2.) "4 Ways Technology Assists and Prevents Identity Theft." TECHNOLOGY.ORG, 28 Sept. 2018,