By Erin Jeong
Computers nowadays have become an essential electronic device in the society - they are implemented into the daily lives of many individuals.
They have gained significance as they have improved the overall efficiency and productivity of work being done. Computers can help businesses by making their staff efficient and productive to save valuable time in any business or office.
In schools, they can help students learn by providing video or audio examples.
They also became a vital gadget in several sectors such as banking and online shopping.
However, using the computer became a part of daily life for many people that it is easy to forget the risks associated with the enjoyment and convenience.
While there have been great advances in computer and Internet security, hackers and stalkers still find ways to reach vulnerable targets.
(1)
The remarkable growth in the use of computers also indicate the growth in the unethical use of computers, and many of them are known as 'cybercrimes'. Cybercrimes are those instances when criminals, known as hackers or attackers, access someone's computer for malicious reasons. It is typically for one of three main reasons:
|
|
Passwords are like the currency of the digital age because people use passwords to log in to computers, email accounts, online games, bank accounts, credit card accounts, online forums, and social networking sites.
In order to remember and keep track of every login, many people use passwords that have poor password security - names, nicknames, dates of birth, maiden names, and other obvious and predictable information.
These approaches to password security are very risky, because once thieves guess or otherwise gain access to one login, they can usually access many different pieces of personal information, and this is known as identity theft.
The consequences for victims of break-ins can include the loss of valuable data such as presentations, emails, and music. Victims may also have their bank account information, money, or their identity stolen. Short and simple passwords are relatively easy for attackers to determine. Therefore it is important to note that password complexity relates directly to password security. It is an individual's responsibility to create effective passwords that are complex and unique in order to prevent unauthorized access. (4) |
An effective password:
|
|
Before making a payment or sharing sensitive information online, it is important to make sure that the website is secure.
A truly secure website is one that is free from malware and viruses.
Viruses are programs or codes that attach themselves to files and run inside the computer.
Malware, short for malicious software, is an umbrella term that incorporates all kinds of software or programs that can be used to disrupt normal computing capabilities.
A secure website also encrypts all data going through it to protect personal, financial or other confidential information from being compromised.
(6)
Check the SSL certificate!HTTP stands for Hypertext Transfer Protocol, and it is the protocol over which information is sent from a user's web browser to the website they are visiting. The data that is being communicated between the browser and the website is sent over in plain text, meaning that if a hacker intercepted the connection between the two, the hacker would easily be able to see the information. This is especially dangerous when users are filling out sensitive information, like a credit card number at checkout on Amazon, or entering location information on Facebook. While HTTPS is essentially the same concept as HTTP, the "S" harbors one big difference between the two: security. HTTPS stands for Hypertext Transfer Protocol Secure. The secure sockets layer that HTTPS uses ensures that the information travels through a safe tunnel to its destination, making it harder for hackers to break the connection and steal personal information. (7) |
![]() (8) |
|
A firewall is a software utility or hardware device that acts as a filter for data entering or leaving a computer.
It acts like a security guard that decides who enters or exits a building.
Firewalls filter threatening communications to prevent cyber attacks.
All messages entering or leaving the internet must pass through the firewall, which examines each message and blocks those that do not meet the specified security criteria.
Firewalls use one or a combination of the following four methods to control traffic flowing in and out of the network:
There are two different types of firewalls: software and hardware.
Software Firewalls
Software firewalls are the most popular network protection method for home users. They usually come as stand-alone applications or as part of a complete antivirus protection software. Besides providing protection for inbound and outbound traffic, a software firewall can also protect against viruses, Trojan or worm applications as well. (10) |
Windows Firewall, an example of a firewall software program:
![]() (11) |
After all things considered, it is evident that prevention is the best line of defense since computers that are most vulnerable tend to be the first targeted by criminals. Therefore, being aware of different types of safeguards and using them can reduce the likelihood of attack for many users. However, it is important to note that the rapid growth in the use of computers leads to the growth in the unethical use of computers. Cybercriminals have hundreds of ways to steal credentials and their techniques are becoming more sophisticated every day. Fortunately, anyone can enforce better cybersecurity by using safeguards such as effective passwords, secure websites, and firewalls. However, the safeguards are not 100% foolproof, which is why it is important for users to always be aware of computer security while they use their computers.