Post 7: Digital security
Create a blog entry in which you warn fellow students about the hazards of online activity and
provide guidelines on online safety. (Marks: 10)
Dangers of the internet:
Cyber-bullying: Cyber-bullying is the use of cell phones, instant messaging, e-mail, chat rooms or social networking sites such as Facebook and Twitter to harass, threaten or intimidate another person.
Clicking on e-mail attachments from unknown senders: Opening e-mail attachments is the most damaging thing corporate end users can do. E-mail attaches today are the most likely means of contracting viruses, worms, Trojan horses and other digital infections.
Participating in chat rooms or social networking site: the biggest security challenges that businesses face with business social networking like LinkedIn is the amount of information that a social engineer can learn by doing simple searches.Users can unintentionally divulge sensitive company data in a message board post with a friend as an example. It may lead to a corporate data breach in the future.
Guidelines on Online Safety
Use a screen name instead of your real name.
Always tell a parent or guardian about any message that you receive that is scary or inappropriate.
Never share personal information, such as addresses, phone numbers, campus names.
Never agree to meet anyone from a chat room in person.
Never respond to an email or message that is a threat.
Don't download pictures and other files from an unknown source.
Dangers of the internet:
Cyber-bullying: Cyber-bullying is the use of cell phones, instant messaging, e-mail, chat rooms or social networking sites such as Facebook and Twitter to harass, threaten or intimidate another person.
Clicking on e-mail attachments from unknown senders: Opening e-mail attachments is the most damaging thing corporate end users can do. E-mail attaches today are the most likely means of contracting viruses, worms, Trojan horses and other digital infections.
Participating in chat rooms or social networking site: the biggest security challenges that businesses face with business social networking like LinkedIn is the amount of information that a social engineer can learn by doing simple searches.Users can unintentionally divulge sensitive company data in a message board post with a friend as an example. It may lead to a corporate data breach in the future.
Guidelines on Online Safety
Use a screen name instead of your real name.
Always tell a parent or guardian about any message that you receive that is scary or inappropriate.
Never share personal information, such as addresses, phone numbers, campus names.
Never agree to meet anyone from a chat room in person.
Never respond to an email or message that is a threat.
Don't download pictures and other files from an unknown source.
Comments
Post a Comment