Post 7 Adrian's Tech Topic: Cybersecurity and Network Security
I
would like to go in a little bit more detail on this topic from my post about
network security. This topic is talking about in the later weeks of this
course, in chapters 7 & 8 in (Frank Vahid / Professor of Computer Science and Engineering / Univ. of
California, August 2017) . Chapter 7 is the privacy chapter in
this textbook but do we really have privacy?!?! This generation with all the
social media websites
and apps out there and people taking pictures of their
step. If you are online and searching the internet you are could be leaving a
digital footprint of what you have been looking at and or activity that you are
doing. A lot of social media websites,
regular websites, and apps ask for your location, access to make phone calls,
get access to your contacts, and access to your microphone so that you leave a
digital footprint. “Apps and sites like
those log your data such as IP address, request to view a web page, and user
post.
One
way of defining a “Hack” is a malicious security breach done by unauthorized
access. (Frank Vahid / Professor of
Computer Science and Engineering / Univ. of California, August 2017) ” The computer
hardware used to hack does not have to be that advance. I was talking to a
co-worker of mine who is in the field and he just told me “that he was reading
a report that had a company be hacked through a Wi-Fi enable thermometer. He
also said that he believes there was a British bank was hacked by their own CCTV
cameras through a botnet.” That is crazy that you are not safe from a
thermometer, or even possibly your own security camera system. That is why
cybersecurity and network security are big deal in this field. The equipment need to fight against this type
of thing does not need to be that sophisticated either, here are a few steps of
things that can help you to not get hacked by a Wi-Fi enable microwave:
1. “Use strong Passwords such as
using upper and lowercase letters, numeric, and special characters. I.E Bo$$M@n2018.
2. Install layers of security such as
anti-malware software, anti-virus software and add 2 step verification, PIN,
Bio-metrics, turning off data sharing. Never install apps from anywhere other
than official app stores or sources.
3. Be careful about what you and your
family are doing online so not get to scammed or inappropriate. (Standard, 2018) .”

References:
- INT 100 Text Book (Frank Vahid / Professor of Computer Science and
Engineering / Univ. of California, August 2017)
- Network Security Basic (Professional, 2001)
- Get Back to Basics and boost your
cybersecurity (Standard, 2018)
Comments
Post a Comment