POE Digital Citizenship
Tuesday 31 May 2016
Referencing/ Biblography for overall posts
References
Debono, M., 2013. Some Sneaky Ways Hackers Use to Try And Steal Information (and how to counteract them). [Online]
Available at: http://www.reqtest.com/general/some-sneaky-ways-hackers-use-to-try-and-steal-information-and-how-to-counteract-them/
[Accessed 22 May 2016].
Huddleston, C., 2013. 6 Ways You Invite Hackers to Steal Your Personal Information. [Online]
Available at: http://www.m.kiplinger.com/article/credit/T048-C011-S001-6-ways-you-invite-hackers-to-steal-your-personal-i.html
[Accessed 20 May 2016].
Rouse, M., 2016. What is identity theft?. [Online]
Available at: http://www.searchsecurity.techtarget.com/definition/identity-theft
[Accessed 17 May 2016].
Schwartz, M., 2012. 8 ways to Avoid Getting Your Life Hacked. [Online]
Available at: http://www.darkreading.com/attacks-and-breaches/8-ways-to-avoid-getting-your-life-hacked/d/d-id/1105707
[Accessed 23 May 2016].
V, B., 2016. Computer Virus (virus). [Online]
Available at: http://www.webopedia.com/TERM/V/virus.html
[Accessed 17 May 2016].
Weisseman, C., 2015. 7 easy ways to avoid being hacked. [Online]
Available at: http://www.businessinsider.com/how-to-avoid-being-hacked-2015-4
[Accessed 22 May 2016].
Digital Security (Question 7)
Q-7
(http://informativontn24.info/noticia/aumenta-la-censura-de-internet-en-todo-el-mundo-por-quinto-ano-consecutivo-74814)
Digital Security
Hackers are able to obtain our private information through the internet.
There are certain ways in which you let hackers obtain your private information.
• The use of fragile passwords- According to (Huddleston, 2013) when you use simple passwords for all your internet related accounts, you’re making it easy for hackers to access your information.
• Using one password for all your accounts- According to (Huddleston, 2013)If a hacker is able to obtain your only password you use for all accounts, they are able to access all your accounts.
• Using numerous credit cards to make online purchases- According to (Huddleston, 2013) the more credit cards you use, the more you increase the chances of hackers getting your personal information and using them.
• Account Phishing Scams- according to (Debono, 2013) are scams created by hackers to trick web users into thinking that they are entering in personal information on a valid website.
• Online Checkouts- according to (Debono, 2013)when shopping online some sites are not entirely secure, they leave out loopholes which enable hackers to access your information.
(http://bl00dyp1r4t3.deviantart.com/art/Hack-the-World-256813528)
How to avoid being hacked
• Do not reply to Spam E-mails- according to (Weisseman, 2015) if you are not sure if an E-mail is spam either click ‘Show original” to find the sources of the E-mail or do not replay to it at all.
• Do not open attachments unless you are entirely sure- according to (Weisseman, 2015) one of the ways businesses get hacked is when a unsuspicious employee downloads mail attachments.
• Use complicated passwords- according to (Weisseman, 2015) a strong password that contains uppercase, numbers, lowercase and number is more secure than an easy password with only lowercase.
• Avoid linking accounts- according to (Schwartz, 2012) avoiding linking accounts reduces the risk of being hacked
• Disengage distant wiping- according to (Schwartz, 2012) remote wiping is an easy way for hackers to access your laptop and wipe your information.
Digital Rights and Responsibilities (Question 5)
https://www.thinglink.com/scene/793759505157455874
https://www.thinglink.com/scene/793762046259757058
Monday 30 May 2016
The Social economy: UNLOCKIN VALUE THROUGH SOCIAL TECHNOLOGIES (Question 3)
Q-3
Social media plays a huge role in our daily lives. it has the ability not only to create and sculpt our careers and personalities, but to also destroy them.
Advantages of Social technologies
l Makes communication easier no matter the proximity between people.
l You are able to handle bank accounts and purchase goods and services over the Internet.
l It keeps us informed regarding the latest news and happenings.
l Doing market research doesn’t take alot of time (Bullas, 2012).
Disadvantages of Social technologies
l There are many cyberbulling cases originating from social media (Claywell, n.d).
l Having your information stolen or your personal information hacked.
l Being exposed to unreliable information.
l Children being exposed to adult content.
Subscribe to:
Posts (Atom)