Protecting Your Information Online
It is become so easy to get hacked and your
information gets stolen in less than a minute.
Recent statistics show that
more than 143 million customers of the credit reporting service had their
personal and financial information stolen from September 2017 (DiGiacomo 2017).
To avoid that, it is an important to know how to protect your information and
make sure it’s safe on your phone. To look at this topic we need to understand
more about how to protect our data and make sure we are aware of the privacy
settings that are available when using social media accounts or surfing apps.
However, Security and Portable Devices is a very important part of protecting
information online that we need study closely, and learn about tips to make
sure we don’t get hacked and be vulnerable to identity theft. Another topic
that we need to look at is WikiLeaks, a huge organization that displays secret
information to the public.
1. Privacy and Portable devices
Getting your data loss is a serious problem
and protecting our privacy essential when using portable devices. Privacy is
defined as the freedom of not having someone interfere in your life without
your permission (Di Pietro and Mancini 78), although there are multiple ways
that can cause harm to your device and cause your information to be lost.
First, there are cookies and they are a small bit of data that help the website
to remember who you are not in some cases those websites don’t inform you that
they’re transferring those cookies to your portable device or to your computer.
Another factor can be the history list and cache and they are simply mean the
website you browse into and all the downloads you made from them. The third way
can be viruses and worms and those things are very harmful to the device that
can very quickly and easily destroy your data and harm the system. The fourth
factor can be spams that are associated with e-mail, other than being annoying,
it can also shift viruses to the browser. Other factors are snooping and
spoofing, snooping mean the opportunities created to get access to the device
when an email is passing different hands and spoofing is when an e-mail is sent
with a phone address (Randall et al 102). Some other risks can also be the
Usenet and it means the messages you post to a new group, it is important to
know that newsgroup messages are big sources of e-mail addresses of mass
markets who deliver pitches to your mailbox. Another one is the plugging leaks
it is just mean that there is no need to post private information if you don’t
want it made public (Swaine 1). It is
necessary to avoid that and keep track of all your programs and make sure you
did all the privacy methods in order to not be one of the victims of data theft
or identity theft and there are several ways to do that. First, manage your
cookies: a cookie manager can make u look at the cookie and decide if you want
to accept it or rejected. Second, cover your tracks, make sure to delete your
history list on demand and on schedule. Also, filter your spam minimize your
spam by filtering it, for that you need a spam- filtering tool. Another tip is
to use encryption that only the intended receptions read your email. Although,
it is an important step to install an antivirus program that use scanning
methods to detect viruses and disinfect your device. Also, it an important step
to take to install a firewall, that can be used to prevent access via a network
or the internet (Randall et al 103). As a last notice, it is good to know more
about your privacy rights if you are interested in stopping threads rather than
reacting to them, The Electronic Privacy Information Center (EPIC) provides an
index of current state privacy laws (Swaine 2).
WikiLeaks in an organization that it’s been a
lot of news about it, and whether it is legal or not. In 2006 by the freedom of
information, an activist called Julian Assange created WikiLeaks which is an
organization and a website that provides a secure way to leak information that
they believe public should and interested in knowing it (Harcup 1). WikiLeaks
mostly specializes in materials involving war, spying and corrupting, it
analyzes data giving in such a subject and provided it to the public (McClure
1). There is important to know that journalists and publishers have contracts
with WikiLeaks with extremely secure communications with organizations all over
the world, and not to forget, many of those publishers and journalists have one
more than 20+ rewards for their publications (McClure 1). Here are some facts
about WikiLeaks, the organization actually released almost 400,000 secret US
military “war logs” about conflicts in Afghanistan and Iraq (Harcup 1). The
most recent and interesting one, can be the release of some emails from the
Hillary Clinton Case (McClure 1). Still the purpose of WikiLeaks is to publish
documents that have a historical and political importance (McClure 1).
It is imperative to study the
topic of how to protect your information online with its two-parts, portable
and data devices and WikiLeaks which is a part of computer security in general.
Since all of our life now is about and around all of the electronic devices and
we all do store or information there because they have a large capacity and
easy to access. Although, it’s dangerous just to keep using those devices in
whatever ways without knowing that there is somebody, somewhere who want to
know your information and get your data or causes harm to your device. For
that, we need to learn how to use our pcs and our portable devices in a safe
way, taking control of all our data and use all of the available methods and
suggestions to keep our information in a safe, secure place.
Work Cited Page:
DiGiacomo, John. “2017 Security Breaches: Frequency
and Severity on the Rise”: Revision Legal 2017.
Di Pietro, Roberto, and Luigi Mancini.
“Security and Privacy Issues of Handheld and Wearable Wireless
Devices.” Communications of the ACM46.9 (2003): 74-79. Web. . 11 December 2017.
Harcup, Tony. “WikiLeaks.” A Dictionary of Journalism,
2014, pp. A Dictionary of Journalism.
McClure, Olivia. “WikiLeaks.” UWIRE
Text 20 Oct. 2016: 1. Web. 11 December 2017.
Randall, Neil and Roberts-Witt, & Sarah L. “Are You Safe
Online? PC Magazine Labs Tests 40 Products and Services for Protecting Yourself
and Your Business. (Internet/Web/Online Service Information).” PC
Magazine 18.15 (1999): 101. EBSCOhost. Web. 11 December 2017.
Swaine, Michael. “Protecting Your Privacy
Online. (Net Traveler) (Internet/Web/Online Service Information) (Column).” MacUser 12.11
(1996): 135. Web.11 December 2017.