English Deutsch Français Italiano Español Português 繁體中文 Bahasa Indonesia Tiếng Việt ภาษาไทย
All categories

i need 3 paragraphs on internet security it needs to explain in one paragraph why it is important, in the other how can it affect you, and in the las one how it is harmful like identity theft :)

2007-03-13 10:35:56 · 11 answers · asked by 36696 2 in Education & Reference Homework Help

11 answers

Firewalls

A firewall blocks all traffic except through authorized ports on your computer, thus restricting unfettered access. A stateful firewall is a more secure form of firewall, and system administrators often combine a proxy firewall with a packet-filtering firewall to create a highly secure system; this would be overkill for a home system, but is more common in business. Most home users would use a software firewall, while some high risk servers and computers might need a hardware firewall.


Anti-virus

Some bad people or companies write programs like computer viruses, worms, trojan horses and spyware. These programs are all characterised as being unwanted software that install themselves on your computer through deception.

Trojan horses are simply programs that conceal their true purpose or include a hidden functionality that a user would not want.

Worms are characterised by having the ability to replicate themselves and viruses are similar except that they achieve this by adding their code onto third party software. Once a virus or worm has infected a computer, it would typically infect other programs (in the case of viruses) and other computers.

Viruses also slow down system performance and cause strange system behavior and in many cases do serious harm to computers, either as deliberate, malicious damage or as unintentional side effects. In order to prevent damage by viruses and worms, you need either to completely isolate your computer from dangers (impractical for many people or networks) or install antivirus software, which typically runs in the background on your computer, detecting any suspicious software and preventing it from running.

Some malware that can be classified as trojans with a limited payload are not detected by most antivirus software and may require the use of other software designed to detect other classes of malware, including spyware.

Generally anti-virus software may be also be used to scan all of the files on a computer occasionally for extra peace of mind. Because of the continuing increase in the number of viruses and worms being identified, all good anti-virus software includes a facility to regularly update the data that is used to identify viruses. As well as the commercial antivirus programs, which generally require an annual subscription, there are free antivirus programs available, but the best commercial programs appear to be a little more reliable at present. Several companies provide a comparison of the performance of different antivirus programs which should be useful in making a decision as to which to use.


Anti-spyware

There are several kinds of threats:

Spyware is software that runs on a computer without the explicit permission of its user. It often gathers private information from a users computer and sends this data over the Internet back to the software manufacturer.
Adware is software that runs on a computer without the owner's consent, much like spyware. However, instead of taking information, it typically runs in the background and displays random or targeted pop-up advertisements. In many cases, this slows the computer down and may also cause software conflicts. ♥♥♥

2007-03-13 10:41:41 · answer #1 · answered by St♥rmy Skye 6 · 0 1

Guidelines for Parents

By taking responsibility for your children’s online computer use, parents can greatly minimize any potential risks of being online. Make it a family rule to:

* Never give out identifying information– home address, school name, or telephone number– in a public message such as chat or bulletin boards, and be sure you’re dealing with someone that both you and your child know and trust before giving it out via E-mail. Think carefully before revealing any personal information such as age, marital status, or financial information. Consider using a pseudonym or unlisting your child’s name if your service allows it.
* Get to know the services your child uses. If you don’t know how to log on, get your child to show you. Find out what types of information it offers and whether there are ways for parents to block out objectionable material.

* Never allow a child to arrange a face-to-face meeting with another computer user without parental permission. If a meeting is arranged, make the first one in a public spot, and be sure to accompany your child.

* Never respond to messages or bulletin board items that are suggestive, obscene, belligerent, threatening, or make you feel uncomfortable. Encourage your children to tell you if they encounters such messages. If you or your child receives a message that is harassing, of a sexual nature, or threatening, forward a copy of the message to your service provider and ask for their assistance.

* If a meeting is arranged, make the first one in a public spot.

* Should you become aware of the transmission, use, or viewing of child pornography while online, immediately report this to the National Center for Missing and Exploited Children by calling 1-800-843-5678 or visiting the CyberTipLine online. You should also notify your online service.

* Remember that people online may not be who they seem. Because you can’t see or even hear the person it would be easy for someone to misrepresent him- or herself. Thus, someone indicating that “she” is a “12-year-old girl” could in reality be a 40-year-old man.

* Remember that everything you read online may not be true. Any offer that’s “too good to be true” probably is. Be very careful about any offers that involve your coming to a meeting or having someone visit your house.
* Set reasonable rules and guidelines for computer use by your children (see “Kids Rules for Online Safety“). Discuss these rules and post them near the computer as a reminder. Remember to monitor their compliance with these rules, especially when it comes to the amount of time your children spend on the computer. A child or teenager’s excessive use of online services or bulletin boards, especially late at night, may be a clue that there is a potential problem. Remember that personal computers and online services should not be used as electronic babysitters.

* Be sure to make this a family activity. Consider keeping the computer in a family room rather than the child’s bedroom. Get to know their “online friends” just as you get to know all of their other friends.

2007-03-13 10:40:02 · answer #2 · answered by Anthony N 1 · 0 1

Sorry, but I doubt someone is gonna actually write the whole entire report/paragraph whatever. Haha .. that's your homework .. they might give you websites though.

2007-03-13 10:38:43 · answer #3 · answered by Brittany 4 · 0 1

Important because don't want to be robbed or identity be stolen. You could be robbed. It IS identity theft.

2007-03-13 10:38:43 · answer #4 · answered by Ilooklikemyavatar..exactly 3 · 0 1

you may acquire a music from the laptop and positioned it into your telephone. Then bypass to the sound settings or anyplace you alter your sound and choose the downloaded music as your texting sound or some thing. some telephones have it yet differently the place you may perfect-click the music to realize "use as". From there, i assume you may opt for "use as texting sound" or soemthing like that.

2016-10-02 01:46:48 · answer #5 · answered by ? 4 · 0 0

You should just Google it. Although CERT would be great for security. As would a couple of good websites:

2007-03-13 10:41:02 · answer #6 · answered by Mike James 1 · 0 1

3 paragraphs?!?! you could have written that in the time it took you to write the question on yahoo...

2007-03-13 10:40:27 · answer #7 · answered by Anonymous · 0 1

There's a difference between asking for help and asking someone to do your work for you. Sorry, i decline.

2007-03-13 10:39:03 · answer #8 · answered by old lady 7 · 0 1

i can't believe anyone actually gave you any info. do you do all your homework like this? just google it and save us all some grief if you really dont want to actually learn anything.

2007-03-13 10:45:02 · answer #9 · answered by tamboz 3 · 0 1

Let me get to work on that right away... if you don't hear from me by tomorrow, wait longer

2007-03-13 10:38:45 · answer #10 · answered by LGT 3 · 0 1

fedest.com, questions and answers