Throughout
module three I found it interesting on how there are different ways people can
hack and you and your personal information. I have made a thorough security
plan that I plan to follow to protect me and my family/friends. The
plan that I have mapped out and set to use protects not just one aspect but a
few.
The
first section of my plan is to protect my personal information while also using
safe web browsing. How I plan to do this is when using any of my information
(SS, credit cards, zips) I am going to use a private browser. Not only does
this hide things from immediate people, but also hackers trying to find my
cookies, cache, etc.
I am
not always at home when I use Wi-Fi, this includes my mobile device and
computer which I use a lot of different places for my homework. I never knew
that using public Wi-Fi can increase your chances of getting hacked. Ways I
plan to decrease my chances are as follows:
When
facing a malware, it’s important to know that there are different types and
they can happen very quickly. Different forms are spyware, which transfer
personal information such as credit card numbers. Another kind is computer
viruses. To protect myself, I have found a few ways:
·
Protecting my
computer by using a strong security software such as “McAfee Internet Security.”
·
Enable automatic
updates
·
Using caution
when opening attachments
·
Backing up my
files regularly.
To
be honest, I never heard of phishing. Phishing to me just never seemed real,
but since it has come to my attention that it is out there, I was put able to
do some research and figure out ways to stop these hackers from getting my information.
Phishing is an attempt of sending out emails to people to try and obtain
different information. Ways to protect yourself are as follows:
·
Thoroughly
reading through each email that asks for me to update my information.
·
Checking the
sources
·
Entering my
secure information on only secure websites.
Online
tracking is exactly what it sounds like. It is hackers tracking your
interactions that you do on the web, such as: browsing histories, email and
website interactions, and website visitors. These things are tracked,
collected, and stored for marketing and advertising purposes. Just like any
other way of hacking, there are also ways to protect yourself. With some research,
I found some of the simplest and most effective ways:
·
Install ad block
plus
·
Change cookie
settings and uncheck third party cookies.
·
Turn off referrers
·
Install HTTPS
everywhere
People
everywhere get hacked through their passwords every day. It is not uncommon for
someone to get hacked through their social media accounts or their emails. I
personally have had my Facebook account hacked before and figuring out how to
unhack it is a long process if they change your password on you. A few ways to
protect yourself include the following:
·
Do not pick a
weak password.
·
Use multifactor authentication
·
Biometrics
(fingerprints.)
·
Use a different
password for each account.
·
Consider a
password manager.
Things
such as your laptop, and mobile phone have become increasingly popular and easy
to use. They’re portable, and quick. Even though these things may be easy and accessible
when needed, they are also very easy to hack into if the right precautions are
not taken.
·
Password protect/
auto lock on.
·
Follow security
protocols.
·
Wipe data before
disposing it.
·
Report to the
police if stolen or lost, immediately.
·
Disconnect wireless access, such as Bluetooth or Wi-Fi.
Protecting your laptop and/or desktop is almost the
same as protecting your mobile devices. Both electronics are used every day all
day, and people are constantly typing in all types of personal information.
·
Download security
software that updates automatically
·
Treat your
information like you would cash
·
Check out companies
before visiting them and giving them your information
·
Only give your
personal information out over encrypted websites only.
·
Protect passwords
·
Back up files.
File sharing can be risky, especially if you are
someone to share music files or other types with your peers. With regular file
sharing, you would use your web browser. In peer-to-peer sharing though, you
use a software program. This software program helps you locate computers that
have the file you may be looking for.
Protecting yourself is simple. With each risk, there
is also a way to protect yourself.
The first kind of risk is malicious code.
·
Install fire wall
and anti-virus
Second
type of risk is Privacy Risk.
·
Know what you’re
sharing and with who.
Online
shopping is something we are all guilty of, including me. I never take the time to go about shopping safely, which I am so thankful nothing has happened. Their are a few protocols you can take to ensure the safety of your personal information.
- Skip attachments and hyperlinks
- Don't use public Wi-Fi
- Protect your device
- Upgrade Passwords
- Review statements
Home appliances or other devices are usually hooked up to wifis, which could make it easier for people to hack you. Protecting not only your smart phone and/ or laptop but also things like your fridge, wireless music players etc.
- Secure your network
- Know what is connected
- Keep up to date
With each device and action that you may need to protect, some of them have similarities on what to do and how to do it. Protecting personal information not only saves you in the long run, but also saves your spouse and/or kids from the outcomes. It is important to make sure everything you use the internet with has its own protection.
This assignment not only helped me to realize that their are people out their that want what you have, and will do almost anything to take it, but also on how to protect yourself. I enjoyed learning and reading, while also making my own security plan for my protection.