Tuesday, February 21, 2017


Throughout module three I found it interesting on how there are different ways people can hack and you and your personal information. I have made a thorough security plan that I plan to follow to protect me and my family/friends. The plan that I have mapped out and set to use protects not just one aspect but a few.
The first section of my plan is to protect my personal information while also using safe web browsing. How I plan to do this is when using any of my information (SS, credit cards, zips) I am going to use a private browser. Not only does this hide things from immediate people, but also hackers trying to find my cookies, cache, etc.

I am not always at home when I use Wi-Fi, this includes my mobile device and computer which I use a lot of different places for my homework. I never knew that using public Wi-Fi can increase your chances of getting hacked. Ways I plan to decrease my chances are as follows:
  • Using two factor authentications
  • Protecting my passwords
  • Avoid automatically connecting to Wi-Fi hotspots
  • Turning on my firewall
When facing a malware, it’s important to know that there are different types and they can happen very quickly. Different forms are spyware, which transfer personal information such as credit card numbers. Another kind is computer viruses. To protect myself, I have found a few ways:

·        Protecting my computer by using a strong security software such as “McAfee Internet Security.”

·        Enable automatic updates

·        Using caution when opening attachments

·        Backing up my files regularly.
To be honest, I never heard of phishing. Phishing to me just never seemed real, but since it has come to my attention that it is out there, I was put able to do some research and figure out ways to stop these hackers from getting my information. Phishing is an attempt of sending out emails to people to try and obtain different information. Ways to protect yourself are as follows:

·        Thoroughly reading through each email that asks for me to update my information.

·        Checking the sources

·        Entering my secure information on only secure websites.

Online tracking is exactly what it sounds like. It is hackers tracking your interactions that you do on the web, such as: browsing histories, email and website interactions, and website visitors. These things are tracked, collected, and stored for marketing and advertising purposes. Just like any other way of hacking, there are also ways to protect yourself. With some research, I found some of the simplest and most effective ways:

·        Install ad block plus

·        Change cookie settings and uncheck third party cookies.

·        Turn off referrers

·        Install HTTPS everywhere
People everywhere get hacked through their passwords every day. It is not uncommon for someone to get hacked through their social media accounts or their emails. I personally have had my Facebook account hacked before and figuring out how to unhack it is a long process if they change your password on you. A few ways to protect yourself include the following:

·        Do not pick a weak password.

·        Use multifactor authentication

·        Biometrics (fingerprints.)

·        Use a different password for each account.

·        Consider a password manager.
Things such as your laptop, and mobile phone have become increasingly popular and easy to use. They’re portable, and quick. Even though these things may be easy and accessible when needed, they are also very easy to hack into if the right precautions are not taken.

·        Password protect/ auto lock on.

·        Follow security protocols.

·        Wipe data before disposing it.

·        Report to the police if stolen or lost, immediately.

·        Disconnect wireless access, such as Bluetooth or Wi-Fi.

Protecting your laptop and/or desktop is almost the same as protecting your mobile devices. Both electronics are used every day all day, and people are constantly typing in all types of personal information.

·        Download security software that updates automatically

·        Treat your information like you would cash

·        Check out companies before visiting them and giving them your information

·        Only give your personal information out over encrypted websites only.

·        Protect passwords

·        Back up files.

File sharing can be risky, especially if you are someone to share music files or other types with your peers. With regular file sharing, you would use your web browser. In peer-to-peer sharing though, you use a software program. This software program helps you locate computers that have the file you may be looking for.
Protecting yourself is simple. With each risk, there is also a way to protect yourself.
The first kind of risk is malicious code.

·        Install fire wall and anti-virus

Second type of risk is Privacy Risk.

·        Know what you’re sharing and with who.
Online shopping is something we are all guilty of, including me. I never take the time to go about shopping safely, which I am so thankful nothing has happened. Their are a few protocols you can take to ensure the safety of your personal information.
  • Skip attachments and hyperlinks
  • Don't use public Wi-Fi
  • Protect your device
  • Upgrade Passwords
  • Review statements
Home appliances or other devices are usually hooked up to wifis, which could make it easier for people to hack you. Protecting not only your smart phone and/ or laptop but also things like your fridge, wireless music players etc.
  • Secure your network
  • Know what is connected
  • Keep up to date
With each device and action that you may need to protect, some of them have similarities on what to do and how to do it. Protecting personal information not only saves you in the long run, but also saves your spouse and/or kids from the outcomes. It is important to make sure everything you use the internet with has its own protection.
This assignment not only helped me to realize that their are people out their that want what you have, and will do almost anything to take it, but also on how to protect yourself. I enjoyed learning and reading, while also making my own security plan for my protection.


No comments:

Post a Comment