INTERNET SECURITY AND ITS NEED
What Is Internet Security?
Internet
security are all those precautions that are taken to
protect all the elements that are part of the network, such as infrastructure
and information, which is usually the most affected by cyber criminals.
Computer security is responsible for creating methods, procedures
and standards that are able to identify and eliminate vulnerabilities in
information and physical equipment, such as computers.
One of the best ways to stay protected on the internet is
through antivirus, to understand them much better, enter our course on computer
viruses and antivirus.
Main
Risks on the Internet
Some of the things that cybercriminals seek to achieve
through the internet are:
- Ø Information
theft
- Ø Information
damage
- Ø Attacks
on systems or equipment
- Ø Identity
fraud
- Ø Sale
of personal data
- Ø Money
theft
Cybercriminals use various ways to attack a victim online,
such as viruses with which they manage to compromise systems and alter the
operation of electronic devices, or phishing, which consists of a cybercriminal
posing as a different person by through emails, instant messaging or social
networks to acquire confidential information such as passwords, credit cards,
among others.
How
to Prevent It?
If you handle a lot of information and you have several
teams, as in the cases of companies, it is best to ask for help from
professionals in charge of internet
security.
On the other hand, as a user you can take several
preventive measures such as keeping the antivirus activated and updated on our
devices with internet connection, avoiding financial operations on open
networks or public computers and checking the attachments of messages from
strangers and avoiding downloading them if its content is not fully certain. Your
safety is very important to us.
Your security may be at risk by the permissions you grant
to the applications you install. Let’s see how?
Permissions
When Installing an Application
It is no secret to anyone that mobile applications are
becoming more and more useful and, in some cases, necessary. With the
advancement of technology, having a smart phone is easier and many already come
with multiple applications for all tastes.
From them we do the bank procedures, we buy products, we
book trips, we have fun with social networks and games, among many other
things. However, when installing them, we pay very little attention to the permissions
that they ask us to access our cell phone.
Did you know that by installing some applications you are
giving your information to someone else? Below you will see some permissions
that apps request to be installed:
Location: With
this permission they can have detailed information about where you are through
GPS and non-detailed information from the network.
Network
communication: By accepting this permission, the application
that you are going to install will have unlimited access to the internet.
Storage: You
can modify or delete content from the USB storage, such as the photos you have
saved on your cell phone.
Hardware
controls: With this option, you give permission for them to access
your camera to record videos or audios and take photos.
Accounts: The
application will be able to obtain a list of the accounts that you have created
on your device.
Messages: Here
some applications will be able to read your text messages, edit them and
receive the messages that come to you.
System
tools: If you want to put your phone to sleep, this permission
could prevent it. They can also write the synchronization settings and modify
the global system, such as activating or deactivating Wi-Fi.
Programming
tools: With this permission you can check access to protected
content.
Network
communication: If you allow them to access this permission,
the application developer will be able to see the status of the network you are
connected to.
Business
card: This permission gives control to the contact details. They
will be able to write and read contact details. They can also read your profile
data, confidential information and calendar events.
Calls: This
option allows application developers to read the status of the phone (whether
you are talking on the phone or not), the IMEI of the device and the identifying
number of the phone.
Services
that cost you money: With this permission you can call phone
numbers directly.
That information in the wrong hands could give you a lot of
headaches.
When you install an application, you not only get a service, you are also giving, in part, control of your cell phone, so before installing an app , check the permissions that it requests and analyze if it is worth giving them and have a total security over your device.
Comments
Post a Comment