Computer Science, asked by haniya15, 1 year ago

write the steps that we can take to protect while surfing the internet.​

Answers

Answered by SnehaSingh200324
1

Answer:

  • How to protect yourself while on the Internet
  • Below are all of the steps and suggestions everyone should follow to keep their computers and their personal information safe while being connected to the Internet.
  • Note
  • All of the following information should be followed and understood by all computer users, regardless of what type of computer, operating system, or device they are using.
  • Verify data is encrypted
  • Computer security
  • When sending confidential information over the Internet, such as usernames, passwords, or credit card numbers, only send it securely. To verify this, look for a small lock (Internet browser security lock) icon in the bottom right corner of your browser window or next to the address bar, as shown below. If visible, the lock icon should also be in the locked position and not unlocked.
  • Internet Explorer 7.0 secure address bar
  • Internet Explorer secure address bar.
  • We also suggest making sure the URL begins with https, as shown above.
  • While the lock is in the locked position, data is encrypted, which helps prevent anyone from understanding the data if it's intercepted. When no lock is visible or in the unlocked position, all information is plain text and could be read if intercepted. If a web page is not secure, such as an online forum, use a password you wouldn't use with protected sites, such as your online banking website.
  • Use a safe password
  • Websites that store confidential data, such as an online bank site, need to use strong passwords. Also, it is highly recommended that you use a different password for each website that requires a login. If you need help remembering your passwords, consider using a password manager.
  • When available always enable two-factor authentication
  • Two-factor authentication adds additional protection by requiring an additional step in verifying a login. With two-factor authentication, after verifying your password, if the service does not recognize your computer, it sends your phone a text message with a verification code. If someone had your password but did not have your phone, even with a valid password, they cannot access your account.
  • Tip
  • Two-factor authentication should at the very least be enabled on your e-mail account. Most account passwords can be reset using the forgot password feature, which sends a new password or link to reset the password to the e-mail address on file. If anyone has access to your e-mail account, they could get the new password for your account.
  • Keep your operating system and software up-to-date
  • Many of the updates that are released by developers of operating systems are related to computer security-related issues. Make sure your operating system is always running the latest updates and that you're running an operating system that is still supported by the developer. Older operating systems like Microsoft Windows XP are no longer supported by Microsoft and therefore no longer get updates.
  • Always be cautious of e-mail links and attachments
  • One of the most common methods of spreading viruses and malware is through e-mail attachments and hyperlinks sent through e-mail. Always be extremely cautious when dealing with any attachments or links in e-mails you've received from anyone (even friends and family).
  • How does a computer get infected with a virus or spyware?
  • E-mail is not encrypted
  • Never transmit confidential data over e-mail, such as passwords, credit card information, etc. E-mail is not encrypted, and if intercepted by a third-party, it could be read.
  • Be aware of phishing scams
  • Phishing
  • Familiarize yourself with phishing scams and techniques, which are used to trick you into divulging your account information. Online banking sites, Paypal, eBay, Amazon, and other popular sites that require logins are popular targets.
  • Use caution when accepting or agreeing to prompts
  • When you're prompted to install any program or add-on, make sure to read and understand the agreement before clicking on the Ok button. If you do not understand the agreement or feel it is not necessary to install the program, cancel or close the window.
  • Additionally, when installing any program, watch for any check box that asks if it's ok to install a third-party program, toolbar, etc. These are never required and often cause more issues than good. Leave these boxes unchecked.

Explanation:

Answered by vk7752686
1

Answer:

When sending confidential information over the Internet, such as usernames, passwords, or credit card numbers, only send it securely. To verify this, look for a small lock (Internet browser security lock) icon in the bottom right corner of your browser window or next to the address bar, as shown below. If visible, the lock icon should also be in the locked position and not unlocked.

Internet Explorer 7.0 secure address bar

Internet Explorer secure address bar.

We also suggest making sure the URL begins with https, as shown above.

While the lock is in the locked position, data is encrypted, which helps prevent anyone from understanding the data if it's intercepted. When no lock is visible or in the unlocked position, all information is plain text and could be read if intercepted. If a web page is not secure, such as an online forum, use a password you wouldn't use with protected sites, such as your online banking website.

Use a safe password

Websites that store confidential data, such as an online bank site, need to use strong passwords. Also, it is highly recommended that you use a different password for each website that requires a login. If you need help remembering your passwords, consider using a password manager.

When available always enable two-factor authentication

Two-factor authentication adds additional protection by requiring an additional step in verifying a login. With two-factor authentication, after verifying your password, if the service does not recognize your computer, it sends your phone a text message with a verification code. If someone had your password but did not have your phone, even with a valid password, they cannot access your account.

Tip

Two-factor authentication should at the very least be enabled on your e-mail account. Most account passwords can be reset using the forgot password feature, which sends a new password or link to reset the password to the e-mail address on file. If anyone has access to your e-mail account, they could get the new password for your account.

Keep your operating system and software up-to-date

Many of the updates that are released by developers of operating systems are related to computer security-related issues. Make sure your operating system is always running the latest updates and that you're running an operating system that is still supported by the developer. Older operating systems like Microsoft Windows XP are no longer supported by Microsoft and therefore no longer get updates.

Always be cautious of e-mail links and attachments

One of the most common methods of spreading viruses and malware is through e-mail attachments and hyperlinks sent through e-mail. Always be extremely cautious when dealing with any attachments or links in e-mails you've received from anyone (even friends and family).

How does a computer get infected with a virus or spyware?

E-mail is not encrypted

Never transmit confidential data over e-mail, such as passwords, credit card information, etc. E-mail is not encrypted, and if intercepted by a third-party, it could be read.

Be aware of phishing scams

Phishing

Familiarize yourself with phishing scams and techniques, which are used to trick you into divulging your account information. Online banking sites, Paypal, eBay, Amazon, and other popular sites that require logins are popular targets.

Use caution when accepting or agreeing to prompts

When you're prompted to install any program or add-on, make sure to read and understand the agreement before clicking on the Ok button. If you do not understand the agreement or feel it is not necessary to install the program, cancel or close the window.

Additionally, when installing any program, watch for any check box that asks if it's ok to install a third-party program, toolbar, etc. These are never required and often cause more issues than good. Leave these boxes unchecked.

Be cautious where you're logging in from

Business

Your place of work can install key loggers or use other methods of monitoring the computer while online. Someone who has access to this information could read these logs and gather usernames and passwords. Also, do not store any passwords in your browser if your computer is shared with other co-workers.

Wireless network

When on a wireless network, realize that all information sent to and from your computer can be intercepted and read by someone nearby. Prevent this from happening by only logging onto a secure network using WEP or WPA (only use WEP if WPA is not available). If this is a home wireless network, make sure it is secure.

Similar questions