【Internet Security】What is it? + Risks + Prevention ▷ 2022

No one is safe online, it is something we have to assume and the sooner we do it, the better for everyone. It is also necessary create awareness in the whole family about the importance of privacyboth on a personal level and on any other and how vulnerable we areno matter how much we consume content and no matter how experienced we think we are.

Internet security is much more than we imagine and we want you to know what it consists of in detail. With this concept we can refer to many things, making the list very long and this post endless.

However, we will try to approach it from the most general points, so that, when you finish this reading, you will know, at least how secure are you onlineWhat are you exposed to and how can you avoid it?

What is Internet security?

Internet security is a compendium of actions with which any user reducesas far as possible, the vulnerability to which it is exposed by the simple fact of have connected, with any device, to a network.

So we can say that they are all those mechanisms that can be used in our favor so that we are not scammed, stolen, our information is not known beyond what we wish to give, malicious elements are not introduced into our devices and software, etc.

These might be both internal and external and serve, as we say, to reduce and eliminate those elements that make us vulnerable against equipment, people, procedures.

An easier way to understand computer, technological or industrial security (always depending on where we apply it) is to know precisely what we are exposed to as well as the solutions that exist to avoid it: that would be security that we want to achieve so much.

What are the main dangers that we must protect ourselves from when surfing the net?

Though there is a lot where to investigate, there are certain practices that are the most used at the domestic and small-scale level, that is, to which all common Internet users are subjected on a daily basis:

Malicious information theft

Malicious and aggressive information theft is done for various purposes. As usual, seeks to supplantOne way or another, the identity of the user, either to create profiles on certain types of platforms, try to access their accounts, sensitive information, blackmail… The other main purposes are selling that information or direct access to our systems.

The ways to get this data are very varied and more or less professional and meticulous. from create a friendship” with the affected future to extract the information in a “legal” way until introduce malware on your computer to copy your passwords, for example, going through downloading your information to try to access, with it, spaces where you may have other information of interest or the .

And, in turn, how do they do all this? They pose as workers or entities to ask us for some information (what is known as ), creating fake profiles on the Internet, through attractive emails or SMS with which you are encouraged to click on a link…

See also  We have just discovered water for the first time outside of Earth

unwanted capture of information

Not to be confused with the above. Information is also stolen from us, let’s be clear (or, at least, that’s how we feel about it). However, in this case it is done in a way that is supposed to the user gives his consent and its purposeAt least at present, it is assumed that it is not malicious.

We are talking about the data that Google collects from our searches and that is used to get ads later, out there, precisely about things that we have searched for or similar, or that information that Facebook sold a few years ago and that has caused the law to be modified. ; does it ring a bell?

of your profiles on any page, the use of one or the other extensions, cache, type of pop-ups that you accept, stored. All this supposes information that is used to analyze you and create attractive resources for you.

All this information They are data that we are not hidingbecause we type them, obviously, but nobody tells us that they are going to be used… or?

The truth, and more since it happened, is that yes we are informed and we also consent when “” and other information that is given to us when installing apps, extensions or even games, when we participate in raffles or simply, the policy of a website that is postedin view of all, and that indicate that you should read and that, with the acceptance of the creation of a user, you are accepting.

Nobody does it, nobody reads 10, 20 or 50 pages about data use; we all scroll and accept and, with this, we are consenting, whether we like it or not. Please be aware, however, that circumstances have sometimes been ruled abusive in which this data usage information was gimmicky, difficult to understand, or too hidden. Still, don’t relax, if you accept, it’s your fault.

The good thing about all this is that There are many solutions to each of the circumstances. No one forces you to become a user on a site whose policy you don’t like or to install an information-gathering extension, you can clear your cache, configure the privacy of your profiles or the navigation you carry out on each site, etc.

Internet scams

As in everything, there are more and less elaborate ones, but there are, and many, tens, hundreds, thousands. From the African king who needs your help to clean your money to leave the country and will give you a percentage up to the pyramid processes going through the sale of miracle products or that never arrive.

The phantom investments, loans with conditions that we can not even believe how good they are, job offers in which they ask you money or sending something, directly, sentimentalrentals and, obviously, identity theft for the purpose of any scam (data theft, attracting customers who sign an abusive agreement, etc.).

See also  【 Types of Encryptions and Keys for Safer Wi-Fi 】 List ▷ 2022

What scams are everywhere; the stamp or donation scam of goods to the sects are two clear examples that we all already know, but, on the net it seems that we still have not gotten used to it. People with bad intentions abound and, if there is a channel, there will be a method; we are not safe anywhere and therefore be wary of anything that sounds too good.

Bullying

There are many forms of bullying online.. Each has its objectives, its methodology and its particularitiesAlthough, there is a main common aspect: a victim who suffers humiliating and inferior treatment One way or another.

We present a small list of harassment on the Internet:

  • Extortion. Extortion is the use of resources such as threats, intimidation or violence to achieve something. When the purpose is sexual, it is called , which is the use of that superiority to obtain sex, be it physical, in meetings, or through the network. In general, which is the sending of sexual content in digital format (a real danger and vulnerability!), It usually leads to sextortion, using the uploaded material itself to blackmail.
  • . It is stalking A person. Obviously, it is achieved because there is an excess of information or access to the contents of said user. The famous buzzes, the insistent crushes on Facebook or looking for a person by one means or another as he blocks you are many clear. It is also considered as such the treatment between couples who investigate what the other does and use it to have a controlcause fights, etc.
  • . It is bullying that occurs, in theory, between equals. is attacked in a repetitive way, including put downs, insults, lack of value to any aspect of the attacker. It often happens that it occurs physically, that is, face to face, especially between minors, and, with the standardization of the Internet, it moves there. This, of course, is not always the case; Someone may attack another without knowing him at all, because of a simple opinion they have read or who knows the motivation (which is never an excuse, of course).
  • . It is the concept that refers to a bullying in which the victim is a minor and the perpetrator is older old. the intention is sexual. It can, of course, lead to sextortion although, initially, the idea is captivate the victim so that she is the one who “accesses” the situations that they give The two main ways to achieve this are with false profiles in which the identity of a minor is impersonated (or a non-existent profile is created directly) or by offering something that the minor lacks to create a bond of trust and even affection. .
  • gender violence. It is given to people of the opposite sex. Their effect on the Internet occurs when done in a groupgenerally, defending radical ideas, although, of course, it will not always be this way. Value is taken away from the person because of their sex, either openly or covertly.
  • violence in general. A circumstance in which the way of speaking and treating another is more violent than he wants to bear. This can be somewhat subjective depending on the user and the type of relationship, although it is clear that you should never give in and accept actions, ideas and words that you are not comfortable with, even if they may seem harmless (which is sometimes the case). case, making it more difficult for the victim to notice and act).
  • image attack. The information divulgation of someone or the expression of false data in order to attack the image of someone, be it personal, professional or otherwise, is also considered a type of bullying. The opinion of another given opinion would also enter here, in which the first ridicules the content or the way of thinking of the second; make a mockeryspeaking clear.
See also  【Hours to Post on Instagram】What Are They and Why? ▷ 2022

cyber attacks

Are that are made to teams connected to the network. It is not something personal but a practice that seeks to alter the operation of a machine or to be able to access or control its information with a purpose.

Steps to increase the security of your browsing and Internet connection

In order to be safe from many of the situations that we have detailed above, it is necessary to have good practices when browsing the Internet, so that security increases in one way or another.

Next, we will detail a list:

privacy settings

It is essential to begin by making a correct and balanced configuration of our privacy at all levels. This means entering the configuration menus of all the spaces and elements related to the network.

Browser

Your browser, no matter which one you use, will have a configuration section within your own settings. Look for it and dedicate a long time to it, because you can’t even imagine the amount of aspects related to your privacy and with the navigation and memory options and information capture that’s there and that you can choose to keep or disable.

Social networks

Social networks, so commonly used, deserve an extra mention. We are not talking about the content that you decide to upload yourself, attention! but of other settings you need to make identically, inquiring in your profile options of each of the platforms and wisely choosing the parameters that best…

Loading Facebook Comments ...
Loading Disqus Comments ...