Final Group Project: Internet Security

by Marisa Tassone and Ka Ki To

 

Post 1

Why should we be concerned about Internet Security

12

The Internet has made our lives so much more convenient as it allows us to shop online, bank online and share something on the social media with people all over the world! While we can enjoy all these aspects, we should also understand how to be safe online.  Some people may think that things such as sending an email to a specific recipient will only be revealed to the designated person, however there are a lot more in between. These in-between steps are things we need to be concerned with.

A huge concern with online security is cookies. Cookies are used to tracking what you have done online and where you have been online.  Another one is online privacy; the information that you post about your personal life are not just visible to your friends and families without the proper security measures. They can also be accessible by other people who you have never met. Cybercrime is also rampant in our interoperable world and requires our attention. We should deal with these with care.

Even though there are many things to be watched out for online, using the internet has become  apart of our daily lives and we would not want to live in a world without it. Luckily there are some practices to follow for us to be protected from main security issues.

 

Post 2

Cookies and internet security

2

Cookies are small bits of code that are embedded onto your computer while browsing websites on the internet; they are used to keep track of interactions on sites as well as specific interactions with third party sites. However, there are various types of cookies that can be embedded onto your computer.

The first type of cookie is the “tracking” cookie. These cookies are generally set on your computer by advertising companies to display ads that are specifically tailed to your perceived interests based on the movements they see you make along the internet. The data collected can be used by both first parties and third parties.

The second type of cookie is the “authentification” cookie which are generally used by first parties. These help identify you as a unique visitor to a site and record your interactions on said site. These cookies make much of the simplicity of the internet possible. For example, authentification cookies allow automatic log-ins as well as permit online shopping – both of which would not be possible if the cookie could not track you from one page to another.

Third party data is stored by “Data Brokers” that have specific profiles outlining information about sites you visit, online purchases you make, and even articles you have read. This profile also contains your Laptops IP address and cell phone GPS locations. Based on this, the data brokers can split us into very specific demographics based on various factors. This allows advertisers to specifically target ads to the right people. Not only does it allow the advertisers to target specific age groups but also interest groups as well, hugely broadening the scope of who they can target.

From this information, it is simple to see the positives of cookie use however the ability for third parties to track a certain IP address and be able to see their sites and path is worrisome when you think about who could be watching every step you take on the internet.

 

Post 3

Ways to Reduce Risks of Going Online

3

On the last blogs posts, we have talked about concerns and risks of going online. While we have to live with them, there are things we can do to manage them better. The following are several ways we can deal with and minimize the risks.

  1.      Change the setting of the browser to minimize the sharing of our information. Go to your browser settings where you can do limit the sharing of information.
  2.     Blocking cookies and trackers to stop the tracking of your interactions online.
  3.     Choosing another way such as email and chat to share information.
  4.      Choosing a safer browser. Firefox and Google Chrome are generally safer browsers than others.
  5.      Installing Antivirus software that has better protection from viruses.
  6.      Paying attention to details such as suspicious email and those links in the email contents.

There are lot of way we can do to reduce risks. This article from Entrepreneur also provides good advices to reduce those risks. I think one key to this is to increase awareness about it. Learning more about how these risks affect our usage of the internet and ways to prevent them will make us enjoying the advantages more.

 

Post 4

Cybercrime

4

There are many types of cybercrime to be aware of when on the internet but of all the various ways cybercrimes can be committed, there are four main cybercrimes.

The most common kind of cybercrime is Malware which is when a program or website uploads unwanted and likely destructive code to your computer. The malware (malicious code) is able to have various implications on your computer. These implications can range from extensive criminal activity to a simple nuisance. The less malicious malware can be something as simple as adware on the computer prompting annoying pop-ups whenever you start various programs. In the present day this harmless malware is much less of an issue as many web browsers have increased security designed to stop adware from being downloaded. However, the more common forms of malware are much more dangerous than simple adware. Some forms of malware can access your computer remotely allowing the hacker to use your camera and Bluetooth and keep track of keystrokes. However, these harmful viruses cannot install themselves on your computer. You are required to click the install button; hackers purposely design the button as various things to trick you into clicking it without your awareness; generally, though phishing and spoofing. This has become a growing concern over time as a result of interoperability becoming so common.

Phishing is a kind of cybercrime in which hackers/phishers contact people using email, websites, or telephone calls/messages and ask directly for information like logins or passwords. Some even prompt people to click a link that installs malware directly onto the computer.

A sub-concept of phishing is called spoofing. Essentially, spoofing is a dummy website that is an impersonation of an existing website or organization. These spoof sites are used to have you log-in to a familiar site and then upon clicking a button you download the malware onto your computer. Similar to a counterfeit designer bag, there is something that is always slightly “off” about the design. Upon looking closer you could see that the site doesn’t look quite right, paying attention and recognizing these signs could save you from cybercrime.

 

Post 5

Being safe online

5

Being safe online is a combination of being vigilant and equipping yourself with the correct software to protect yourself from internet threats. The technological world moves very quickly and new developments are made daily by hackers – its very important to keep yourself as safe as you can on the internet.

Running an antivirus software is incredibly important to have on your computer. Regardless of the computer platform you’re using, it’s absolutely vital to have a good antivirus software running and scanning for various possible viruses. It also is helpful to run the same sort of antivirus software on your smartphone to protect and scan for viruses on your phone which could spread onto your computer using Bluetooth or other connecting services.

Having a good web browser is also a great place to start to protect yourself online as well. Internet Explorer tends to have less resistance to threats than browsers like Google Chrome and Mozilla Firefox. The lack of interoperability of Google Chrome and Mozilla Firefox tends to promote its safety as a piece of malware that gets into one device cannot spread as easily as it can on Explorer. Ensuring your browser is updated regularly is also highly important as these companies often release security updates to protect your computer further.  Both Firefox and Chrome also have the ability to install free add-ons and security patches to make your browser even more safe.

Of course, being vigilant is one of the most valuable tools you can use in protecting yourself from viruses on the computer. Understanding that hackers are trying to trick you into downloading and installing malicious code – understand that many reputable organizations would not contact you via the internet/email; it one is trying to, it may be fraudulent.

Check out Norton by Symantec’s prevention tips to stay safe when surfing online!

 

SOURCES:

Image 1: https://commons.wikimedia.org/wiki/File:Credit_card_theft.jpg

Image 2: https://commons.wikimedia.org/wiki/File:Stoned-virus-hexacode.png

Image 3: https://pixabay.com/en/antivirus-vector-technology-1349649/

Image 4: Created by Marisa Tassone

Image 5: https://www.flickr.com/photos/111692634@N04/18495846450

Week 6 Personal Brand Statement

Personal Branding2
Before developing my personal brand statement, I took some time to understand its functions and the components that it consists of. From my understanding, personal brand statement must be concise and persuasive enough as it should give a lasting impression to someone who you want his or her attention on your characteristics and qualities. Especially when the personal branch statement is to impress a person such as a recruiter who would also need to meet a lot more other candidates, standing out from the crowd becomes an essential factor to consider when developing one.
I have developed a personal brand statement for job seeking purpose. Knowing the audience should be considered as the first step for creating a personal brand statement. The second step I took was listing my skills and characteristics that are potentially required for this role. Then I picked those that were matched with the impression that I wanted to give to that specific person. As I was creating for the job seeking purpose, I carefully matched those listed skills and characteristics with the required skills in the job posting. At the same time, I reworded it in a way that tells what I did in my last job and how I did it. I think a good personal brand statement can’t be worded too general as other people who were also interviewing for this job will state similar things. To catch recruiter’s attention, I added my own qualities making me a better candidate for this specific position.
The following is my personal brand statement:
With proven experience working in a wholesale company for the past four years, I was able to identify clients’ needs and match their demand while searching for the best product prices in the market as a wholesale buyer. I continuously watch news to keep my knowledge most updated in this industry.

 

Week 2 Tips on Google Search

google-searching-tricks-and-tips

  1. How would you search for an exact word or phrase?

It can be done by putting a double quote around the phrase or word to search for exact word or phrase.

  1. How would you search for something on a specific site?

It can be done by the use of an operator to add extra request. For example if I am searching for personal tax rates from the Canada Revenue Agency website only, I should type in personal tax rates: cra-arc.gc.ca. It will return results from pages about personal tax rates from the CRA website only.

  1. How would you correctly search for a definition?

This can be done by typing in “define” in front of a word that I want to define. For example, if I want to search the definition of apple, I would type in define apple.

  1. How would you search for a specific product available within a specific price range?

I would type in the product name following by the price range. For example, if I want to search for the price range of a lamp, I would type in lamp $50..$100.

  1. How would you search for a specific filetype?

This can be done by type in Filetype: and the information that I want to search with this specific file type. For Example, I can type in Filetype: PDF CPA requirements to search CPA requirements documents in PDF file only

  1. How would you include or ignore words in your search?

To include words, I should put in the plus sign or “and” in front of the additional word that I want to include in the search results. For example, if I want to include Ottawa in my search result from searching Ryerson, I should type in Ryerson +Ottawa or Ryerson and Ottawa. Then the search result will return with information about Ryerson related to Ottawa.

I can put a minus sign in front of a word that I want to be excluded from the search results. For example, if I want the information about the company Apple only, I should type in apple -fruit to exclude the information about the fruit. The minus sign should be right in front of the word which I want to be excluded.

  1. How would you find sites/pages similar to an existing one?

It can be done by typing in the word “related” following by the similar website I am looking for. For example, if I am looking for similar website like Ryerson.ca, I would type in Related: Ryerson.ca

  1. How would you confirm the exact form of a quote even if you were missing some of the words?

This can be done by the use of asterisk to replace the missing words in a quote. For example if I want to search for no pain no gain without knowing what is the second word for certain , I can put in no * no gain.

  1. How would you search for pages containing two connected words?

It can be done by the use of operator “OR” in between the two words, so the pages containing either or both words will be returned in the search results.

  1. How would you search for social media content containing a specific tag?

It can be done by using the operator @ in front of the name that I am looking for.

Week 1 Best Practice for Online Posting

Social media creates both benefits and risks in people’s life. As a result, cautions should be taken when presenting oneself on the internet as its effect can be devastating if it is not properly managed. According to recent news, a tutor from University of Sydney was posting racist posts against Chinese student in a Chinese blogging Weibo. Although he was not using his real name in the registration, evidence was found to prove that tutor was the account holder. Attempting to hide oneself with a made-up identity would not protect him or her from being discovered as there is a lot of other information can be found about him with other sources.
Creating a professional personal brand on the internet is critical especially when it comes to things like employment seeking. Nowadays, some employers may be searching a candidate on social media like Facebook and LinkedIn before they make a hiring decision. As a result, the best practice for online posting is being professional at all times. Some employers may be monitoring employees’ social media to ensure they do not post anything harming the employers’ reputation even after the hiring. For instance, some financial institutions would have their security department to monitor employees’ social media account to ensure no corporate logo is used or posted on their personal accounts.
Social media can be used for presenting one’s qualifications. For instance, communication skill is one of the most important skills that employers are looking for. People can demonstrate this skill by writing concise blog. In addition, they can also post their accomplishments on the social media.
Reference:

University of Sydney Tutor Wu Wei Resigns after Calling students Pigs