Protecting yourself on the World Wide Web
The Internet is a huge part of our lives. From keeping in touch with friends to learning how to prepare a tasty delicacy, its advantages are endless. But like most things with an advantage, this vast connection of computer networks, also has its own downsides. In this article, I will be covering the necessary steps to take to ensure your safety on the internet.
WHAT IS THE BIG DEAL ANYWAY?
I'm sure this isn't the first article you've come across talking about Internet safety, and it certainly won't be the last. Hence, you might be wondering why so many articles are hammering on this process. One word. Data. No, I don't mean your subscription bundle, but data as in information. This is anything from your name to passwords used to secure your accounts.
Look at it this way. There are bad guys on the internet known as cybercriminals, but let's call them Thanoses. Yes, Thanos as in that big, scary, purple guy in the Avengers, and like the actual Thanos, they are after your infinity stones. Your data!
If they get their hands (or gauntlet), on your data, they can wreak havoc on your world in one snap.
This is where the Avengers come in. In the Marvel Cinematic Universe, these mighty heroes are sworn to protect the earth from all forms of evil. Armed with superpowers, or high-tech devices, this feat is relatively easy to attain. In our case, your superpowers are the safety practices you'll learn here. They'll help you stop these Thanoses from getting their grimy hands on your oh-so-precious infinity stones, and thus, protect your world from destruction.
Okay, enough of that..., for now. Read on to learn how to be the superhero of your data.
WHAT IS INTERNET SAFETY?
This is an act of protecting yourself from the downsides of the online world by engaging in certain practices such as abiding by practical standards, understanding modern technology, and armouring your gadgets.
In simple terms, it just means being safe online.
EXAMPLES OF CYBERCRIMES
Cybercrime is the use of a computer to commit crimes on the internet. In our language, they are methods these Thanoses use to acquire our infinity stones. The following are a few examples of such:
- Phishing: This is a type of fraud where the attacker disguises as a person, company, or brand, with a good reputation, via email or other communication channels to get hold of an individual's information.
Malware: A short form of malicious software, this is a file designed by cybercriminals with the intent of gaining unauthorized access to other software or information, or damaging computer systems. Examples are viruses, adware, ransomware, worms, spyware and Trojan viruses.
Hacking: is the process of using different tools or technology to exploit weaknesses in computer systems to gain access to unauthorized data.
Identity Theft: This is an act of using an individual's personal identifying information like their name or address, without their knowledge, to commit crimes.
Fraud: This is a crime of gaining money or financial related benefits through deceitful methods.
INTERNET SAFETY PRACTICES
Here, we finally get to learn ways of preventing ourselves from being victims of cybercrime. You know what this means? You're getting a superpower!
Use a secure password consisting of alphabets, letters, alphanumeric keys, and symbols.
Do not use the same password across multiple platforms.
Set up Two-factor authentication.
Do not download files or applications from sources you don't trust or sources that aren't verified.
Do not give out your account information to anyone.
Do not open files flagged as malicious by your computer.
Avoid public Wi-fi services.
Use an anti-virus or anti-malware software.
Keep your devices updated.
Use an AD blocker with your browser.
Click on links that begin with 'Https' and not 'Http'.
With these few tips, you should be well-equipped with the basic things needed to be safe on the internet. You have a superpower! But don't stop here, you can read more articles to discover more tips and grow your arsenal. Now go on, apply these and protect your infinity stones-er, your data, I mean your data.
Read the last article I wrote here.
SOURCES
Subscribe to my newsletter
Read articles from Toyibat Adele directly inside your inbox. Subscribe to the newsletter, and don't miss out.
Written by
Toyibat Adele
Toyibat Adele
Data Scientist (in View) • Technical writer • Mechatronics Engineer in the making