assessment 2 ITC

Insecure Internet. Has your personal information been leaked?

ITC Assessment 2 – persuasive Blog

“unethical human activity is primarily responsible for a lack of privacy and safety on the internet ”

In the era of the Internet, information technology develops rapidly and has been widely popularized in various fields of society, greatly facilitating People’s Daily life and work, but at the same time, it also brings corresponding troubles to people, among which the most obvious is the problem of network security.  Therefore, how to solve the network security problems in the Internet era and protect people’s privacy data from being leaked has become a focus of many relevant scholars and researchers.  In order to solve this problem, we must deeply analyze the causes behind it and take targeted strategies to deal with it on this basis.  this blog discusses the problems of network security and privacy protection in the Internet era, and puts forward feasible countermeasures against these problems.

At present, the world has entered the Internet age. Improve the security of the Internet, so as to better play the application value of the Internet, these have already become people’s consensus. However, due to various reasons, network security problems in the Internet era always exist, and even show a growing trend.

As soon as you start searching, Google tracks your personal information, Gmail scans your daily social and work profiles, the browser finds out about your likes and dislikes, Maps tracks where you’ve been, and Android knows where you are and what you’re doing online.

How powerful can Google be with seven billion monthly active apps?

However, a technology as powerful as Google cannot ensure the security of user data.

In the public 2016 Pwn2Own hacker competition, China’s 360 Vulcan Team took only 11 seconds to break the Google Chrome browser and successfully gained the highest permissions on the system.

In the 2016 Mobile Pwn2Own 2016 World Hacker Competition, a team from Tencent Cohen Lab took 10 seconds to break the Google Nexus 6P.

These, we can only see, and we do not know the circumstances of the actual occurrence of how many hacker attacks war? Take Facebook as an example. Facebook’s security department admits that more than 600,000 accounts are hacked every day. That’s roughly one account every 140 milliseconds, and it takes us 300 milliseconds to blink.

The problem of network security damages people’s interests such as economic interests, political interests, personal reputation and so on. There are many reasons for network security problems, including the following: malicious attacks by network hackers; Network itself and network management is not sound enough; Some software has design flaws; Some malicious websites deliberately set traps.

In fact, compared with the real world, the virtual online world is more likely to disclose personal information. On Facebook, blogs, messages, websites, Apps, etc. Disclosing your daily life on social media platforms, clicking on unsolicited links while using the Internet or mobile phones, and using public Wi-Fi in public places can all reveal personal information.
The lack of self-protection awareness and means is one of the important reasons for the disclosure of personal information. And some public websites excessively collect citizens’ personal information, which is another reason for information leakage.
Or received harassing phone calls, they know your name, birthday and phone number, when was this leaked? There are many ways they can get your information and commit fraud. So we have to protect our privacy.
In recent years, network telecom fraud has become a social hazard, many people money damage, check each telecom fraud cases, most are never met even thousands of miles away the cheater can fraud success, one of the key factors is that they have mastered our personal information. Personal information is related to the security of everyone’s property.
The services on most website require our registration. If we want enjoy these services, we have to provide much private information, including our name, address, gender, telephone number and sometimes bank account number. Due to the poor administration and weak security, our information might be open, stolen or sold on the internet. Even sometimes the information will be misused by the criminals.
Considering the above-mentioned, we must enhance the alertness when using the internet. First, when we need internet service, we should try to log on those big legal websites. Second, if the service requires important private information, you should think twice before you type it in.

How to protect privacy and information

“Here are some ways you can boost your online privacy.

Limit the personal information you share on social media.

Browse in incognito or private mode.

Use a different search engine.

Use a virtual private network.

Be careful where you click.

Secure your mobile devices, too.

Use quality antivirus software.”

As mentioned above, information security issues in the Internet era mainly include leakage of information privacy, lag of information security protection system and network malicious attacks. Therefore, it is necessary to strengthen the protection of information security, increase the supervision of data information, adjust the strategy of information collection, and legally restrict the behavior of information leakage and network attack. The key to strengthen information security protection is the technical level of data information protection, improve the level of information security prevention system, and timely update and upgrade, and then deal with the information security problems, promote the further development of information security.
The lack of self-protection awareness and means is one of the important reasons for the disclosure of personal information. And some public websites excessively collect citizens’ personal information, which is another reason for information leakage.
The services on most website require our registration. If we want enjoy these services, we have to provide much private information, including our name, address, gender, telephone number and sometimes bank account number. Due to the poor administration and weak security, our information might be open, stolen or sold on the internet. Even sometimes the information will be misused by the criminals.

ITC Assessment 2 – persuasive Blog

“unethical human activity is primarily responsible for a lack of privacy and safety on the internet ”

references:
https://www.i-programmer.info/news/149-security/9556-pwn2own2016.html
https://www.prnewswire.com/news-releases/pwn2own-2016-chinese-researcher-hacks-google-chrome-within-11-minutes-300237705.html
https://www.google.com.hk/amp/s/www.medindia.net/amp/news/facebook-admits-thwarting-600000-hacking-attempts-a-day-92666-1.htm

4.4 ITC

ITC174 Assess Task 1, Digital Artefacts. I recorded a podcast using my Apple Voice. Because it’s easy to use. Then I uploaded my URL to the Module 4 Padlet. I used Wevideo to make my video. It is a video in which the plastic water cup is more suitable for kids than the glass water cup. However, after I finished the video, I found that it can only be exported after purchasing the Plan. I had no choice but to record the video and upload it to Youtube.

And shared it on the CSU ThinkSpace blog.

it is help me a lots.

Assessment 2 part1 Blog Post

Through the study of module one and module two, we know the two platforms of LinkedIn and Blog. First of all, talk about LinkedIn. This platform can edit your own profile to let people on the network know more about you. You can also find and connect with alumni, employers, mentors and people in the same profession through the LinkedIn platform.Obviously you can use LinkedIn to discuss some learning-related issues with alumni, mentors, and people in the same profession. And you can also apply for jobs through employers’ daily posts, so that you can easily find a job that suits you.When you establish contact with them, you will find that they will help you a lot. You can also find the groups you are interested in on the LinkedIn platform and join them, and then you can see the posts they posted about your major or you are interested in every day. You can also comment and interact with others below the post.The moment that LinkedIn let me ahha was when I knew the LinkedIn platform, because this platform is particularly helpful for students or people who want to find a job. The operation is simple, fast and convenient.Next, let’s talk about Blog. The function of CSU Blog is very unique. You can use it to create your own blog. This will be your personal space, ready to write, share and reflect on your learning, and send your writing. When you finish your study, all materials can be downloaded and uploaded to your own external blog. You can also search for the class’s blog on Blog, just enter the URL of the class’s blog.And teachers can evaluate your Assessment through the Blog, so it’s also a platform for you to connect with your teacher.

I’ve learned a lot about digital networks through LinkedIn and Blog

 

 

picnik

Picnic is an online photo editing service. This platform allows users to edit images, add styles to imported images, and use basic editing tools such as cropping and resizing images. Many of Picnik’s basic photo editing tools are free to use.
But now you can’t use Picnik because the Picnik platform stopped downloading saved content and shut down completely on April 19, 2013.

Step 1 of 2
Please sign in first
You are on your way to create a site.