Monday, May 13, 2019
If computer security is the answer, what is the problem, and how can Essay
If computer gage is the answer, what is the puzzle, and how can computer security solve that problem - Essay ExampleAs stated above, computer security deals with several(prenominal) issues, which are related to applied science (Wong & Yeung 2009). Facebook is one of the most popular social network site globally (Kirkpatrick 2010). However, there are several security issues that pose a danger to the users. It is quite clear that Facebook has fallen victim to various security issues such as hacking, hoax applications, counterfeit product pages and affiliate spam among other issues (Stoll 2011). The number of facebook hackings has continually increased in the recent years. There are numerous aspects that make Facebook more prone to hacking since, most individuals usually post their personal information (Sterling 1993).This information en adequates the hackers steal the personal identity of the account (Reese 2008). Therefore, it is more than easier to protect account hacking using c omputer security. There are several methodologies that can be active to impede hackers from accessing a facebook account. These methodologies include using a strong password, logging out after finishing, changing the password more often and using an anti-spyware software (Erickson 2008).Using complicated passwords is one of the best ways to deal with facebook security issues. In fact, individuals are advised to use complicated passwords, which hackers are not able to retrieve (Kabay & Bosworth 2011). This will ensure that their personal information and that of their friends is protected against any alterations. Facebook users are to a fault suppositional to logout immediately they are done using the social network (Tipton & Krause 2012). This is because another individual can transfer malware and key loggers which affect privacy terms of the account (Burger 1991).Changing the password more often also reduces the chances of the account being hacked (Mitnick, Simon & Wozniak 2011 ). This toughens the ability of the hackers to find out
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.