Wednesday, 28 February 2018

SECURITY MEASURES



Definition of security measures:The precautionary measures taken toward possible danger or damage.

DATA BACKUP



A data backup is the result of copying or archiving files and folders for the purpose of being able to restore them in case of data loss.Data loss can be caused by many things ranging from computer viruses, hardware failures, file corruption, system failure or theft. If you are responsible for business data, a loss may involve critical financial, customer, and company data. If the data is on a personal computer, you could lose financial data and other key files, pictures, music and others that would be hard to replace.In the case of system failure, you can restore the files by copying the backed up files to their original location.Its prevent against data loss.

CRYPTOGRAPHY





Cryptography is a technology of encoding information so it can only be read by authorized individuals.While encryption is a process of converting readable data into unreadable characters to prevent unauthorized access. And decryption is a process to decode encrypted data.

HOW...
  • To read the data, you must decrypt it into readable form.
  • The unencrypted data is called plain text.
  • The encrypted data is called cipher text.
  • To encrypt, plain text converted into cipher text using an encryption key.
IMPORTANCE
  • The process of proving one's identity. 
  • Ensuring that no one can read the message except the intended receiver. 
  • Assuring the receiver that the received message has not been altered in anyway from the original. 
  • A mechanism to prove that the sender really sent this message.
ANTI-VIRUS 


Anti-virus software is a program or set of programs that are designed to prevent, search for, detect and remove software viruses and other malicious software like worms, Trojan horses, adware and more.If and when a virus is detected, the computer displays a warning asking what action should be done, often giving the options to remove, ignore, or move the file to the vault.If a virus infected a computer without an antivirus program, it may delete files, prevent access to files, send spam, spy on you, or perform other malicious actions.

Examples: Norton anti-virus, AVG anti-virus, Kaspersky anti-virus

There are several different companies that build and offer anti-virus software and what each offers can vary but all perform some basic functions:
  • Scan specific files or directories for any malware or known malicious patterns
  • Allow you to schedule scans to automatically run for you
  • Allow you to initiate a scan of a specific file or of your computer, or of a CD or flash drive at any time.
  • Remove any malicious code detected –sometimes you will be notified of an infection and asked if you want to clean the file, other programs will automatically do this behind the scenes.
ANTI-SPYWARE


Spyware is a type of malware that is installed on a computer without the user's knowledge in order to collect information about them. Once installed, spyware can degrades system performance by taking up processing power, installing additional software, or redirecting users' browser activity.It also can monitors user activity on the Internet and transmits that information in the background to someone else.Spyware can also gather information about email addresses and even passwords and credit card numbers.Anti-spyware is a type of software that is designed to detect and remove unwanted spyware programs. 
Anti-spyware software can be used to find and remove spyware that has already been installed on the user's computer. OR it can act much like an anti-virus program by providing real-time protection and preventing spyware from being downloaded in the first place.

Examples :
  • Spyware Blaster
  • Spy Sweeper
FIREWALL


A firewall is a system designed to prevent unauthorized access to or from a private network. A firewall can be implement either through hardware or software form, or a combination of both. Firewalls prevent unauthorized Internet users from accessing private networks connected to the Internet, especially intranets. All messages entering or leaving the intranet (i.e., the local network to which you are connected) must pass through the firewall, which examines each message and blocks those that do not meet the specified rules/security criteria.Rules will decide who can connect to the internet, what kind of connections can be made, which or what kind of files can be transmitted in out.

PHYSICAL ACCESS CONTROL


  • Lock your laptop whether you're at home, in a dorm, in an office, or sitting in a coffee shop, use a security device, such as a laptop security cable.
  • Lock doors and windows, usually adequate to protect the equipment.
  • Put the access code at the door to enter the computer room or your office.
  • Put the CCTV (closed-circuit television) in your office or computer room.
  • Make a policies who can access the computer room or your data center.
HUMAN ASPECTS : AWARENESS

Ethics - Be a good cyber citizen

  • Do not engage in inappropriate conduct, such as cyber bullying, cyber stalking or rude and offensive behavior. 
  • Do not use someone else's password or other identifying information. 


Lock it when you leave

  • It takes only a few seconds to secure your computer and help protect it from unauthorized access. Lock down your computer every time you leave your desk. 
  • Set up a screen-saver that will lock your computer after a pre-set amount of time and require a password to log back in.
Phishing Emails

  • Never respond to requests for personal information via email. Businesses will never ask for personal information in an email. 
  • Do not enter personal information in a pop-up screen.

Dispose of Information Properly
  • Destroy/shred hard copy confidential documents that contain personal information such as social security numbers, credit card numbers, bank account numbers, health records.
  • Ensure you are using the right tools when destroying and disposing of personal information or media storage from your computer and mobile devices
Protect data on mobile devices

  • Choose a strong password. A good password should always include upper and lowercase letters, numbers, and at least one special character. Never use the same password for multiple devices or accounts. 

  • Store your portable devices securely. When not in use, store devices out of sight and when possible in a locked drawer or cabinet.
Expose employees or staff to computer security.

Make a routine check to update from new virus, worm or other malicious threat.

COMPUTER SECURITY RISKS





Definition of computer security risk: Any event or action that could cause a loss of or damage to computer hardware, software, data, information or processing capability.

Other intruders indicate some evidence of their presence either by leaving a message or by deliberately altering or damaging data.Any illegal act involving a computer generally is referred to as a computer crime.Cybercrime refers to online or Internet-based illegal acts. Software used by cybercriminals sometimes is called crimeware.
Perpetrators of cybercrime and other intrusions fall into seven basic categories:

- Hacker, refers to someone who accesses a computer or network illegally. Some hackers claim the intent of their security breaches is to improve security.

-Cracker also is someone who accesses a computer or network illegally but has the intent of. destroying data, stealing information, or other malicious action

-Script kiddie has the same intent as a cracker but does not have the technical skills and knowledge. Often use prewritten hacking and cracking programs to break into computers.

-Corporate spies have excellent computer and networking skills. 
  • hired to break into a specific computer and steal its proprietary data and information.
  • to help identify security risks in their own organization.
-Unethical employees may break into their employers’ computers for a variety of reasons:
  • want to exploit a security weakness, 
  • seek financial gains from selling confidential information
  • disgruntled employees may want revenge.

-Cyber extortionist is someone who uses e-mail as a medium for extortion. 
  • They will send an organization a threatening e-mail message indicating they will expose confidential information if they are not paid a sum of money.

-Cyberterrorist is someone who uses the Internet or network to destroy or damage computers for political reasons. They might targets:
  • the nation’s air traffic control system, 
  • electricity-generating companies,
  • a telecommunications infrastructure.
MALICIOUS CODE is code causing damage to a computer or system. It is code not easily or solely controlled through the use of anti-virus tools.Malicious code can either activate itself or be like a virus requiring user to perform an action, such as clicking on something or opening an email attachment.

COMPUTER VIRUS is a potentially damaging computer program that affects or infects, a computer negatively by altering the way the computer works without the user’s knowledge or permission.A computer virus attaches itself to a program or file enabling it to spread from one computer to another, leaving infections as it travels.It may damage files and system software, including the operating system.Almost all viruses are attached to an executable file.The virus may exist on your computer but it actually cannot infect your computer unless you run or open the malicious program.A computer virus by sharing infecting files or sending emails with viruses as attachments in the email.Even such a simple virus is dangerous because it will quickly use all available memory and bring the system to a halt.
Examples: Melissa, Tequila, Cascade, Invader  

WORM is a program that copies itself repeatedly.For example in memory or on a network, using up resources and possibly shutting down the computer or network.Worms spread from computer to computer, but unlike a virus, it has the capability to travel without any human action.A worm takes advantage of file or information transport features on your system, which is what allows it to travel unaided.The biggest danger with a worm is its capability to replicate itself on your system.It will causing Web servers, network servers and individual computers to stop responding.
Examples: Jerusalem, Sobig,   Nimda, Morris Worm


TROJAN HORSE
A program that hides within or looks like a legitimate program. It does not replicate itself to other computers.At first glance will appear to be useful software but will actually do damage once installed or run on your computer.
Examples: It can change your desktop, adding silly active desktop icons or they can cause serious damage by deleting files and destroying information on your system.
Examples: Netbus, Back Orifice, Subseven, Beast 

UNAUTHORIZED ACCESS AND USE
UNAUTHORIZED ACCESS
  • The use of a computer or network without permission.
UNAUTHORIZED USE
  • The use of a computer or its data for unapproved or possibly illegal activities
To help prevent unauthorized access and use, they should have a written acceptable use policy (AUP) that outlines the computer activities for which the computer and network may and may not be used.An access control is a security measure that defines who can access a computer, when they can access it, and what actions they can take while accessing the computer.Many systems implement access controls using a two-phase process called identification and authentication.Identification verifies that an individual is a valid user.Authentication verifies that the individual is the person he or she claims to be.Three methods of identification and authentication include user names and passwords, possessed objects, and bio metric devices.A user name or user ID (identification), is a unique combination of characters, such as letters of the alphabet or numbers, that identifies one specific user. A password is a private combination of characters associated with the user name that allows access to certain computer resources.Most multiuser (networked) operating systems require that users correctly enter a user name and a password before they can access the data, information and programs stored on a computer or network.

A possessed object is any item that you must carry to gain access to a computer or computer facility. Examples of possessed objects are badges, cards, smart cards and keys.The card you use in an automated teller machine (ATM) is a possessed object that allows access to your bank account.Possessed objects often are used in combination with personal identification numbers. A personal identification number (PIN) is a numeric password, either assigned by a company or selected by a user.A biometric device authenticates a person’s identity by translating a personal characteristic, such as a fingerprint into a digital code.

HARDWARE THEFT


Hardware theft is the act of stealing computer equipment.Hardware vandalism is the act of defacing or destroying computer equipment.Companies, schools, and other organizations that house many computers, however, are at risk of hardware theft.

Safeguards against Hardware Theft and Vandalism:
  • physical access controls, such as locked doors and windows
  • install alarm systems in their buildings
  • physical security devices such as cables that lock the equipment to a desk.
SOFTWARE THEFT


Software theft occurs when someone: 
  • Steals software media
  • Intentionally erases programs
  • Illegally copies a program
  • Illegally registers and/or activates a program.

Steals software media involves a perpetrator physically stealing the media that contain the software or the hardware that contains the media.Intentionally erases programs can occur when a programmer is terminated from, or stops working for a company. Although the programs are company property, some dishonest programmers intentionally remove or disable the  programs they have written from company computers.Illegally copies a program occurs when software is stolen from software manufacturers. This type of theft, called piracy, is by far the most common form of software theft. Illegally registers and/or activates a program involves users illegally obtaining registration numbers and/or activation codes. A program called a keygen, short for key generator, creates software registration numbers and sometimes activation codes. Some individuals create and post keygens so that users can install software without legally purchasing it.

SAFEGUARDS AGAINST SOFTWARE THEFT
To protect software media from being stolen, owners should keep original software boxes and media in a secure location, out of sight of prying eyes.All computer users should back up their files and disks regularly.To protect themselves from software piracy, software manufacturers issue users license agreements.

INFORMATION THEFT
Information theft occurs when someone steals personal or confidential information.If stolen, the loss of information can cause as much damage as (if not more than) hardware or software theft.An unethical company executive may steal or buy stolen information to learn about a competitor.A corrupt individual may steal credit card numbers to make fraudulent purchases.

SAFEGUARDS AGAINST INFORMATION THEFT
Protecting information on computers located on an organization’s premises.To protect information on the internet and networks, organizations and individuals use a variety of encryption techniques.Encryption is a process of converting readable data into unreadable characters to prevent unauthorized access.

SYSTEM FAILURE
A system failure is the prolonged malfunction of a computer.Can cause loss of hardware, software, data, or information.These include aging hardware; natural disasters such as fires, floods, or hurricanes; random events such as electrical power  problems; and even errors in computer programs.

Electrical power variations can cause loss of data and loss of equipment. If the computer equipment is networked, a single power disturbance can damage multiple systems. Electrical disturbances include noise (any unwanted signal), undervoltages (electrical supply drops), and overvoltages (incoming electrical power increases).

SAFEGUARDS AGAINST SYSTEM FAILURE 

To protect against electrical power variations, use a surge protector. A surge protector, also called a surge suppressor, uses special electrical components to smooth out minor noise, provide a stable current flow, and keep an overvoltage from reaching the computer and other electronic equipment.For additional electrical protection, some users connect an uninterruptible power supply to the computer. An uninterruptible power supply (UPS) is a device that contains surge protection circuits and one or more batteries that can provide power during a temporary or permanent loss of power.A UPS connects between your computer and a power source.

AREAS OF COMPUTER ETHICS


Ethics is a set of moral principles that govern the behavior of a group or individual. Therefore, computer ethics is set of moral principles that regulate the use of computers. Some common issues of computer ethics include intellectual property rights (such as copyrighted electronic content), privacy concerns, and how computers affect society.

For example, while it is easy to duplicate copyrighted electronic (or digital) content, computer ethics would suggest that it is wrong to do so without the author's approval. And while it may be possible to access someone's personal information on a computer system, computer ethics would advise that such an action is unethical.

As technology advances, computers continue to have a greater impact on society. Therefore, computer ethics promotes the discussion of how much influence computers should have in areas such as artificial intelligence and human communication. As the world of computers evolves, computer ethics continues to create ethical standards that address new issues raised by new technologies.

There is 5 areas of computer ethics that we need to know which is information accuracy, green computing, codes of conduct, intellectual property and information privacy. for the information accuracy, do not assume all the information on the Web is correct. Users should evaluate the value of a web page before relying on its content. Be ware that the organization providing access to the information may not be the creator of the information.

Green computing is the environmentally responsible and eco-friendly use of computers and their resources. In broader terms, it is also defined as the study of designing, manufacturing or engineering, using and diposing of computing devices in a way that reduces their environmental impact. Its involve reducing the electricity and environmental waste while using a computer. Society has become aware of this waste and its taking measures to combat it.

Some of the actions that has been taken:

  1. Using energy- efficient devices that require little power when   they are not in use.
  2. Buy computers with low power consumption processors and power supplies.
  3. When possible, use outside air to cool the data center

Average computer users can employ the following general tactics to make their computing usage more green:

  1. Use the hibernate or sleep mode when away from a computer for extended periods.
  2. Use flat-screen or LCD monitors, instead of conventional cathode ray tube (CRT) monitors.
  3. Buy energy efficient notebook computers, instead of desktop computers.
  4. Activate the power management features for controlling energy consumption.
  5. Turn off computers at the end of each day.
  6. Refill printer cartridges, rather than buying new ones.

Information privacy is the right of individuals and companies to deny or restrict the collection, use, and dissemination of information about them.The privacy of personal information and usually relates to personal data stored on computer systems.The need to maintain information privacy is applicable to collected personal information such as medical records, financial data, criminal records, political records, business related information or website data.Information privacy is also known as data privacy.Today, huge databases store their data online.Much of the data is personal and confidential and should be accessible only to authorize users. Many individuals and organizations, however, question whether this data really is private. That is, some companies and individuals collect and use this information without your authorization. Web sites often collect data about you, so that they can customize advertisements and send you personalized e-mail messages.Some employers monitor your computer usage and e-mail messages


Intellectual property is unique and original works such as ideas, inventions, literary and artistic works, processes, names and logos.Or, refers to creations of the mind: inventions, literary and artistic works, and symbols, names, images, and designs used in commerce.Intellectual property rights are the rights to which creators are entitled for their work.The intellectual property is divided by three which is patent, trademark, and copyright.

A patent is a set of exclusive rights granted by a government to an inventor or applicant for a limited amount of time (normally 20 years from the filing date). It is a legal document defining ownership of a particular area of new technology.Invention - a product or a process that provides a new way of doing something, or offers a new technical solution to a problem. The right granted by a patent excludes all others from making, using, or selling an invention or products made by an invented process.

Trademark is a word, phrase, symbol, design, combination of letters or numbers, or other device that identifies and distinguishes products and services in the marketplace.Or a distinctive sign which identifies certain goods or services.Or can be any distinctive name or logo.
Examples of well-known Trademarks are: 
  • Coca-Cola 
  • Samsung
  • The Apple logo 
  • The Nike “swoosh”.
Trademark law protects the owner, from competitors stealing your identity or using a name or symbol so similar that it could cause confusion for your clients or customers.By identifying a product or service’s source, a trademark or service mark also serves to protect consumers from deception.For example, the trademark "Nike," along with the Nike "swoosh," identify the shoes made by Nike and distinguish them from shoes made by other companies (e.g. Reebok or Adidas).For example, if a consumer tries a can of Coca-Cola and finds the quality lacking, it will be easy for the consumer to avoid Coca-Cola in the future and instead buy another brand. Trademark law furthers these goals by regulating the proper use of trademarks.

Copyright is a protection provided to the authors of “original works” and includes such things as literary, dramatic, musical, artistic, and certain other intellectual creations, both published and unpublished.

Copyright is an exclusive right and gives its creator, or owner :
  1. To reproduce the copyrighted work
  2. To prepare derivative works
  3. To distribute and sell any copies of the copyrighted work
  4. To perform or display the copyrighted work publicly

Wednesday, 7 February 2018

RULES OF NETIQUETTE

Netiquette is a combination of the words network and etiquette, and is defined as a set of rules for acceptable online behavior. Similarly, online ethics focuses on the acceptable use of online resources in an online social environment.
Both phrases are frequently interchanged and are often combined with the concept of a ’netizen’ which itself is a contraction of the words internet and citizen and refers to both a person who uses the internet to participate in society, and an individual who has accepted the responsibility of using the internet in productive and socially responsible ways.
Underlying this overall concept of socially responsible internet use are a few core pillars, though the details underneath each pillar are still subject to debate.

At a high level using netiquette, applying online ethics, or being a good netizen means:
  • Recognizing that the internet is not some new world in which anything goes, but rather a new dimension or extension of our existing society.
  • Applying the same standards and values online as we are accustomed to applying in the rest of our lives. In simple terms this means that the values society has in place against such things as hate speech and bigotry, copyright violations and other forms of theft, child exploitation and child pornography, remain intact. As do the values around courtesy, kindness, openness, and treating others with the same respect we wish to receive.
  • Accepting that the laws which are currently in place to protect the rights and dignity of citizens apply online, and that where needed, laws are updated to reflect these rights in the extended environment. Theft online is still theft, stalking, bullying, harassing, tormenting online is still abusive, and so on.
  • Acknowledging that cultural differences remain, even when national boundaries no longer apply. This requires finding a way to accept that the social values and norms of some netizens will not be the social values and norms of all netizens.
  • For companies, being a good netizen, applying online ethics, or using netiquette also includes
    1. Respecting the rights to privacy assumed and possessed by citizens in their offline interactions.
    2. Maintaining transparency in their policies and actions so that consumers can easily and quickly understand how that company is using their information, protecting them from harm, and giving users a clear means of ownership and self-determination as to what is, and isn’t shared about them.
Most internet users automatically apply the same responsible respectful behavior online as they do in every other environment and by nature apply netiquette an online ethics, and are good netizens. The minority that fail to apply societal values in some or any environment - including the internet - are quickly identified as exceptions to be dealt with on a social, or criminal level.



RULES OF BEHAVIOR ON THE INTERNET
  • Identify yourself:
    • Begin messages with a salutation and end them with your name.
    • Use a signature (a footer with your identifying information) at the end of a message
  • Include a subject line. Give a descriptive phrase in the subject line of the message header that tells the topic of the message (not just "Hi, there!").
  • Avoid sarcasm. People who don't know you may misinterpret its meaning.
  • Respect others' privacy. Do not quote or forward personal email without the original author's permission.
  • Acknowledge and return messages promptly.
  • Copy with caution. Don't copy everyone you know on each message.
  • No spam (a.k.a. junk mail). Don't contribute to worthless information on the Internet by sending or responding to mass postings of chain letters, rumors, etc.
  • Be concise. Keep messages concise—about one screen, as a rule of thumb.
  • Use appropriate language:
    • Avoid coarse, rough, or rude language.
    • Observe good grammar and spelling.
  • Use appropriate emoticons (emotion icons) to help convey meaning. Use "smiley's" or punctuation such as :-) to convey emotions. See website list of emoticons at http://netlingo.com/smiley.cfm and http://www.robelle.com/smugbook/smiley.html.
  • Use appropriate intensifiers to help convey meaning.
    • Avoid "flaming" (online "screaming") or sentences typed in all caps.
    • Use asterisks surrounding words to indicate italics used for emphasis (*at last*).
    • Use words in brackets, such as (grin), to show a state of mind.
    • Use common acronyms (e.g., LOL for "laugh out loud").
 1. Keep your software/apps updated and delete the ones you don’t use.

Developers and cybercriminals are almost always caught in a cat and mouse game, where cybercriminals search for exploits and developers rush to patch them before too much damage is done.

Most of the times, vulnerabilities are quickly updated, but the real issue is that most users will still use an outdated version and will be vulnerable to the exploit.

Keeping your software up-to-date will go a long way into keeping you safe. But an equally important step is to remove software and apps you no longer use.

Many of these programs still communicate in the bAckground with various servers, and in case of a breach, this data might fall into the wrong hands.

2. Be careful when dealing with emails from unknown sources

Have you received an email from an unknown source? Do you frequently receive -mails from people you don’t know?

Just as in real life, an important rule to stay safe on the internet is to be suspicious of strangers. First, don’t trust emails from people you never met, especially those that ask you to click a link, open an attachment or send a file to the sender.

It’s pretty easy to spot phishing emails. What gives most of the away is the urgency with which they ask you to do something, either because your account may be compromised or your online purchase may have encountered some issue  you need to sort.

To fool the potential victims, the latest trend in e-crime is to deploy spear phishing attacks, where emails appear to come from well-known individuals or banking authority.

But in order for a spear phishing attack to be successful, it needs to appear as genuine and believable. So they launch an elaborate identity theft operation to target and steal your sensitive information.
So when you do get a phishing email, ignore it completely and:
  • ·         don’t reply to the e-mail
  • ·         don’t click the (malicious) attachment
  • ·         don’t click the dangerous links in the e-mail that could download malware on the system


 3. Don’t click that link or online ad

You found a pretty cool link on the Internet and it keeps tempting you to click it. But the source of the link (website or email) seems fishy. You ask yourself: What can the bad guys do to me if I click this link?
The answer is simple: a lot of things could go wrong.

Just by clicking a link in an email or a pop-up window, you could turn your PC into a botnet slave, allow cybercriminals to inject malware into your device, or expose your personal information.

You may think that you are safe from all these dangers because you have a good antivirus product, but nowadays traditional antivirus protection isn’t enough anymore and you need additional weapons in the fight against online dangers.

 4. Just because it’s free, it doesn’t mean it’s safe

As a rule of thumb, paid software is almost always secure and safe. It wouldn’t make sense for a cybercriminal to limit the number of victims by imposing a paywall.

Double check free software using Google, especially if it’s not a well-known one, such as WinRAR.
This filtering process can expose bad reviews, or reveal that the free software is actually a vehicle for malware.

While the free software itself might be safe and legit, the website itself may try to compromise your security through drive-by downloads. These are secret downloads carried in the background, that target software vulnerabilities and system exploits.

Make sure you use a trusted, free program that automatically updates your vulnerable software applications to close security holes in your system.

5. Do not reveal sensitive information online

Social media is the first place criminals check to gather information on you. They will use any piece of information they can find, such as your name, birthdate, address, city, your spouse/partners name, what sort of pet you have, name of the pet. Literally, anything that you can think of.

Improving your social media security settings is a good first step in preventing an identity theft or doxxing.

So, be a bit skeptical about people you meet online and about their intentions. Many people exaggerate their Facebook lives, and depending on how you use it, social media may come back to haunt you.

6. Keep your account information for yourself

Our credentials for online accounts, user names and passwords, hold the keys to a lot of important information, and for that reason they are the most sought after targets by cybercriminals.
Using the same password for more than one site is a risky move, since if a malicious hacker breaks into just one account, he can then take over the others.

One of the better online safety tips is to use a different password for every website you register. The downside however is the difficulty of memorizing them. One workaround is to use password managers, these will remember the login details of every site you use and can even generate some strong password for you use.

The one we recommend the most, both for its features and ease of use, is LastPass. You will only need to remember the master password for LastPass itself.

7. Report illegal activities or offending content

If you notice offending language attacks, like cyber-bullying, hate speech or any form of harassment, do not hesitate to report it.

Using the “Flag as offensive” or “Flag as spam” buttons is proper internet etiquette and should be sufficient to fight back against minor online threats, but other types of content, such child pornography or arms trafficking should be immediately reported to the police.

Reporting cyberbullying is takes on a different importance when children are the targets.

A report on cyber bullying on 2014 gives the following troublesome conclusions:
  • ·         25% of teenagers report that they have experienced repeated bullying
  • ·         52% off young people report being cyber bullied
  • ·         95% of teens who witnessed bullying on social media report they have ignored the behavior
  • ·         cyber bullying affects everyone
  • ·         the most common types of cyber bullying tactics reported are mean, hurtful comments.

So, if you see it, report it. The consequences for cyberbullying can be quite severe, depending on the victim. In rare cases, cyberbullying has been known to push peole into suicide. That’s why it’s so important to report it when children are involved.

8. What you post online stays online forever

We post photos, remarks, location updates and similar content, which we think is fine because we use an anonymous username on a small niche forum.

But niche forums are also indexed by search results, and if you reuse the username, other people can start to connect the dots.

This is called doxxing, where people hunt for information about an internet user until they manage to figure out who they are in real life.

And you may think that your posts and comments are usually ignored or don’t receive much attention, but they still remain there and you never know when they come back at you. Not to mention the fact that search engines save and classify your content on so many online servers.

But if you live in the EU, you benefit from a so called “right to be forgotten”, which will prevent search engines from showing things about your past. Here’s how you can benefit from this right.

To keep it short, when it comes to posting personal content on forums and similar places, follow these guidelines:
  • ·         is this information too personal?
  • ·         delete/edit past posts which reveal too much about you
  • ·         could your content affect your personal or professional life in the future?


9.  Use antivirus protection before you go online

Don’t go online until you have the best antivirus protection that money can buy.

You may think that avoiding adult websites and that sort of thing will keep you safe, but did you know that hackers now hide malicious code even in legitimate websites?

And sometimes not even that is enough. Some ransomware programs are so sophisticated, it is technologically impossible to decrypt them, no matter how much you try.

And in this case, you really need the best tools out there. Heck, some of them are even free.

Though antivirus is still important for our online safety, as Brian Krebs said it:
“Anti-virus is a poor substitute for common sense.”

      10.  Create back-up copies for your important stuff

Though you may have all the security protection in the world, disaster may still hit your system and your valuable files.

It may be a system crash, a hard disk failure, a ransomware attack that encrypts your entire operating system or it may be a human mistake.

There are so many reasons something can go wrong for you and your sensitive information, even if you followed all the netiquette rules in the book.

To emphasize the importance of this point, we can tell you that a while ago we interviewed a series of security experts in the IT industry, and one recurring theme was the importance of backing up your information.

Wednesday, 31 January 2018

TYPES OF WEBSITE



TYPES OF WEBSITE



PORTAL


1) Portal is a term, generally synonymous with gateway, for a World Wide Web site that is or proposes to be a major starting site for users when they get connected to the Web or that users tend to visit as an anchor site. There are general portals and specialized or niche portals. Some major general portals include Yahoo, Excite, Netscape, Lycos, CNET, Microsoft Network, and America Online's AOL.com. Examples of niche portals include Garden.com (for gardeners), Fool.com (for investors), and SearchNetworking.com (for network administrators).A number of large access providers offer portals to the Web for their own users. Most portals have adopted the Yahoo style of content categories with a text-intensive, faster loading page that visitors will find easy to use and to return to. Companies with portal sites have attracted much stock market investor interest because portals are viewed as able to command large audiences and numbers of advertising viewers.Typical services offered by portal sites include a directory of Web sites, a facility to search for other sites, news, weather information, e-mail, stock quotes, phone and map information, and sometimes a community forum. Excite is among the first portals to offer users the ability to create a site that is personalized for individual interests.The term portal space is used to mean the total number of major sites competing to be one of the portals.
2) In fantasy games, science-fiction, and some "New Age" philosophies, a portal is a gateway to another world of the past, present, or future, or to an expanded awareness.
3) In 3-D graphics development, portal rendering is a technique that increases the effect of realism and speeds up presentation.

BUSINESS

Contains content that promotes or sells product or service.
  • Many of these enterprises also allow you to purchase their products or services online.
  • Examples: Pearl Haya Gallery, Anakku brand, Walt Disney Company  and Kraft Brands 

BLOG

A blog (a truncation of the expression "weblog") is a discussion or informational website published on the World Wide Web consisting of discrete, often informal diary-style text entries ("posts"). Posts are typically displayed in reverse chronological order, so that the most recent post appears first, at the top of the web page. Until 2009, blogs were usually the work of a single individual,[citation needed] occasionally of a small group, and often covered a single subject or topic. In the 2010s, "multi-author blogs" (MABs) have developed, with posts written by large numbers of authors and sometimes professionally edited. MABs from newspapers, other media outlets, universities, think tanks, advocacy groups, and similar institutions account for an increasing quantity of blog traffic. The rise of Twitter and other "microblogging" systems helps integrate MABs and single-author blogs into the news media. Blog can also be used as a verb, meaning to maintain or add content to a blog.
The emergence and growth of blogs in the late 1990s coincided with the advent of web publishing tools that facilitated the posting of content by non-technical users who did not have much experience with HTML or computer programming. Previously, a knowledge of such technologies as HTML and File Transfer Protocol had been required to publish content on the Web, and as such, early Web users tended to be hackers and computer enthusiasts. In the 2010s, the majority are interactive Web 2.0 websites, allowing visitors to leave online comments, and it is this interactivity that distinguishes them from other static websites. In that sense, blogging can be seen as a form of social networking service. Indeed, bloggers do not only produce content to post on their blogs, but also often build social relations with their readers and other bloggers.However, there are high-readership blogs which do not allow comments.

Many blogs provide commentary on a particular subject or topic, ranging from politics to sports. Others function as more personal online diaries, and others function more as online brand advertising of a particular individual or company. A typical blog combines text, digital images, and links to other blogs, web pages, and other media related to its topic. The ability of readers to leave publicly viewable comments, and interact with other commenters, is an important contribution to the popularity of many blogs. However, blog owners or authors often moderate and filter online comments to remove hate speech or other offensive content. Most blogs are primarily textual, although some focus on art (art blogs), photographs (photoblogs), videos (video blogs or "vlogs"), music (MP3 blogs), and audio (podcasts). In education, blogs can be used as instructional resources. These blogs are referred to as edublogs. Microblogging is another type of blogging, featuring very short posts.

On 16 February 2011, there were over 156 million public blogs in existence. On 20 February 2014, there were around 172 million Tumblr and 75.8 million WordPress blogs in existence worldwide. According to critics and other bloggers, Blogger is the most popular blogging service used today. However, Blogger does not offer public statistics.Technorati lists 1.3 million blogs as of February 22, 2014.

WIKI


A wiki is a website on which users collaboratively modify content and structure directly from the web browser. In a typical wiki, text is written using a simplified markup language and often edited with the help of a rich-text editor.

A wiki is run using wiki software, otherwise known as a wiki engine. A wiki engine is a type of content management system, but it differs from most other such systems, including blog software, in that the content is created without any defined owner or leader, and wikis have little implicit structure, allowing structure to emerge according to the needs of the users. There are dozens of different wiki engines in use, both standalone and part of other software, such as bug tracking systems. Some wiki engines are open source, whereas others are proprietary. Some permit control over different functions (levels of access); for example, editing rights may permit changing, adding or removing material. Others may permit access without enforcing access control. Other rules may be imposed to organize content.

The online encyclopedia project Wikipedia is by far the most popular wiki-based website, and is one of the most widely viewed sites of any kind in the world, having been ranked in the top ten since 2007.Wikipedia is not a single wiki but rather a collection of hundreds of wikis, one for each language. There are tens of thousands of other wikis in use, both public and private, including wikis functioning as knowledge management resources, notetaking tools, community websites and intranets. The English-language Wikipedia has the largest collection of articles; as of September 2016, it had over five million articles. Ward Cunningham, the developer of the first wiki software, WikiWikiWeb, originally described it as "the simplest online database that could possibly work"."Wiki" is a Hawaiian word meaning "quick".

ONLINE SOCIAL NETWORK



Online social network is defines a social networking site as "A website that provides a virtual community for people interested in a particular subject or just to 'hang out' together." While this is an accurate description, a more detailed definition of online social networking would also encompass all of the ways people can connect.
Online networks such as Facebook, Twitter, MySpace, and LinkedIn all offer users a variety of ways to increase their networks, share notes and various types of media, and connect on a variety of levels.

Some of the ways people can network on these sites include:

Having current friends or connections suggest other people you may want to network with
Sharing photos, audio and video files, written works, links, and other media
Posting a resume or work experience for job searching and recruiting
Promoting a brand or service to those who may need the product or service
Social Networking for Personal Use
Many people join a social network because their current friends and family are using the service and they want to stay in contact. Once you've been using a social networking site for a while, you'll inevitable come in contact with other people you know, or knew long ago.

These networks are great places to catch up with old friends, share current and old photos, and find other friends whom you may have lost contact with along the way.
In this case, the definition of social networking includes nostalgia and reconnecting.

Social Networking for Professionals
Professionals have always networked in one way or another. Whether it's a business meeting, a conference, or a larger industry event, meeting other people who are involved in the same profession is a necessity.
Social networks, especially those like LinkedIn that cater to businesses and professionals, provide another platform to meet career peers and influential people in the industry. Putting yourself out there in a social network and spreading the word of your business is easy to do, and can result in catching the attention of many people in your profession.

INTERNET SERVICE

INTERNET SERVICE

In order to connect to the Internet, you need to use an Internet service. Internet service provides a way for data to be transferred from Internet servers to your computer. An Internet service provider is a company that provides access to the Internet. Most ISPs require you to subscribe in order to use their services, but there are ways to connect to the Internet for free. Some of the most common ways to connect to the Internet are dial-up, DSL, cable and wireless services.

WWW
The World Wide Web (WWW) is combination of all resources and users on the Internet that are using the Hypertext Transfer Protocol (HTTP).A broader definition comes from the World Wide Web Consortium (W3C):"The World Wide Web is the universe of network-accessible information, an embodiment of human knowledge."The Web, as it's commonly known, is often confused with the internet. Although the two are intricately connected, they are different things. The internet is, as its name implies, a network -- a vast, global network that incorporates a multitude of lesser networks. As such, the internet consists of supporting infrastructure and other technologies. In contrast, the Web is a communications model that, through HTTP, enables the exchange of information over the internet.Tim Berners-Lee is the inventor of the Web and the director of the W3C, the organization that oversees its development. Berners-Lee developed hypertext, the method of instant cross-referencing that supports communications on the Web, making it easy to link content on one web page to content located elsewhere. The introduction of hypertext revolutionized the way people used the internet.In 1989, Berners-Lee began work on the first World Wide Web server at CERN. He called the server "httpd” and dubbed the first client "WWW.” Originally, WWW was just a WYSIWYG hypertext browser/editor that ran in the NeXTStep environment. The World Wide Web has been widely available since 1991.

E-mail

Electronic Mail (email or e-mail) is a method of exchanging messages between people using electronic devices. Email first entered limited use in the 1960s and by the mid-1970s had taken the form now recognized as email. Email operates across computer networks, which today is primarily the Internet. Some early email systems required the author and the recipient to both be online at the same time, in common with instant messaging. Today's email systems are based on a store-and-forward model. Email servers accept, forward, deliver, and store messages. Neither the users nor their computers are required to be online simultaneously; they need to connect only briefly, typically to a mail server or a webmail interface, for as long as it takes to send or receive messages.Originally an ASCII text-only communications medium, Internet email was extended by Multipurpose Internet Mail Extensions (MIME) to carry text in other character sets and multimedia content attachments. International email, with internationalized email addresses using UTF-8, has been standardized, but as of 2017 it has not been widely adopted.The history of modern Internet email services reaches back to the early ARPANET, with standards for encoding email messages published as early as 1973 (RFC 561). An email message sent in the early 1970s looks very similar to a basic email sent today. Email had an important role in creating the Internet, and the conversion from ARPANET to the Internet in the early 1980s produced the core of the current services.

Web-based email

Main article: Webmail
Many email providers have a web-based email client (e.g. AOL Mail, Gmail, Outlook.com, Hotmail and Yahoo! Mail). This allows users to log into the email account by using any compatible web browser to send and receive their email. Mail is typically not downloaded to the client, so can't be read without a current Internet connection.

POP3 email services
The Post Office Protocol 3 (POP3) is a mail access protocol used by a client application to read messages from the mail server. Received messages are often deleted from the server. POP supports simple download-and-delete requirements for access to remote mailboxes (termed maildrop in the POP RFC's).[57]

IMAP email servers
The Internet Message Access Protocol (IMAP) provides features to manage a mailbox from multiple devices. Small portable devices like smartphones are increasingly used to check email while travelling, and to make brief replies, larger devices with better keyboard access being used to reply at greater length. IMAP shows the headers of messages, the sender and the subject and the device needs to request to download specific messages. Usually mail is left in folders in the mail server.

MAPI email servers
Messaging Application Programming Interface (MAPI) is used by Microsoft Outlook to communicate to Microsoft Exchange Server - and to a range of other email server products such as Axigen Mail Server, Kerio Connect, Scalix, Zimbra, HP OpenMail, IBM Lotus Notes, Zarafa, and Bynari where vendors have added MAPI support to allow their products to be accessed directly via Outlook.

Uses

This section needs additional citations for verification. Please help improve this article by adding citations to reliable sources. Unsourced material may be challenged and removed. (November 2007)
Business and organizational use

Email has been widely accepted by business, governments and non-governmental organizations in the developed world, and it is one of the key parts of an 'e-revolution' in workplace communication (with the other key plank being widespread adoption of highspeed Internet). A sponsored 2010 study on workplace communication found 83% of U.S. knowledge workers felt email was critical to their success and productivity at work.
It has some key benefits to business and other organizations, including:

Facilitating logistics

Much of the business world relies on communications between people who are not physically in the same building, area, or even country; setting up and attending an in-person meeting, telephone call, or conference call can be inconvenient, time-consuming, and costly. Email provides a method of exchanging information between two or more people with no set-up costs and that is generally far less expensive than a physical meeting or phone call.

Helping with synchronisation
With real time communication by meetings or phone calls, participants must work on the same schedule, and each participant must spend the same amount of time in the meeting or call. Email allows asynchrony: each participant may control their schedule independently.

Reducing cost
Sending an email is much less expensive than sending postal mail, or long distance telephone calls, telex or telegrams.
Increasing speed
Much faster than most of the alternatives.

Creating a "written" record
Unlike a telephone or in-person conversation, email by its nature creates a detailed written record of the communication, the identity of the sender(s) and recipient(s) and the date and time the message was sent. In the event of a contract or legal dispute, saved emails can be used to prove that an individual was advised of certain issues, as each email has the date and time recorded on it.
Email marketing

Email marketing via "opt-in" is often successfully used to send special sales offerings and new product information. Depending on the recipient's culture,[60] email sent without permission—such as an "opt-in"—is likely to be viewed as unwelcome "email spam".

Personal use

Personal computer
Many users access their personal email from friends and family members using a personal computer in their house or apartment.

Mobile
Email has become used on smartphones and on all types of computers. Mobile "apps" for email increase accessibility to the medium for users who are out of their home. While in the earliest years of email, users could only access email on desktop computers, in the 2010s, it is possible for users to check their email when they are away from home, whether they are across town or across the world. Alerts can also be sent to the smartphone or other device to notify them immediately of new messages. This has given email the ability to be used for more frequent communication between users and allowed them to check their email and write messages throughout the day. As of 2011, there were approximately 1.4 billion email users worldwide and 50 billion non-spam emails that were sent daily.

Individuals often check email on smartphones for both personal and work-related messages. It was found that US adults check their email more than they browse the web or check their Facebook accounts, making email the most popular activity for users to do on their smartphones. 78% of the respondents in the study revealed that they check their email on their phone. It was also found that 30% of consumers use only their smartphone to check their email, and 91% were likely to check their email at least once per day on their smartphone. However, the percentage of consumers using email on smartphone ranges and differs dramatically across different countries. For example, in comparison to 75% of those consumers in the US who used it, only 17% in India did.

WEB PAGE NAVIGATION AND WEB SEARCHING

WEB NAVIGATION
Web navigation refers to the process of navigating a network of information resources in the World Wide Web, which is organized as hypertext or hypermedia.The user interface that is used to do so is called a web browser.A central theme in web design is the development of a web navigation interface that maximizes usability.A website's overall navigational scheme includes several navigational pieces such as global, local, supplemental, and contextual navigation; all of these are vital aspects of the broad topic of web navigation. Hierarchical navigation systems are vital as well since it is the primary navigation system. It allows for the user to navigate within the site using levels alone, which is often seen as restricting and requires additional navigation systems to better structure the website. The global navigation of a website, as another segment of web navigation, serves as the outline and template in order to achieve an easy maneuver for the users accessing the site, while local navigation is often used to help the users within a specific section of the site.All these navigational pieces fall under the categories of various types of web navigation, allowing for further development and for more efficient experiences upon visiting a webpage. 

Types of web navigation
The use of website navigation tools allow for a website's visitors to experience the site with the most efficiency and the least incompetence. A website navigation system is analogous to a road map which enables webpage visitors to explore and discover different areas and information contained within the website.
There are many different types of website navigation:
  • Hierarchical website navigation
The structure of the website navigation is built from general to specific. This provides a clear, simple path to all the web pages from anywhere on the website.
  • Global website navigation
Global website navigation shows the top level sections/pages of the website. It is available on each page and lists the main content sections/pages of the website.
  • Local website navigation
Local navigation is the links within the text of a given web page, linking to other pages within the website.

STYLES OF WEBSITE NAVIGATION
Styles of website navigation refers to how the navigation system is presented.
  • Text Links
Text links are words (text) which are surrounded by the anchor set of tags to create clickable text which takes the visitor to another web page within your website, a downloadable document from your website, or to another website on the Internet.
  • Breadcrumbs
Breadcrumb navigation shows the website visitor the path within your website to the page they are currently on.
  • Navigation Bar
A navigation bar is the collection of website navigation links all grouped together. A navigation bar can be horizontal or vertical.
  • Tab Navigation
Tab navigation is where the website navigations links appear as tabs, similar to the tabs you use in a binder to divide the contents into sections.
  • Sitemap
A sitemap is a page within your website that lists all the sections and web pages (if you don’t have too many) that are contained within the website. This is different from Google Sitemaps and Yahoo Sitemaps.
A traditional sitemap provides navigation for your website visitors should they get lost, a shorter path to the different areas of the website for those who know what exactly they are looking for and a means for the search engines to find all the pages within your website.
  • Dropdown Menu
A dropdown menu is a style of website navigation where when the visitor places their mouse over a menu item, another menu is exposed. A dropdown menu can include a flyout menu (see next item).
A dropdown menu system can create accessibility issues and a problem as far as the search engines not being able to read the links in the menu, but if constructed properly, these issues can be overcome.
  • Flyout Menu
A flyout menu is constructed similar to the dropdown menu. When the visitor places their mouse over a link, another menu “flys out”, usually to the right, from the link where the mouse is placed.
Flyout menus face the same challenges as dropdown menus but if constructed properly, they can be accessible and readable by the search engines.
  • Named Anchors
Named anchors are the type of links that take you directly to a spot on the current page or on another web page.

WEB NAVIGATION USE
To be effective, the website navigation system needs:
  • To be consistent throughout the website.
The website visitors will learn, through repetition, how to get around the website.
  • The main navigation links kept together.
This makes it easier for the visitor to get to the main areas of the website.
  • Reduced clutter by grouping links into sections.
If the list of website navigation links are grouped into sections and each section has only 5-7 links, this will make it easier to read the navigation scheme.
  • Minimal clicking to get to where the visitor wants to get to.
If the number of clicks to the web page the visitor wishes to visit is minimal, this leads to a better experience.
Some visitors can become confused or impatient when clicking a bunch of links to get to where they want to be. In large websites, this can be difficult to reduce. Using breadcrumbs is one way to help the visitor see where they are within the website and the path back up the navigation path they took.
Creating the website navigation system at the planning stage of the website will effect the overall design of the web page layout and help develop the overall plan for the website.

A 'web search engine' is a software system that is designed to search for information on the World Wide Web. The search results are generally presented in a line of results often referred to as search engine results pages (SERPs). The information may be a mix of web pages, images, and other types of files. Some search engines also mine data available in databases or open directories. Unlike web directories, which are maintained only by human editors, search engines also maintain real-time information by running an algorithm on a web crawler.Internet content that is not capable of being searched by a web search engine is generally described as the deep web.

Web search engines get their information by web crawling from site to site. The "spider" checks for the standard filename robots.txt, addressed to it, before sending certain information back to be indexed depending on many factors, such as the titles, page content, JavaScript, Cascading Style Sheets (CSS), headings, as evidenced by the standard HTML markup of the informational content, or its metadata in HTML meta tags. "[N]o web crawler may actually crawl the entire reachable web. Due to infinite websites, spider traps, spam, and other exigencies of the real web, crawlers instead apply a crawl policy to determine when the crawling of a site should be deemed sufficient. Some sites are crawled exhaustively, while others are crawled only partially".Indexing means associating words and other definable tokens found on web pages to their domain names and HTML-based fields. The associations are made in a public database, made available for web search queries. A query from a user can be a single word. The index helps find information relating to the query as quickly as possible.Some of the techniques for indexing, and caching are trade secrets, whereas web crawling is a straightforward process of visiting all sites on a systematic basis.Between visits by the spider, the cached version of page (some or all the content needed to render it) stored in the search engine working memory is quickly sent to an inquirer. If a visit is overdue, the search engine can just act as a web proxy instead. In this case the page may differ from the search terms indexed.The cached page holds the appearance of the version whose words were indexed, so a cached version of a page can be useful to the web site when the actual page has been lost, but this problem is also considered a mild form of linkrot.
High-level architecture of a standard Web crawle.Typically when a user enters a query into a search engine it is a few keywords. The index already has the names of the sites containing the keywords, and these are instantly obtained from the index. The real processing load is in generating the web pages that are the search results list: Every page in the entire list must be weighted according to information in the indexes.Then the top search result item requires the lookup, reconstruction, and markup of the snippets showing the context of the keywords matched. These are only part of the processing each search results web page requires, and further pages (next to the top) require more of this post processing.Beyond simple keyword lookups, search engines offer their own GUI- or command-driven operators and search parameters to refine the search results. These provide the necessary controls for the user engaged in the feedback loop users create by filtering and weighting while refining the search results, given the initial pages of the first search results. For example, from 2007 the Google.com search engine has allowed one to filter by date by clicking "Show search tools" in the leftmost column of the initial search results page, and then selecting the desired date range. It's also possible to weight by date because each page has a modification time. Most search engines support the use of the boolean operators AND, OR and NOT to help end users refine the search query. Boolean operators are for literal searches that allow the user to refine and extend the terms of the search. The engine looks for the words or phrases exactly as entered. Some search engines provide an advanced feature called proximity search, which allows users to define the distance between keywords.There is also concept-based searching where the research involves using statistical analysis on pages containing the words or phrases you search for. As well, natural language queries allow the user to type a question in the same form one would ask it to a human. A site like this would be ask.com.The usefulness of a search engine depends on the relevance of the result set it gives back. While there may be millions of web pages that include a particular word or phrase, some pages may be more relevant, popular, or authoritative than others. Most search engines employ methods to rank the results to provide the "best" results first. How a search engine decides which pages are the best matches, and what order the results should be shown in, varies widely from one engine to another. The methods also change over time as Internet usage changes and new techniques evolve. There are two main types of search engine that have evolved: one is a system of predefined and hierarchically ordered keywords that humans have programmed extensively. The other is a system that generates an "inverted index" by analyzing texts it locates. This first form relies much more heavily on the computer itself to do the bulk of the work.Most Web search engines are commercial ventures supported by advertising revenue and thus some of them allow advertisers to have their listings ranked higher in search results for a fee. Search engines that do not accept money for their search results make money by running search related ads alongside the regular search engine results. The search engines make money every time someone clicks on one of these ads.

Although search engines are programmed to rank websites based on some combination of their popularity and relevancy, empirical studies indicate various political, economic, and social biases in the information they provide and the underlying assumptions about the technology.These biases can be a direct result of economic and commercial processes (e.g., companies that advertise with a search engine can become also more popular in its organic search results), and political processes (e.g., the removal of search results to comply with local laws). For example, Google will not surface certain neo-Nazi websites in France and Germany, where Holocaust denial is illegal.Biases can also be a result of social processes, as search engine algorithms are frequently designed to exclude non-normative viewpoints in favor of more "popular" results. Indexing algorithms of major search engines skew towards coverage of U.S.-based sites, rather than websites from non-U.S. countries.Google Bombing is one example of an attempt to manipulate search results for political, social or commercial reasons.Several scholars have studied the cultural changes triggered by search engines, and the representation of certain controversial topics in their results, such as terrorism in Ireland and conspiracy theories.