Internet Security
Reducing risks that arise from operating online!!
Threat
s!!
There are many risks evolved with Internet marketing. A computer Virus is a piece of code that is installed i
Trojans are malicious programs tat
perform actions that have not been
authorized by the user. These actions can
be deleting data, blocking data, modifying
data etc. Spam is an irrelevant or
unsolicited messages sent over the Internet,
typically to large numbers of users, for the
purpose of advertisement. Scam is any
fraudulent business or scheme that takes
money or other goods from an unsuspecting
person. There are more than thousand
related Internet scams today. Adware is the
name given to programs that are designed
to display advertisements on computers,
redirect your search requests to advertising
websites and collect marketing type data
about the person without their permission.
Spyware is software that enables a user to
obtain covert information about another’s
computer activities by transmitting data
covertly from their hard drive.
Precautionary Methods
Installing Antivirus prevents unexpected viruses or worms coming in your computer by blocking
them and also removing the pre-installed viruses. But however some of the viruses once installed
can’t be removed so it’s recommended that the user install antivirus promptly. Anti-spyware
software is a type of program designed to prevent and detect unwanted spyware program
installations and remove them. Firewall is a network security system that controls incoming and
outgoing traffic from a private network. Setting up passwords is also really important because it will
prevent someone from entering your computer, as it would only give access to those who have the
password. Backing up data is very important as after all those precautions some viruses might still
be able to get hold of your computer and infect your files. Taking permission and downloading
anything form the Internet should be done carefully as most of the viruses come from the Internet.
So scanning your downloading files before downloading will prevent lots of viruses from your
computer. The government controls IT policies and procedures. Policies dictate the rules,
procedures explains how these rules are practically applied in real life. They are designed to
influence and determine all major decisions and actions, and all activities take place within the
boundaries set by the organization. Procedures are the specific methods employed to express
policies in action in day-to-day operations of the organization.
The benefits of buying summaries with Stuvia:
Guaranteed quality through customer reviews
Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.
Quick and easy check-out
You can quickly pay through credit card for the summaries. There is no membership needed.
Focus on what matters
Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!
Frequently asked questions
What do I get when I buy this document?
You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.
Satisfaction guarantee: how does it work?
Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.
Who am I buying these notes from?
Stuvia is a marketplace, so you are not buying this document from us, but from seller stuvia12. Stuvia facilitates payment to the seller.
Will I be stuck with a subscription?
No, you only buy these notes for £2.99. You're not tied to anything after your purchase.