Introduction to Cyber Security



Yüklə 1,12 Mb.
səhifə63/72
tarix07.01.2024
ölçüsü1,12 Mb.
#210959
1   ...   59   60   61   62   63   64   65   66   ...   72
Introduction-cyber-security

ACTIVITY





  1. What are anonymous accounts? Find some browsers which supports anonymouity.

  2. After going though the above section, find out whether you were following the above safe pracitices while handling your social medial account? Find the gaps?

  3. Based on the above recommendations, adjust your social media account settings.



RECOMENDED VIDEOS




https://www.youtube.com/watch?v=EFHfg1bfgVc https://www.youtube.com/watch?v=tkgLHoaFeFk https://www.youtube.com/watch?v=QUyla_nMJis https://www.youtube.com/watch?v=-CeuqCHX7tE https://www.youtube.com/watch?v=xCHTmzfsGmI

SMARTPHONE SECURITY




    1. INTRODUCTION24


Advances in technology now mean that mobile phones can provide services and features similar to desktop or laptop computers. These Smartphones offer many new ways to communicate and capture and disseminate media. To provide these new functionalities, the smartphones not only use the mobile network, but also connect to the internet either via a wi- fi connection (similar to a laptop at an internet cafe) or via data connections through the mobile network operator.
So while you can, of course, make phone calls with a smartphone, it is better to view smartphones as small computing devices. This means that the other material in this toolkit is relevant to your use of your smartphone as well as your computer.
Smartphones usually support a wide range of functionality – web browsing, email, voice and instant messaging over the internet, capturing, storing and transmitting audio, videos and photos, enabling social networking, multi-user games, banking and many other activities. However, many of these tools and features introduce new security issues, or increase existing risks. For instance, some smartphones have built-in geo-location (GPS) functionality, which means they can provide your precise location to your mobile network operator by default, and to many applications you use on your phone (such as social networking, mapping, browsing and other applications). As mentioned before, mobile phones already relay your location information to your mobile network operator (as part of the normal functions of the phone). However, the additional GPS functionality not only increases the precision of your location information, it also increases the amount of places where this information might be distributed.
It's worth reviewing all the risks associated with mobile phones discussed in our guide How to use mobile phones as securely as possible as all of them are also relevant to smartphone use. That guide also covers issues of eavesdropping, interception of SMS or phone calls, SIM card related issues, and best practices.
In this guide we'll take a look at the additional security challenges posed by smartphones.


24 https://securityinabox.org/en/guide/smartphones

    1. Yüklə 1,12 Mb.

      Dostları ilə paylaş:
1   ...   59   60   61   62   63   64   65   66   ...   72




Verilənlər bazası müəlliflik hüququ ilə müdafiə olunur ©azkurs.org 2024
rəhbərliyinə müraciət

gir | qeydiyyatdan keç
    Ana səhifə


yükləyin