II INTERNATIONAL SCIENTIFIC CONFERENCE OF YOUNG RESEARCHERS
597
Qafqaz University
18-19 April 2014, Baku, Azerbaijan
Now it is time going to main purpose of this topic. Today most people believe cloud providers, bank sectors, special
companies, and etc. And people use products such as security cameras, alarms, and other security devices. Because today
technology is developing in high speed and it is impossible to not use such devices. That is good but not at all, we should
also have some own security methods to protect our life and personal data. The third question which mentioned above is the
main goal and aim in this topic. Of course, there are many methods. But we are looking for best methods which increase our
life security much more than other methods. Let’s discover these methods:
-
First of all use your knowledge when you meet some people which you don’t know.
I mean that you should realize and define these states by using your scientific information, learning and logic. For
example, when somebody who is not familiar to you suddenly asks you about your personal information, you must think
about why he/she asks you or something like this.
-
Do not believe to services fully.
Nowadays, most services are trying to prove and deliver their good security to customers. Why? Answer is very simple:
Because they want to have as many as customers and make money as much as possible.
-
Do not use your exact personal data when you see registration pages in websites, but not always.
I mean if it is very necessary for you and you must apply some special official enterprises, then of course you must do
everything correctly. But when you see that is not so important, then use fake personal data. For example, type a place
where you born instead of your first name.
-
Make backups.
Of course these backups must be local. Anyone can lose his/her personal data such as photos, emails, documents, and
other personal files. To prevent of this you should backup your important personal data to some hard drive.
-
Use several kinds of security devices for one purpose.
What this means? If you have some security device and it hasn’t a function which you want to have it. You should find
a device which is includes such function. And then connect these two devices together and make your own security system.
There are so many. But I mentioned top of these methods.
Taking everything into account, we saw that Information Security is very important in our life and we must use the best
secure methods to protect our lives.
Dostları ilə paylaş: |