Skip to main content
  1. Tech
  2. Gadgets & Tech
  3. Tech Gear

Computer Security Part 1: Sullivan University Computer Science studies

See also

The Internet can be used for multiple business and personal needs. From database research of dated and topic related articles to media viewing using the latest computer media software. E-commerce, e-business, and e-government all rely on the Internet for information relaying and retrieval. Many times individuals send information that is confidential to third parties. Confidential information can include personal addresses, phone numbers, credit card numbers, bank account numbers, and other information that could be used in damaging ways if retrieved by the wrong individuals. Current online safety asks that information with credit card numbers, bank account numbers, home addresses, and other personal information, should not be sent by email to increase security. Even when a computer is just surfing the Internet, personal computer information can be detected from the surfing computer without the user even knowing. Author Peter Pietromonaco from the book "Cyber Security" comments, “You can actually be tracked from your mouse clicks; and the pages you read tell those vigilant individuals just what to sell to you, what to scam from you, and countless other private things (Pietromonaco, 1).” Advanced computer users are familiar with the smallest details of Internet Protocol. Sending e-mail is perhaps one of the common tasks of Internet users. E-mail travels across miles and miles of undetermined network traffic and router paths. E-mails must go through a Post Office Protocol (POP) were it can be either delivered immediately or post-poned for delivery. The hazards with e-mail involve third party user intercepting private e-mail using software that scans for keywords, names, and e-mail addresses. Internet marketers, use e-mail information to not only spam individuals but also try to scam the individuals as well. Spamming occurs when individuals gather multiple addresses and send out mass email messages to acquired detailed information lists. An instance of my own that I found particularly strange was an e-mail message I received asking me to become part of a list to receive cash for each person I could get to give their home address in return. The email asked that the participate send five dollars to all members on the current address list that came with the e-mail and add my name and address to the top of the list before sending the list to five to ten other e-mail addresses who would each be asked to mail all the addresses on the list including five dollars. The idea is to receive thousands of five-dollar bills in the mailbox over a period of time.
Many times personal e-mail addresses and other personal information are obtained from cookies, which are placed on the Internet users computer to track the computers activity while on the Internet. The information obtained from these cookies is then sold to Internet marketing lists that solicit sells and promotions. Author Peter Pietromonaco suggests several things to protect your computer information. Pietromonaco first suggests encrypting all e-mail messages that are sent. Encrypting uses formatting on specific software that also must be used by the recipient to decrypt and read the e-mail. Pietromonaco suggest simple things to fight spamming, such as never giving out your last name, home address, or phone numbers in chat rooms or bulletin boards, and not giving out screen names, user ID, or passwords to strangers.

Pietromonaco, Peter. “Cyber security.” Poptronics, Nov 2002, 10(2). Hauppauge. 23 May 2003.

Advertisement

Don't Miss

  • Crew
    'The Crew' preview: Ubisoft has on its hands the 'Destiny' of racing games
    Games Preview
  • Cell phone
    A bill legalizing unlocking phones has passed Congress and is expected to be signed into law
    Video
    Tech Buzz
  • Destiny
    The 'Destiny' beta: 7 things we absolutely love about Bungie's new franchise
    Camera
    Games Feature
  • Cortana
    Cortana takes on Siri in a hilarious new commercial for the Windows Phone
    Tech Buzz
  • Unity Exclusive
    'Assassin's Creed Unity' exclusive: Tell the world, 'I'm coming home'
    Camera
    Games Interview
  • Typing
    Is your brokerage account safe from the attacks of cyber thieves?
    Video
    Headlines

Related Videos:

  • Twitter
    <div class="video-info" data-id="517839330" data-param-name="playList" data-provider="5min" data-url="http://pshared.5min.com/Scripts/PlayerSeed.js?sid=1304&width=480&height=401&playList=517839330&autoStart=true"></div>
  • Google research
    <div class="video-info" data-id="518340583" data-param-name="playList" data-provider="5min" data-url="http://pshared.5min.com/Scripts/PlayerSeed.js?sid=1304&width=480&height=401&playList=518340583&autoStart=true"></div>
  • Attendees gather at the Apple Worldwide Developers Conference at the Moscone West center on June 2, 2014 in San Francisco, California. Apple CEO Tim Cook kicked off the annual WWDC which is typically a showcase for upcoming updates to Apple hardware and s
    <div class="video-info" data-id="518310091" data-param-name="playList" data-provider="5min" data-url="http://pshared.5min.com/Scripts/PlayerSeed.js?sid=1304&width=480&height=401&playList=518310091&autoStart=true"></div>