Friday, September 13, 2019
If computer security is the answer, what is the problem, and how can Essay
If computer security is the answer, what is the problem, and how can computer security solve that problem - Essay Example As stated above, computer security deals with several issues, which are related to technology (Wong & Yeung 2009). Facebook is one of the most popular social network site globally (Kirkpatrick 2010). However, there are several security issues that pose a danger to the users. It is quite clear that Facebook has fallen victim to various security issues such as hacking, hoax applications, counterfeit product pages and affiliate spam among other issues (Stoll 2011). The number of facebook hackings has continually increased in the recent years. There are numerous aspects that make Facebook more prone to hacking since, most individuals usually post their personal information (Sterling 1993). This information enables the hackers steal the personal identity of the account (Reese 2008). Therefore, it is much easier to protect account hacking using computer security. There are several methodologies that can be employed to impede hackers from accessing a facebook account. These methodologies include using a strong password, logging out after finishing, changing the password more often and using an anti-spyware software (Erickson 2008). Using complicated passwords is one of the best ways to deal with facebook security issues. In fact, individuals are advised to use complicated passwords, which hackers are not able to retrieve (Kabay & Bosworth 2011). This will ensure that their personal information and that of their friends is protected against any alterations. Facebook users are also supposed to logout immediately they are done using the social network (Tipton & Krause 2012). This is because another individual can download malware and key loggers which affect privacy terms of the account (Burger 1991). Changing the password more often also reduces the chances of the account being hacked (Mitnick, Simon & Wozniak 2011). This toughens the ability of the hackers to find out
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.