Cyber Security Essay

648 Words Jan 11th, 2009 3 Pages
Checkpoint: Cyber Security Paper

The Merriam-Webster’s Dictionary defines cyber security measures taken to protect a computer or computer system (as on the Internet) against unauthorized access or attack Most people think that hackers are just people that want to mess up your computer, but real hackers break into systems because they want to see what they can do, then they might leave a message on the victims computer, but that’s it. So, the computer security people protect from those other hackers that want to mess up peoples computers. The means we take can as individual to protect ourselves in the cyber world is be anyomous on websites, don’t post your personal information ,have virus protection install on your computer, get spy ware
…show more content…
For example, if you go to your bank account website to check your account, I would delete the link to make sure that no one could access my information. In James case, he found someone else information and passwords. To his advantage, he could have forgotten that information and had access to someone account and gotten into their favorite websites with the passwords stolen their identify or something. The most important thing is do is to make sure you are getting rid of those cookies on you computer. Preventing "Cookies" from being stored to your hard drive is the first step to safeguarding your anonymity of the web. Cookies are small text files that your browser exchanges with a Web server. The invisible secret agents record information such as your password for a registered site. But because cookies may track your activities on the Web in ways that violate your privacy, you should control the information they share.
In conclusion we say, when dealing with computers, security and privacy are together. Information stored on your own computer is not protected, unless you already taken steps to protect your data, anyone can read all files on your computer. Unlike E-mail messages you send are often stored in a "Sent mail" folder, they are vulnerable to compromise by anyone who accesses your hard disk.


References:

Cyber security. (2008). In Merriam-Webster Online Dictionary.
Retrieved October 23, 2008,…