Lesson 10

As I’ve been researching digital security, I’ve learned a lot of things, starting with the fundamentals. Protecting against security breaches, hacks, and vulnerabilities is a crucial aspect of computer security, as it helps to prevent unauthorized access. Maintaining the integrity of computer systems requires an understanding of how important it is to fix security flaws.

Malware and computer viruses are major threats because malware includes a variety of malicious software types and viruses spread unauthorized programs. While known viruses can be found and disabled by antivirus software, other threats to be aware of include spam and denial-of-service attacks.

Knowing the subtleties of account security, like encryption and two-step verification, has made it clear how crucial it is to protect personal data. An additional layer of security is provided by two-step verification, and secure communication is ensured by encryption, which turns messages into unreadable forms.

The need for caution is highlighted by the frequency of online frauds, such as phishing and sophisticated schemes like the 419 scam or Craigslist scams. Understanding and avoiding these types of scams are essential elements of online safety.

Through the use of encryption and decryption techniques, cryptography is essential to the security of digital communication. Different strategies are provided by symmetric-key and public-key cryptography, each with a unique set of benefits and uses.

Digital certificates offer a safe way to exchange data over the internet. They are controlled by certificate authorities inside the public key infrastructure (PKI). PKIs create trust frameworks that let parties verify the authenticity of digital certificates and public keys.

 

A serious danger, denial of service attacks bombard the server of a target website with a large number of requests for access. Attacks that use multiple computers to cause a denial of service (DDoS) increase the impact of the attack.

To sum up, my research on security has shown how complex it can be to protect digital systems, requiring the use of technologies such as digital certificates, cryptography, and antivirus software. It has also highlighted the significance of user awareness in thwarting phishing and other online scams.

 

Group Project : We talked about various kinds of scams, how to identiffy scams and how to prevent it.

 

 

Link to Group homework

https://sites.psu.edu/dara/files/2023/12/group-5-infographic-image-1.png