Chapter 6

Summary

           Module 6 of “The Internet” describes the basics of security on the internet, such as protecting your data or any physical assets such as computers and servers. The author describes the many threats that can occur over the internet such as data leaking and stolen identities. Encryption technology is highlighted as processing information using an algorithm and scrambling code to something that is unreadable. I learned a lot about encryption in my Networking class here at LCCC and it was one of my favorite topics of the class. I am highly interested in cybersecurity and hope to achieve a certificate in it in my future endeavors.

            The many different types of attacks in technology are highlighted such as phishing attacks, which mostly happen over email. Phishers spoof email messages from banks and credit card companies to try and trick people into entering personal data in order to gain access to their accounts. This is something very serious to look out for while using Email, and also something to point out to those who aren’t very familiar with web attacks and any website on the internet. The author also speaks about protecting yourself from identify theft and to keep all personal information in a safe place. I can relate to this because back in 2020, my SSN was leaked in a data breach through T-Mobile, causing me to have to freeze my credit with all three bureaus in order to protect myself.

            Malware (malicious software), viruses such as Trojan horse, and spyware are all highlighted in module 6 and how to protect yourself against these threats are described. Digital certificated are described as well, as an encrypted file that contains a users’ personal information or an organization’s identity. Web servers use these to prove their identify to any external device they connect to. It is important to be extremely cautious of downloading or opening any unknown files over the internet, and Module 6 is a great chapter to read if you are unaware of any of these suspicious attacks.

 

Previous | Appendix A | 1 | 2 | 3 | 4 | 5 | 6 | 7 | 9 | 10 | Next