Internet safety By Kenan
Viruses are written by malicious programmers who wish to cause problems for other computer users. The primary source of infection these days are attachments followed by illegal software and infected files from the internet. Viruses
The internet and freedom of speech The internet is a vast source of information but it can also be used to peddle pornography, con people out of money, invade people’s privacy with unwanted advertising, and make it easier for criminals to organise their activities. However, it is not the case that anyone can post anything over the internet. For example: the Chinese government heavily censors its citizens' use of the internet libel (written defamation of someone's character) laws apply equally well to the internet copyright law is being actively used to suppress websites, for example, many file sharing websites have been shut down over the years. Arguments for control
Phishing is information such as usernames, passwords, and credit card details (and sometimes, indirectly, money) by masquerading as a trustworthy entity in an electronic communication. Communications purporting to be from popular social web sites, auction sites, banks. Phishing
Spam is most often considered to be electronic junk mail or junk newsgroup postings. Some people define spam even more generally as any unsolicited . However, if a long-lost brother finds your address and sends you a message. Spam
Physical security is one of the first areas to look at Hacking from he outside is a danger but more damaged can be done from within a system The severs of a large local area network (lan) This is a list of physical security Finger prints Dna sampling Biometrics systems How to keep systems and data secured
n computing, a firewall is a network security system that controls the incoming and outgoing network traffic based on an applied rule set. A firewall establishes a barrier between a trusted, secure internal network and another network (e.g., the Internet) that is assumed not to be secure and trusted. Firewalls
Other biometric methods hand geometry face geometry Voice recognition and voice typing