Sunday, September 22, 2019
Methods to Stop Different Cyber Crimes Essay Example | Topics and Well Written Essays - 500 words
Methods to Stop Different Cyber Crimes - Essay Example Internet users should chose passwords with that consist of at least five characters. These passwords are not easily guessed by the criminals. Passwords that are made based on names, nicknames, telephone numbers, and other obvious words should be avoided. Passwords should consist of both uppercase and lowercase character. However, such passwords may be difficult to remember. Internet users should aim at creating the most unique passwords that do no appear in dictionary entries (Standler, 2004). Internet users are required to activate their spam blocker whenever they use the Internet. Spam blockers enable individuals to block messages that are not needed from getting into the inbox. In addition, a spam blocker ensures that phishing emails that may be used to defraud Internet users are prevented from getting into the inbox. Most Internet providers have spam blocking features (Ehow, 2012). Antivirus software such as McAfee, Norton, Kasperskey and Avast should be installed on computers. The installation of an antivirus alone is not an adequate measure in preventing viruses from infecting the computer; the anti virus must be updated on a regular basis. Malware, spyware and viruses can only be eliminated from the computer if the antivirus is allowed to scan the whole computer system (Ehow, 2012). Further, Internet users can stop cyber crime by using their computerââ¬â¢s firewall protection feature. Firewall is a digitally created barrier that enables Internet users to prevent cyber criminals from accessing their computer systems. The Firewall should always be turned on in order to prevent the illegal activities of cyber criminals (Ehow, 2012). Also, cyber crimes can be prevented if Internet users constantly encrypt useful information as they send it to intended recipients. This can be done through the use of encryption software which ensures that personal and confidential information
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.