Policing Nics
Policing Nics
INTERNET
DATA BREACH
Data breaches involve cybercriminals extracting information
from a source, typically exploiting weaknesses in security.
Cybercriminals research vulnerabilities, initiate contact with
the network, and extract data for various illegal activities such
as information fraud, identity theft, and credit card duplication.
Companies holding personal data, like banks and hospitals,
continually caution clients about data vulnerability in today’s
technological landscape.
Cybercrime police, also known as cybercrime units, are
specialized law enforcement entities focused on investigating
and combating cybercriminal activities. They handle a wide
range of offenses, including hacking, online fraud, identity
theft, and other digital crimes. These units employ advanced
technology and expertise to trace and apprehend
cybercriminals, working to ensure the security of online
environments and protect individuals and organizations from
digital threats
USAGE OF SECURITY APPLICATIONS
Application security involves safeguarding software, hardware, and procedures
from external threats. It has become increasingly crucial with the rise of network-
accessible applications. The focus is on protecting vital files from unauthorized
access, preventing data theft, and ensuring user privacy. Many users may not be
aware of the actions apps perform on their devices, as some applications request
permissions, such as location and contact access. Spyware, a type of software,
stealthily collects and alters user information, often infiltrating devices through
unauthorized software installations, app downloads, or pop-up ads. Shareware and
freeware are common entry points for spyware, enabling it to install and transfer or
collect data without the user’s knowledge.
TYPES OF SECURITY
APPLICATION
Auditing Authentication
Summarize this Recording and It should be only the user
tracking the execution of the
application. In tracking the execution of
who can log in and run the
the application, you will notice if there application. Only the valid
are any suspicious on the application. information can reach this
Also you should able to trail the events. software.
TYPES OF SECURITY
APPLICATION
Authorization Cryptography
Only authorized users should have the Assurance of privacy to the user,
ability to change, edit, and access information unauthorized user should not be able to
within the application. In case of suspicious edit, change, copy, or read the
activity, the user or owner must undergo
verification through email, personal phone information inside the application. The
number, or other accessible means to notify security must be strong enough to
and confirm their identity. secure the application.
STATE OF PRIVACY IN THE
INTERNET
Privacy is paramount on the internet, with personal information
needing protection. Cybercriminals pose a significant threat, as evident in
the high cases of identity theft, credit card details being stolen, and data
breaches. Even when using public Wi-Fi, the risk of information leakage is
present due to the lack of encryption. Public networks allow hackers to
spy on user activities easily. Encryption, which restricts access to
authorized individuals, is crucial for data security. Utilizing a Virtual Private
Network (VPN) can help safeguard information by masking a device’s IP
address and ensuring secure data transmission across public networks.
PUBLIC NETWORKS AREN’T THE ONLY ONES THAT CAN
RISK YOUR PERSONAL DATA. HERE ARE SOME WAYS
HACKERS CAN GET INTO YOUR DEVICE
6. Smishing
This is phishing but via phone call or SMS messages. It is when someone
tricks you into giving them your information.
PRIVACY ISSUES
Privacy is vital for personal freedom, yet social media has
eroded it. People share sensitive information online, exposing
themselves to risks like fraud and stalking. Incidents like the
Philippines’ government data breach highlight the dangers of
compromised personal details.
ONLINE ETHICS
ETHICS. ETIQUETTE, AND
NETIQUETTES
We first identify what is ethics. Ethics is defined as what deals with moral principles, it is
the understanding and knowing the difference of what is good and bad. While etiquette is the
way people behave in an orderly manner in a social setting, and it refers to your polite behavior
and good manners. Everyone can gain access to the internet and everyone too can post and
interact with almost everything that is posted public ally in the internet. With this kind of freedom,
there should be proper manner/behavior to be observed. Social etiquettes do not only exist in
the real interacting environment but also online. There are dos and don’ts in the online world
and users must know and apply them to create a good interaction with everyone. Netiquette is
the combination of the two words network and etiquette. It refers to the distinguished set of rules
for what is considered to be acceptable as good online behavior. It also emphasizes on what are
tolerable usage of online resources.
8 GUIDES FOR PROPER ONLINE
ETIQUETTES
As an online user, you should be responsible for the
actions you are doing in the web by the means of
interacting with other personal businesses. That being
said, here are 8 guidelines to follow for achieving
netiquette.
1. Internet should not be used as a platform to harm fellow users.
Online websites should be a safe place wherein each and every person is comfortable in
trusting sharing data with one another without getting abuse in terms of certain processes.
5. Apply the good manners and values you have learned in general.
Maintaining proper online behavior is essential for fostering a positive
online community. Simple acts of respect and kindness contribute to a
better online environment.
6. Political correctness should be observed as a standard for social norms.
Remember that online users come from diverse backgrounds, with varying races, cultures, and
traditions. Exercise sensitivity online, avoiding unethical behaviors like racism, sexism,
homophobia, and more.
5. The “Technology and Ethics” section of Computer Professionals for Social Responsibility
Gives clear guidelines for ethical behavior among professional computer users. The
website includes links with updates on news and relevant technological issues, emphasizing
the importance of responsibility.
10 ADVICE TO STAY SAFE
ONLINE
1. Create complex and unpredictable passwords.
2. Network Security
3. Using a Firewall
4. Think Before You Click
5. Selective Sharing
6. Protecting your Mobile Life
7. Safe Shopping and Surfing
8. Update
9. Keep a lookout
10. Guard up
RESEARCH AND ORGANIZATION
OF ONLINE ETIQUETTES
Online etiquettes is considered one of the most important
things that online users are supposed to have when having full
access to the internet. Because of its relevance, organizations
found in the world-wide-web and researches related to it are
provided for the people to have guides on proper behavior,
discipline and responsibility for computer and communication
ethics.
HERE ARE SOME OF THE FOLLOWING: