Protecting Yourself Against the Treats of Cyberspace

1034 Words3 Pages

Cyber Security
It seems like everyone in today’s society has access to a computer, a cell phone, or some other type of technology that allows information to be passed from one person to another through space. With your private information out there in cyberspace, clever thieves are finding ways to access your personal informational and to steal from you without you even knowing about it until it is too late. The thieves are taking your personal data and using it to gain access to your accounts. In fact, there are many different ways thieves are threatening your safety in cyberspace. Each of these threats is serious in nature and one should act upon it immediately before more damage is done.
One type of threat people have to deal with is the annoying malevolent code, better known to most of us as malware and spyware. This type of threat goes through the security system of the individual when that person accesses a website or opens an email that is infected. Malware and spyware are capable of finding ways to get into your computer by loopholes and cement themselves in your system which allows them to copy personal information and worm their way into other computers by emails that you send. These threats can be quite sneaky as they say they will do one thing but instead do a totally opposite thing and in return infects the computer without your knowledge. Malevolent codes can also classified as viruses and worms which are just as capable of producing more harm to you and your computer.
Not only do people need to be aware of malevolent codes but of hackers that attack your computer when you are not looking. Hackers are people that know how to get your personal information from your computer and use it to benefit them. Some ha...

... middle of paper ...

...he Department of Homeland Security is not trying to invade privacy but trying to protect the government’s network from malicious threats and use that information to address the issue.
DHS (Department of Homeland Security) is not the enemy but should be looked at as the big brother trying to protect his little sister or brother. DHS is doing this by working together with companies such as financial institutions, utility companies, and many other companies. They are sending out alerts that let the public know of known malevolent codes, spyware, worms, and Trojan horses. DHS just doesn’t stop there; they are investing criminals and making arrest of people who are infecting cyberspace and privacy. Big brother, DHS, would not be doing a complete job if they did not inform the public how they can protect themselves when they are online from fraud and identity theft.

More about Protecting Yourself Against the Treats of Cyberspace

Open Document