Topic > How to Stay Safe Online: Protect Yourself from Internet Threats

Index IntroductionEncrypted Messaging: Online Security and RisksPhishing DangersEnsuring Children's Safety OnlineThe Threat of ClickjackingConclusionReferencesIntroductionThere are many threats that Internet users face, including encrypted messaging as mentioned in the article. However, preventative actions can be taken to counteract these problems. Such threats include phishing, children's online safety, and clickjacking, which will be explained further in this essay on how they can cause personal information disclosure and data breach. A threat is defined as a potential risk to your assets that results in a loss of value. This essay will explore other Internet threats that can be prevented through the use of certain programs. Internet security must be implemented to discourage any harm or danger that arises when using the Internet and to learn how to stay safe online. It relies on specific resources to safeguard data transferred online. The following paragraphs will explain the threats in more detail and what strategies can be adopted to discourage these problems. Say no to plagiarism. Get a tailor-made essay on "Why Violent Video Games Shouldn't Be Banned"? Get an Original Essay Encrypted Messaging: Online Security and Risks Encrypted messaging is one of the threats mentioned in the article that people don't have in-depth knowledge about. It is to prevent email data, text files and images from being stolen or lost. Encryption does not allow unauthorized access to your data from emails to WhatsApp messages keeping communication secure and preserving privacy between the parties involved as any information traveling over the internet can be intercepted and read by strangers (Lee, 2017) . Hides a message to hide its contents which involves a series of complex algorithms that transform data into blocks or streams of random alphanumeric characters. However, it can be decrypted by using a password or recovery key to convert it back into a readable format, which is called decryption. Cryptography can be classified into 2 types: symmetric and asymmetric. Symmetric encryption uses a single key to encrypt and decrypt messages and electronic information held by both the sender and the recipient. Using algorithms supported by symmetric encryption, the data is converted into a form that cannot be understood by third parties who do not have the key. Once the intended recipient who holds the key has received the message, the algorithm returns the message to its original, readable form (Smirnoff and Turner, 2019). Asymmetric decryption, also known as public key cryptography, uses two different keys, a public key and a private key. The public key is used to encrypt the data while the private key is used to decrypt the message (Almeida, 2019). Asymmetric encryption is said to be more secure than symmetric encryption as it reduces the need to send the key over the Internet where it could be intercepted. However, there are several limitations and the downside is that it is a slow and complex encryption process. As mentioned above, encryption and decryption require a password, and if you forget it, you need to do password reset, which is a very tedious process. In the worst case, the password cannot be recovered and the data cannot be recovered. You can use a very simple password so you don't forget it, butthis makes encrypted data less secure (Vandersteen, 2019). Ransomware, which is a type of malware, can also be embedded within encrypted messages that would bypass firewalls and antivirus software. This malware targets your personal files which in turn become inaccessible. Dangers of Phishing Another threat faced by Internet users is phishing. Phishing is a form of social engineering that disguises itself as an email or website and allows the attacker to retrieve sensitive and personal information. The attacker can use information about social networking sites such as users' interests and hobbies to craft an attractive email, tricking the victim into clicking on the attachment or website where the victim will enter their login details which can be used to hack into a system or account. In 2016, three University of Kansas employees did not receive their paychecks after falling victim to an email phishing scam. Victims were asked to update their payroll information via email which allows scammers to change account numbers in the University's payroll system (Lowry, 2016). In addition to disclosing sensitive information, scammers aim to infect the victim's computer or device with malware such as ransomware. It was estimated that 93% of phishing emails contained ransomware attachments (Fruhlinger, 2019). The number of phishing emails reached 6.3 million in the first quarter of this year, an increase of 789% compared to the last quarter of 2015 (Korolov, 2016). The drastic growth is due to the fact that ransomware is becoming easier to deliver and offers a quick and easy return on investment solution. How it works is that it encrypts important data in the device which can only be decrypted by paying a small fee which can range from a few hundred dollars to thousands, also payable in bitcoin. The attacker may also masquerade as a law enforcement officer to shut down the victim's computer due to pornography or pirated software. Normally a fine is required to rehabilitate the computer. This makes victims less likely to report it to the authorities. Defensive actions must be taken to prevent ransomware infections. Some examples of such practices are keeping the operating system updated, not installing programs or granting them administrative privileges unless you know their intentions very well, and antivirus software that detects malicious programs such as ransomware. As for defensive actions against phishing, companies can educate their employees about different types of malicious programs, implement a web filter to discourage malicious websites, and encrypt all sensitive company information (Lord, 2019). Ensuring Children's Online SafetyChildren's online safety is another Internet threat that can be avoided by taking certain measures. Most children in the modern world spend most of their time on the Internet and are exposed to many threats that can be found on the Internet. Some common Internet risks include pornography, social networking, and cyberbullying. These types of exposure pose a risk to their mental health and well-being. Nowadays, you can easily access pornography simply by searching in a search engine. Teens going through puberty may be influenced to watch pornography as their body changes and may be curious about the bodily changes that occur during that time. Parents may be able to tell if their children are watching elicited channels when their child rapidly changes the screen of theircomputer when parents enter the room. This can also be observed from their behaviors such as depression and loss of interest in things. Cyberbullying on social networks can also be a plausible cause. Unlike the old days, when the Internet and electronic devices were in short supply and children interacted face-to-face, children today depend on social networks to interact and keep up with trends. This allows for cyberbullying rather than face-to-face confrontation. One survey found that 25 to 30% of young people admitted to having been victims of cyberbullying or having taken part in cyberbullying, but only 12% had been involved in traditional bullying (Lohmann, 2012). Anonymity is also another problem on the Internet. An individual may feel embodied or powerful as they are shrouded in anonymity which can turn the nicest people into bullies (Tai, 2014). The bully may think that he would not be caught since his identity is not revealed online, thus allowing himself to bully as a means of entertainment. This shows the risk of using the Internet and compromising the safety of children online. However, there are safety measures that can be put in place to protect your children from online threats. First, you can set up parental controls when you open a computer account for your child, such as web filtering to block certain websites, time limits to control the amount of usage, and app restrictions to set the apps your child can use. This allows for greater control over your children's computer and Internet use and most importantly reduces the risk of your children accessing pornographic material or inappropriate content. Parents should educate themselves about cyberbullying and encourage their children to report any inappropriate behavior they witness online. They should take immediate action and ignore the online predator, avoid accessing the website where the bullying occurred, block email, and delete their social networking account if the situation gets out of hand. You can also bring in a trusted third party to mediate the situation if your children are not willing to talk to them. Such strategies can be adopted for children's online safety. The Threat of Clickjacking The latest threat facing Internet users is clickjacking. It is when the cybercriminal tricks them into clicking on a link that takes them to one location but diverts them to another chosen destination for malicious purposes. More commonly, clickjacking attempts have often been targeted by online shopping sites. For example, the scammer may create an attractive link or website that promises the user a free trip to the Bahamas. The scammer checks whether the user is logged in to their banking site and loads the screen allowing the transfer of funds. The funds transfer is shown in an invisible frame in front of the gift page with the “confirm transfer” button above the “receive gift” button that can be seen by the user. The user then clicks the "receive gift" button but actually clicks the invisible "transfer funds" button. The funds are then transferred to the scammer. The user is then redirected to a page showing information about the gift but is unaware of what has happened. There are two mitigation methods, the client-side method also called frame busting and the X-frame option recommended by security experts. The first method, frame busting, uses JavaScript to detect whether the page is running on the frame and then break the page outside the frame. However, there are some disadvantages to this method. If the