Chapter 6
Module 6 Summary
Chapter 6 covers internet security and how threats work as well as different types of threats, as well as how to stay protected and how encryption works. It goes over 3 categories of threats, secrecy threat, integrity threat, and necessity threat. Secrecy threat is when data is disclosed to an unauthorized party, integrity threat happens when there has been unauthorized modification to data, and a necessity threat is a threat that delays data transfers or prevents it from getting to the right address.
I think it’s important for people to be aware that there are ways to protect against threats like these, for example encryption. Encryption is how we’re able to send messages through text and emails without it being seen by third parties. Some attacks can’t be stopped by encryption though, like scams that try to get your private information by pretending to be a company or your bank. The best you can do is recognize the format of these scams and not trust any links they may send.
JavaScript vulnerabilities are also a good thing to know when using the web since a lot of attacks can happen without the person ever knowing it happened. Being able to detect and remove malware and learning how the firewall works are important things to know when you use any computer. I’ve seen a few friends of mine infected with malware and it’s always easy to avoid most of the time, even with just Windows Defender on.
