DIGITAL SECURITY & PRIVACY - Coggle Diagram
DIGITAL SECURITY & PRIVACY
viruses & other malware
is software that typically acts without user's knowledge & deliberately alters the comp'/mobile device's operations.
examples of malware: viruses, worms, trojan horse, rootkits, spyware, adware & zombies.
each of it attacks ur comp/m.device differently.
some are harmless prank that temporarily freeze, play sounds/display messages on ur comp/m.device.
others destroy/corrupt data, instructions, info stored on the infected comp/m.device.
if u notice any unusual changes in the performance of ur comp/m.device, it may infected w malware.
some techniques u can use to protect urself from identify theft include shredding financial doc before discarding them, never clicking links is unsolicited email messages & enrolling in a credit monitoring service.
adults, teens & children around the world are using online social networks to share their photos, videos, journals, music, & other personal info publicly.
some of these unsuspecting, innocent comp users have fallen victim to crimes committed by dangerous strangers.
protect urself & ur dependents from these criminals by being cautious in email messages & on websites.
for example: do not share info that would allow others to identify/locate u, & don't disclose identification numbers, user names, passwords/other personal security details.
a user name is a unique combination of characters, such as letters of the alphabet/numbers, that identifies one specific user.
password is a private combination of characters associated w a user name.
when comp/m.device are stored in basements/others locations, disposed of in landfills/burned in incinerators, they can release toxic materials & potentially dangerous levels of lead, mercury & flame retardants.
manufacturing processes for computers & m.devices along w e-waste(discarded comp & m.devices) are depleting natural resources & polluting the environment.
green computing involves reducing the electricity consumed & environmental waste generated when using a comp.
strategies that support green computing include recycling, using energy-efficient hardware & energy-saving features, regulating manufacturing processes, extending the life of comp & immediately donating/properly disposing of replaced comp.
when u purchase a new comp, some retailers offer to dispose of ur old comp properly.