DIGITAL SECURITY & PRIVACY

viruses & other malware

is software that typically acts without user's knowledge & deliberately alters the comp'/mobile device's operations.

examples of malware: viruses, worms, trojan horse, rootkits, spyware, adware & zombies.

each of it attacks ur comp/m.device differently.

some are harmless prank that temporarily freeze, play sounds/display messages on ur comp/m.device.

others destroy/corrupt data, instructions, info stored on the infected comp/m.device.

if u notice any unusual changes in the performance of ur comp/m.device, it may infected w malware.

privacy

some techniques u can use to protect urself from identify theft include shredding financial doc before discarding them, never clicking links is unsolicited email messages & enrolling in a credit monitoring service.

adults, teens & children around the world are using online social networks to share their photos, videos, journals, music, & other personal info publicly.

some of these unsuspecting, innocent comp users have fallen victim to crimes committed by dangerous strangers.

protect urself & ur dependents from these criminals by being cautious in email messages & on websites.

for example: do not share info that would allow others to identify/locate u, & don't disclose identification numbers, user names, passwords/other personal security details.

a user name is a unique combination of characters, such as letters of the alphabet/numbers, that identifies one specific user.

password is a private combination of characters associated w a user name.

environmental issues

when comp/m.device are stored in basements/others locations, disposed of in landfills/burned in incinerators, they can release toxic materials & potentially dangerous levels of lead, mercury & flame retardants.

manufacturing processes for computers & m.devices along w e-waste(discarded comp & m.devices) are depleting natural resources & polluting the environment.

green computing involves reducing the electricity consumed & environmental waste generated when using a comp.

strategies that support green computing include recycling, using energy-efficient hardware & energy-saving features, regulating manufacturing processes, extending the life of comp & immediately donating/properly disposing of replaced comp.

when u purchase a new comp, some retailers offer to dispose of ur old comp properly.