Saturday, June 8, 2019

Methods to Stop Different Cyber Crimes Essay Example | Topics and Well Written Essays - 500 words

Methods to Stop Different Cyber Crimes - Essay Example cyberspace users should chose passwords with that consist of at least five characters. These passwords are not easily guessed by the criminals. Passwords that are made based on names, nicknames, telephone numbers, and other obvious words should be avoided. Passwords should consist of both uppercase and lowercase character. However, such passwords may be difficult to remember. Internet users should aim at creating the most unique passwords that do no appear in dictionary entries (Standler, 2004).Internet users are required to activate their spam blocker whenever they use the Internet. Spam blockers enable individuals to block messages that are not needed from getting into the inbox. In addition, a spam blocker ensures that phishing emails that may be used to defraud Internet users are prevented from getting into the inbox. Most Internet providers have spam blocking features (Ehow, 2012).Antivirus software such as McAfee, Norton, K asperskey and Avast should be installed on ready reckoners. The installation of an antivirus alone is not an adequate measure in preventing viruses from infecting the computing machine the anti virus must be updated on a regular basis. Malware, spyware and viruses can only be eliminated from the computer if the antivirus is allowed to scan the whole computer governance (Ehow, 2012).Further, Internet users can stop cyber crime by using their computers firewall protection feature. Firewall is a digitally created barrier that enables Internet users to prevent cyber criminals from accessing their computer systems. The Firewall should always be turned on in order to prevent the illegal activities of cyber criminals (Ehow, 2012).Also, cyber crimes can be prevented if Internet users constantly encrypt useful discipline as they send it to intended recipients. This can be done through the use of encryption software which ensures that personal and confidential information

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.