Skip to main content

Q.4.2.) Tools of the trade


 How I protect myself.


Previously in this assignment I spoke about some methods and tools one should use to protect oneself when using any online or even offline portals. The methods and tools I used are as follows:
1.       HTTPS.
2.       Better Passwords.
3.       Do not store passwords physically or digitally.
4.       Anti-virus.
5.       Firewalls.
These methods are not only my personal choices to lead a safe life online but the proof as they say is in the pudding. I myself have utilised all of these tools and methods in crafting and maintaining my blog and personal computing system.
Let’s start with HTTPS. HTTPS or Hyper Text Transfer Protocol Secure has been automatically implemented through my chosen browser (Mozilla Firefox) but I have taken this a step further. Within the settings on Blogger one can enable an HTTPS filter which will not allow unsecure content to be used or posted on this blog.
Better passwords is the next and arguably the most important of all the tools and methods listed above. I used a 8-12 character long alpha-numeric password. I used 2 different passwords both about the same length one for the creation of the email and another for the creation of the blog itself. You may wonder why I didn’t list the exact length of the password here, well if one knows how long a password is breaking into that passwords account is much easier.
Do not store passwords physically or digitally. This one is very self-explanatory. For the creation of both the blog and the account associated with it I never wrote down or uploaded any of the passwords used.
Anti-viruses are important for everyone using a computer. I personally use both an anti-virus and an anti-malware service. I will not be revealing any of the application names I use to prevent any attempts to access my computer.  A few of the anti-viruses I would recommend are AVG, Avast, and Kaspersky all of the anti-viruses mentioned are advised for their completeness and security that they provide and all advice is given based off of personal experience with the paid products.
Firewalls are a simple yet overlooked thing. By default my browser (Mozilla Firefox) has a firewall enabled and this should not be overlooked. I am also running my computers firewall through the OS (Windows 10 Pro). These two combined allow me to browse the web with some notion of safety.

Comments

Popular posts from this blog

Q.2.2.3.) Infographic.

Infograph of Digital law and ethics When one thinks of ethics, images of huge offices with scary men in expensive suits or philosophers pondering the intricacy of life may spring to mind, but these are not the only forms of ethics that one may encounter. For instance computers bring with them a plethora of issues ethically, how should we use them responsibly? Should we be allowed to post whatever we want? What are the repercussions of breaking the online law's. Below is a inforgraph on digital law and ethics and the laws all media outlets should abide by.

Q.3.2.) Privacy, Confidentiality and Anonymity in the digital world.

Facebook and you. Before you immediately click the button labeled "I have read the Terms & Conditions." In a blind panic as the plethora of words before you push you into submission, pause for a moment and think about what you may be getting yourself into. Bellow I shall take exerts from Facebook's privacy policy to highlight the 4 types of privacy identified by Floridi.  Decisional Privacy. "New owner. If the ownership or control of all or part of our Products or their assets changes, we may transfer your information to the new owner."   This shows that information that Facebook has gathered from you using their products and services they will make decisions about your own personal data and who is privy to your personal information possibly without your consent. Informational Privacy   "Information and content you provide . We collect the content, communications and other information you provide when you use our Products, including

Q.2.2.2.) Please allow me to introduce myself.

Who am I? Hello world! My name is Gregory Kiley and welcome to my blog. This blog en devours to highlight the urgent need for better education amongst all South African's on the topic of Digital Law and Ethics. A bit about myself. Currently I am a full-time student at Varsity College Sandton Campus. I am studying a Bachelors of Computer and Information Sciences through Application Development or BCAD for short. Through this course I have gleaned a deeper knowledge and understanding about how we as South African's are oblivious to the true danger and consequences that leading a digital life entails. The modules I am doing this semester are: Digital Law and Ethics . Programming 1B (JAVA). Mathmatical Principles fr Developers. Database Intermediate. Thus far I am enjoying my studies and have gleaned some useful knowledge from this semester at college. Last year I finished my first tertiary qualification from Varsity College Sandton, this was a Higher Cert