Chapter 6 summary
After reading module 6, my knowledge regarding the importance of effective Internet security improved. I know that it’s critical to have quality Internet security because years back I had a lock screen on my laptop with a popup saying my computer had a virus. Unfortunately, I did not have a security program with efficient enough capabilities to remove the virus and I had to take it to the shop to get it fixed. A countermeasure, besides being a thing military planes use to deflect shots, is a physical or logical procedure that recognizes, reduces, or eliminates a threat to ensure protection for the computer and network systems.
Also, after reading module 6 I learned about phishing which seems very clever but can be very troublesome. I get a ton of these on my cell phone more than on my computer. Using digital Watermarks to protect your work sounds like the watermark that appears on your checks to protect them from being replicated. The study of ways to secure information is called cryptography which reminded me of morse code which is a method of telecommunication that encodes text; I wonder if there are any close similarities to the two. Denial-of-Service Attack seems very malicious; I wonder what a person really accomplishes by doing this. I did not know that active content could be a threat for Malware. A common type of Malware is called Trojan horse which is a program hidden inside another program. I know that Trojan horse got its name from the wooden horse, unknowingly full of warriors, the Greeks used to win the Trojan war.
Using a program called password manager is convenient to keep track of all your different passwords. I personally prefer keeping a handwritten copy of my passwords in case something happens to my computer. Digital and server Certificates seems like the best security option discussed in this module. After reading module 6 I have a better understanding of all the different threats for internet security and now I will hopefully never get locked out of my computer again.