You are on page 1of 1

Reaction Paper:

As the world becomes more and more advanced by the use of technology the
same way it becomes more dangerous. The second chapter is all about the attacks,
concepts and techniques of cybersecurity. The different types of malicious software or
the malware has been tackled. Malware is used to steal data, access controls that can
cause harm to the system. Some types of malware is the spyware that is usually to
track or to spy a user or to collect data by modifying the security settings. Adware that
only delivers advertisements but can be used to spy. Virus which is usually spread by
flash drives, network share, or email. And the worms that is the can be a reason to have
a slow down network. It also can run by themselves compared to viruses that require a
host to run. Those are some of the malware that we must avoid. The next chapter talks
about data privacy which is the most important for us to keep. It contains our passwords
and personal info that the hackers may use on their personal advantage. Though we
must at least take action for this. Some ways have been discussed on how to protect
our privacy, one is to at least minimize putting our personal information on our social
media accounts and not use passwords that it is easy to guess. Use uppercase and
lowercase letters and some numbers for a better password.
In all of the advantages of technology that is given to us, we must still put in our
mind to be a responsible user for our own sake. Using backups for our files, especially
files that are important for us is a must because we can not say if the devices will have
a problem. Storing backup files on flash drives or external is good but storing on online
storage is a way better. Having basic knowledge about this matter is a good way to at
least protect ourselves from hackers and it will help us to be more comfortable.

You might also like