You are on page 1of 1

Hinong, Aina Chariz C.

Introduction to Computing
BSIT112 Performance Task

ISSUE #1

Zoom provided them with data that linked individuals with their LinkedIn accounts. The occurrences
occurred as a result of a subscription-based platform called LinkedIn Sales Navigator Zoom, which gave
consumers assistance with their marketing needs.

 Using a VPN is the most effective technique to maintain Internet privacy.


 Because email scripts are integrated into the device, it is simple for anybody to develop a code,
attach it to an email, and send it; recipients are prone to clicking on this email, which can
compromise devices.

ISSUE #2

Phishing emails and SMS messages may appear to be from a firm you know or trust in order to persuade
you to divulge personal information such as passwords and credit card information. They may appear to
be from a bank, a bank, a credit card business, or a message from a Facebook friend.

 Social media sharing is restricted - social media networks such as Instagram, Facebook, and
Twitter are all publicly available. They can preserve their privacy by locking their account or
making it private.
 To enhance restraint in front of doings, which are now easily accessible on social networking
sites. Email recipients frequently click on links in emails that might compromise machines.

ISSUE #3

According to investigators, a cyber can artist portrayed Cascolan in an Internet-based fraud. Using stolen
identities, the poster identified set up a phony social network account on Facebook under the name
Camilo P. Castolan to advance his criminal misrepresentation and impersonation operation.

 Limited social media sharing - social media channels such as Instagram, Facebook, and Twitter
are all publicly available. They can preserve their privacy by locking their account or making it
private.
 Because email scripts are incorporated inside the device, it is easier for anyone to develop a code,
attach it to an email, and send it, recipients tend to click on this email, which can compromise
devices.

You might also like