Professional Documents
Culture Documents
Introduction to Computing
BSIT112 Performance Task
ISSUE #1
Zoom provided them with data that linked individuals with their LinkedIn accounts. The occurrences
occurred as a result of a subscription-based platform called LinkedIn Sales Navigator Zoom, which gave
consumers assistance with their marketing needs.
ISSUE #2
Phishing emails and SMS messages may appear to be from a firm you know or trust in order to persuade
you to divulge personal information such as passwords and credit card information. They may appear to
be from a bank, a bank, a credit card business, or a message from a Facebook friend.
Social media sharing is restricted - social media networks such as Instagram, Facebook, and
Twitter are all publicly available. They can preserve their privacy by locking their account or
making it private.
To enhance restraint in front of doings, which are now easily accessible on social networking
sites. Email recipients frequently click on links in emails that might compromise machines.
ISSUE #3
According to investigators, a cyber can artist portrayed Cascolan in an Internet-based fraud. Using stolen
identities, the poster identified set up a phony social network account on Facebook under the name
Camilo P. Castolan to advance his criminal misrepresentation and impersonation operation.
Limited social media sharing - social media channels such as Instagram, Facebook, and Twitter
are all publicly available. They can preserve their privacy by locking their account or making it
private.
Because email scripts are incorporated inside the device, it is easier for anyone to develop a code,
attach it to an email, and send it, recipients tend to click on this email, which can compromise
devices.