Chapter 5 Summary

A brief summary of chapter 5 is how a user generates content. An example being instant messaging, social networks, podcasts, and more. However, the opportunity that comes with easy access to generating content as a user is pricey. There are people out there who want your identity to do bad things under your name or want to do bad things to you. So you need a way to keep your privacy intact. The best way to do that is to keep your personal things out of your life. A phone number, an address, and any other important info. Something similar had happened to me. A trusted friend had sent me something for a game I played on Steam. I clicked the link to try and redeem it and I got multiple emails telling me someone was trying to hack into my account. That day I enabled two factor authentication, so that my account will be secured. This is also common on social apps. People will create an account just like yours, friend all your friends and try to impersonate you. The best thing you can do is have decent netiquette, because if someone sees you do something of the ordinary they’ll check up on you.

 

Appendix A Chapter 5
Chapter 1 Chapter 6
Chapter 2 Chapter 7
Chapter 3 Chapter 9
Chapter 4 Chapter 10
                                 Previous   1   2   3   4   5   6   7   8   9   10   Next