and message integrity (blocking message alteration) to achieve privacy.
4. Use of strong password Since many applications on the internet typically require the use of a password to match an account, whether it is an e-mail account, online banking account, or Facebook or Twitter account, an important thing for users to do is create a strong password. A strong password should also have at least one uppercase letter, one lower case letter, a number, and should also include symbols on the keyboard (such as! @ # $ % ^ &).
5. Security Training and Awareness The human factor is the weakest link in any information security program. Communicating the importance of information security and promoting safe computing are key in securing a company against cyber-crime. Below are a few best practices: Communicate/educate your employees and executives on the latest cyber security threats and what they can do to help protect critical information assets. Do not click on links or attachments in e-mail from untrusted sources. Do not send sensitive business files to personal email addresses. Have suspicious/malicious activity reported to security personnel immediately. Secure all mobile devices when traveling, and report lost or stolen items to the technical support for remote kill/deactivation. Educate employees about phishing attacks and how to report fraudulent activity. 6. Use of Intrusion detection systems An intrusion detection system (IDS) inspects all inbound and outbound network activity and identifies suspicious patterns that may indicate a network or system attack from someone attempting to break into or compromise a system.
E-WASTEE-WASTE AND ITS ENVIROMENTAL EFFECTSE-waste definition:Electronic waste or e-waste is the term used to describe old, end-of-life electronic appliances such as computers, laptops, TVs, DVD players, mobile phones, mp3 players, etc., which have been disposed by their original users.Environment: the surroundings or conditions in which a person, animal, or plant lives or operates.E-waste has been categorized into four main categories:Large household appliances: Large Household Appliances, IT and Telecom and Consumer EquipmentHousehold appliances: Refrigerator and washing machine.IT and Telecom: PC, monitor and laptop.Consumer Equipment: TV.
AMOUNT OF ELECTRONIC WASTE WORLD-WIDERapid changes in technology, changes in media (tapes, software, MP3), falling prices, and planned obsolescence have resulted in a fast-growing surplus of electronic waste around the globe. Technical solutions are available, but in most cases a legal framework, a collection, logistics, and other services need to be implemented before a technical solution can be applied.Display units (CRT, LCD, LED monitors), processors (CPU, GPU, or APU chips), memory (DRAM or SRAM), and audio components have different useful lives. Processors are most frequently out-dated (by software no longer being optimized) and are more likely to become "e-waste", while display units are most often replaced while working without repair attempts, due to changes in wealthy nation appetites for new display technology. This problem could potentially be solved with Modular Smartphones or Phonebloks. These types of phones are