A person’s computer is only safe if the user takes the correct measures to ensure they do not expose the system to a potential attack. They also must practice strong password safety/security as well as using verifying services that confirm a user’s identity. Since a person’s computer is only safe if the user properly uses it and by making use of cybersecurity programs to nip any attacks in the butt before they make their impact. One way that users can ensure safety and security in both personal and workplace settings is to use third party authenticator as a verification service. This can be an application like Duo Mobile for example, which I personally use to keep my gaming accounts safe as well as my ODU account. The application will verify that the user is who they are by sending a verification code or window to the user’s cellular device. The only downside to this would be if the phone was compromised somehow or the attackers being able to get into the application account to approve entry into the account they’re trying to access. In communications identity safety can be vital to how a business runs, if communication occurs between the boss and employee via email or online communication there is a risk that it is not actually the boss but an impersonator trying to gain access to information or receive information form another employee by acting like a person with power in the company. Certificates, digital signatures, and keys all help to verify that the person sending an email or message is actually who they say they are. The first step to be taken when wanting to prevent attackers from manipulating employees is to establish a public and private key pair which will verify whether they’re who they say they are or an imposter.
Leave a Reply