Monday, August 13, 2018

Give four different types of business activity and demonstrate how to solve the problems in internet use [M1]

1) Non-deliver of email


I am going to demonstrate on different problems faced by users in business in which I will first start with “non-deliver of emails”. As you can see, I just sent an email but I receive an email from “mail delivery system” instead. So basically, when you receive the notification of “mail delivery system” it means that your receiving email is either wrong or there are some features not included in your email.

The causes may vary to different factors, but what to prevent it from happening?

1. Double check either the email address that you want to send to is correct or not
2. Make sure not to miss any important features like the subject, etc.
3. Make sure you have a good connection service


If you don’t receive the mail delivery system email, that means that you have sent to the correct email. 

2) Too many hits on search engine




Next, too many hits on search engine. At times, this can be frustrating and time-consuming to some business users when they are planning to use the internet for some purposes especially when doing business research. in this case, I am going to find an article about entrepreneurship program in Brunei.

In order to lessen the amount of hits on search engine, there are few steps that business users need to follow:

1. Make sure to use unique, specific terms to reduce the number of pages shown
2. Use quotation mark for exact phrase
3. Don’t use common words and punctuation
4. Use capitalization
5. Drop the suffixes. it is usually best to enter the base word so that you won’t receive any irrelevant pages. For instance, putting the word "business" instead of "businesses".

By doing so, users can immediately find their targeted pages instead of wasting more time scrolling through the webpage. Most importantly, users can start their business research effectively.

3) Email spams




Many email spam messages are commercial in nature but may also contain disguised links that appear to be for familiar websites but in fact lead to phishing web sites or sites that are hosting malware.


Chances are that most of us reading this email can easily identify a spam message in our inbox and ignore it. However, not everybody is as experienced in the methods of marketing and the risks associated with spam. There are individuals in the world who will respond to spam messages, giving the malicious spammers who sent them exactly the risky financial or personal information that those spammers want. The result can be profit for the spammers and even financial loss for the recipients.

Actions taken to reduce risks of email spams:

1. Maximize filter use. Gmail includes tools for filtering email and blocking spam as well
2. Never respond to email spams
3. Block and report spam. If your email provider offers these services, take advantage of them. You may think that deleting a spam message is enough, but all that does is remove one message from your inbox. When you block messages from a certain sender, that sender cannot use that same email address to send you more messages.

4) Error messages




An error message is a message displayed to the user by an operating system or application when an unexpected condition happens. In most cases, error messages are displayed with the help of dialog boxes by the operating system or application. Error messages are required when user intervention is needed or to pass important warnings.

The solution to reduce risks are as following:

1. Re-check the word spelling before entering to the search box
2. Assure that connection service is stable
3. Make sure not to miss any features like http:// or www as it will make a difference
4. Do not use any shortform


Describe the actions taken to reduce risks to security whilst using the internet for different types of business activities. [P4]


Using or setting up password

Utilizing a VPN which is also defined as "virtual private system".  It is only an extravagant method of saying "ensure my profile is secured and protected when I'm on the web." With free wi-fi in coffeehouses and airplane terminals, an even more increasing number of programmers are utilizing basic "man in the middle" attacks to trap individuals into signing onto their phony systems. From that point, it's simple for them to take your data especially personal ones. Utilizing VPN service protects you from these hackers when out and about, masking your online presence.

Next, savvy password practices. It means that your online passwords ought to never be as simple as "password”, "abc123”, “123456” or anything that can be simply speculated and predicted. In the event that you utilize one specific password key for all your online accounts, once a hacker successfully breaks in one of your accounts, he could without much of a stretch bring down the rest of your accounts. That implies to your email, online banking details and everything. However, you can reduce the risks by utilizing distinctive passwords for various accounts and services and changing them on regular basis, let say monthly. It may appear as a problem, however it’s a way better issue than having your personal online banking details ruptured.

Another action that should be taken is to utilize anchored sites. Most internet browsers, for example, Google Chrome will demonstrate a green symbol in the URL address bar at whatever point you are on a site that is anchored. Another pointer of security is if the site address begins with "https" versus "http." That little expansion of the "s" implies the site you are on is secured and safe to surf through. In some cases where you are doing online shopping on the web or doing anything that expects you to give touchy information, ensure the site address begins with https.

Next, users should not forget to use anti-malware programming. Nearly everybody knows about antivirus programming. Numerous anti-malware programme incorporates the capacity to examine and anticipate malware, but not every each of them. In order to stay protected, user need to supplement their current antivirus programme with a standard anti-malware software, for example, Malwarebytes and make sure to dependably stay update with the latest version of security software.

Checking before downloading emails

Firstly, if you get a phishing email message, never respond to it and try not to open junk mail by by any chance. Basically, phishing is a sort of online identity fraud that utilizes email and fake sites that are intended to take your own information or data, for example, credit card numbers, passwords, account information or other important data. To shield yourself from phishing tricks sent through email, if an email looks suspicious, don't put yourself in danger to your own data by reacting to it. Next, try to erase junk email messages without opening them. Now and then notwithstanding opening spam can alert spammers or put an unprotected PC in danger. It is vital to ignore an email except if you're sure that the message originates from a reliable source and make sure to make full use of the junk mail tools in your email program.

Approach links in email messages in alert. Links in phishing email messages frequently take you to imposter locales that urge you to transmit personal information or money-related data to swindlers. User must abstain from clicking a connection in an email message except if you are certain of the reliable target address, URL, or from a substantial sender. Most email programs demonstrate you the actual target address of a connection when you drift the mouse over the connection inside the message. Before you click a link, make a point to peruse the objective address. On the off chance that the email message seems to originate from your bank, yet the objective address is only an aimless arrangement of numbers, don't tap into the link as it may be a scam. Additionally, ensure that the spelling of words in the connection matches what you anticipate. Spammers and tricksters frequently utilize URLs with grammatical errors and transposed letters in them that are barely noticeable.

Next step is do not confide in the sender data in an email message. Regardless of whether the email message seems to originate from a specific sender that you know and trust, utilize similar precautions that you would use with some other email message. Users should also be extra cautious with spoofing activity. It is the action where the sender address and different parts of the email header are changed to seem like the email started or was sent from an alternate source. This is a typical routine with regards to spammers and is one of the hardest to tackle as there might be legitimate reasons to spoof an address.

Backing up data

First, continuously back up your information. Counteractive action is the best assurance. Make an organized reinforcement methodology and always back up your data. Your backup plan ought to incorporate the diverse levels of information you keep up in your organization and the calendar for their back-ups. A few information is critical to the point that it might require you to back it up weekly. Likewise, make sure you intermittently test your reinforcements to ensure that your information is being backed up appropriately.

Secondly, enhance your backups. You generally need in excess of one backup system. The general rule is 3-2-1. You will need to have 3 backups of anything that is imperative. They ought to be backed up in no less than two different formats, for example, in the cloud and on a hard drive. Also, there should dependably be an off-site backup if there is harm to your physical device.

Thirdly, encrypt sensitive data. Information isn't generally encoded even when it's on a backup tape. It’s best to put on some investments into a backup system or services that naturally encrypts all backups to guarantee that regardless of who gets their hands on your information, they can't get to it.
Furthermore, users must also avoid malware. One of the greatest dangers to your data file is pernicious program, usually known as malware. Viruses, Trojans and worms are all waiting to pounce and can be subtly installed on your PC in various ways. These damaging programs make an expansive number of undesirable and destructive sections in your registry, regularly causing system crashes including numerous machines. This is the reason why you have to ensure your PC with dependable security system. A quality anti-malware program is an absolute necessity nowadays, alongside firewall components. Also, you can utilize a registry clearing device to clear out the majority of the document remainders deserted from uncomplete installations.

There are number of standard items promptly accessible on the web to keep all your files and information. Security programs like McAfee and Symantec offer a portion of the best system to ensure you against the normal risk of malware. There are additionally many cleaning utilities particularly intended for your Windows registry.


Taking precautions

It is best to keep personal information professional and limited. Potential managers or clients don't have to know your own relationship status or your place of residence. They do need to think about your aptitude and professional background and how to connect with you. You wouldn't hand simply individual data out to outsiders exclusively especially to a huge number of individuals on the web.

Moreover, keep your privacy settings on. Advertisers love to thoroughly understand you, thus do hackers and scammers. Both can take in a considerable measure from your surfing and activity in social media. Just like what it seems, you can take part in the responsibility of your data. Both internet browsers and mobile operating systems have settings accessible to secure your protection on the web. Significant sites like Facebook likewise have protection upgrading settings accessible.

Next action that needs to be taken is to practice safe browsing. You must avoid visiting unsafe neighborhoods on the web. Cybercriminals utilize offensive substance as a clickbait. Both scammers and hackers are smart enough to know that users nowadays are always enticed by questionable substance and may let their watch down while scanning for it. The internet's demimonde is loaded up with entanglements that are hard to see, where one indiscreet snap could uncover individual information or taint your personal device with malware.

Another step is to ensure your internet connection is secure. When you go online in an open place, for instance, using an open Wi-Fi connection, it is proven that you have no immediate control over its security. Corporate cyber security specialists stress over "endpoints” in which the spots where a private system associates with the outside world. Your helpless endpoint is your local internet connection. Additionally, you also need to ensure that your gadget is secure and if all else fails, sit tight for a superior time (i.e., until you're ready to interface with a safe Wi-Fi arrange) before giving data, for instance, your bank account number.

Last but not least, be careful of what you download. The main objective of cyber criminals is to deceive you into downloading malware programs or applications that convey malware or to steal your personal data. This malware can be veiled as an application: anything from a prevalent diversion to something that checks activity. It is advised not to download applications that look suspicious or originate from a web page you don't trust.