Unit 2 Career Readiness
Copyright Goodheart-Willcox Co., Inc.
Use caution and protect your privacy when
using technology to communicate.
Whether at school or home, each time you use a search engine
or visit a web page, the computer’s identity is revealed. The Internet
protocol (IP) address is a number used to identify a device connected
to the Internet. While your personal information cannot be easily
discovered, an IP address can reveal your approximate location. Any
e-mails you send from your computer or mobile devices have an IP
address attached to them. Use caution when doing so.
When transmitting private information to a website, check that
the site is secure. A secure URL begins with https. The
stands for
secure. This is not 100 percent foolproof, but generally is a sign of
protection. Secure websites may also display an icon somewhere
to indicate that the communication is secure. Be wary of uploading
personal information to sites that do not display the protection icon.
Public Wi-Fi hotspots are convenient ways to access the Internet.
However, they should be avoided. These networks are generally not
secure and put your devices at risk of inadvertently exposing data.
Hackers may create hotspots in locations where free or paid public
Wi-Fi exists. Users unknowingly connect to the incorrect network.
This allows the hacker access to any data being transmitted over that
connection. The signal with the best strength
may not always be a legitimate hotspot. An
easy way to be sure the hotspot is safe is
to check with an employee of the business
providing it. Ask the employee for the name
of the network and the access key. If a Wi-Fi
authentication screen asks for credit card
information, confi rm that the Wi-Fi connection
is legitimate before entering any inform ation.
Cookies are bits of data stored on your
computer that record information about
the websites you have visited. Cookies may
also contain personal information you have
entered on a website. Most cookies are from
legitimate websites and will not harm your
computer. Marketers use the information for
research and selling purposes. If a hacker
gains access to your cookies, you are at risk.
The cookies can be used to steal personal
information you have entered on a website.
Cookies also can be used to target you for a
scam based on your Internet history.
Previous Page Next Page