Site icon Cyber Security & Awareness

QTS_Unit 2_Question 1

Ways we leave information when we use technology:

+ Data is collected during game play: When we perform login on the game, we need information such as name, phone number, address and location

+ Share through social apps: When we share some information, we accidentally fall into a security hole

+ Join social networks like mega(facebook), zalo…: When registering on social networking sites, the information that has not been set private can be seen and shared by other individuals. as picture, location

+ online shopping: When we shop directly, the information will be registered for sellers to see and contact, it is also a technology gap and personal information is easily leaked out.

+ Vulnerabilities in systems and applications of service providers: (including the system of educational institutions); loopholes in the customer information security policy of service providers, in which there are businesses that intentionally give customer information to third parties.

As a result, personal information is leaked, especially mobile phone numbers, account names on social networks such as Facebook, Instagram, etc. fox…

More seriously, the user’s real photo is used by the object to create fake accounts to deceive the user’s friends and relatives.




Exit mobile version