Abstract This report represents the interrogation conducted on individuals trying to look their meshing usage and security standards they use while accessing cyberspace profit by dint of handheld devices like mobile, iPhone, iPods, etc. whatsoever of the findings are do to enhance the security measures for internet users: * quick users were more(prenominal) belike to access internet * Mobile users providing their personal fellowship are more in comparison with computer users * flake of Blackberry users is little than iPhone users accessing phishing website * Computer users are less promising to be dupe of social engineering and phishing Recommendations: * Do not open website link provided in e-mail * Always typecast the website address by yourself in the web browser or verify the same * Use internet browser which is secured against threats * Online proceeding should be stopped or cancelled in either case of doubt * Cyb er cell or CERT should immediately be informed in the case of internet fraud all-encompassing research work is required on more users for a persistent period of time to obtain broad knowledge of the internet users and security standards using similar approaches. Table of limit 1.
Introduction 3 2. enquiry Question 5 3. explore Design 6 4. Findings and Analysis 8 a. Article followup 8 b. Observa! tion on Mobile Internet Users 8 c. Questionnaire 9 d. Interviews 12 5. Discussion 14 6. Limitations 14 7. time to come Work 14 8. References 16 9. appurtenance 17 e. Appendix A 17 1. Introduction The round of articles I scram covered introduces the definition of social...If you want to take away a full essay, order it on our website: BestEssayCheap.com
If you want to get a full essay, visit our page: cheap essay
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.