Some graphics reproduced using
Print Shop Deluxe, Broderbund Software, Inc. All Rights
Reserved used by permission. The Classroom does not claim
all descriptions of sites to be their own words. The Classroom makes no promises or representations about the gadgets on
this site as to quality. content or performance
Hacking and
Cyber Attacks Analysis
"People,
not computers, create computer threats.
Computer predators victimize others for
their own gain. Give a predator access to
the Internet — and to your PC — and the
threat they pose to your security increases
exponentially. Computer hackers are
unauthorized users who break into computer
systems in order to steal, change or destroy
information, often by installing dangerousmalwarewithout
your knowledge or consent. Their clever
tactics and detailed technical knowledge
help them access the information you really
don’t want them to have."
Source
WebRoot
1. Trust But
Verify If you are emailed, called or
text from any individual organization or company requesting
information. Don't respond. Call them and seek out the
validity of the correspondence.
2. Use a 2 Step Verification on any vital site.
We are using what we feel as trusted sites and
videos. If at any time they have changed or gave you
questionable information or advice pleaseContact Us