Angolans with fear and insecurity with the use of the internet

1007

Angolan citizens still show some insecurity with the use of the Internet, mainly on social networks and where they applaud the existence of the new Penal Code, which fights computer crimes.

"My cell phone has already been robbed, and some intimate photos have been exposed on social networks. This situation caused me a lot of embarrassment, I couldn't go to school or be with friends. I took time to recover”, revealed citizen Teresa Domingos, in an interview with Jornal de Angola.

Manuel Cassombe said that he was already the victim of a “scam” when updating Multicaixa Express, and the criminals managed to steal more than 500 thousand kwanzas from him. The young man reported that he has already filed a complaint with the National Police, but without success, a situation that has been going on for almost a year.

"I confess I owed him money, but it wasn't for that. I was out of the country, so my cell phone was turned off. When I saw my image circulating I felt upset and very sad.”, said Eduardo Gabriel.

BUT: Users continue to ignore misleading content alerts on social networks

In the interview with the Angolan daily, the citizen underlined that as a trader, this attitude discredited the confidence that people had, his income dropped significantly. Because of these inconveniences experienced, the young man argues that before he had to go through a criminal process and then be judged in that way, because playing or dirtying the image of others is much worse than losing money.

According to computer security specialists, the problem can be broken down into several different aspects, the most relevant being authentication, considered one of the fundamental elements.

In many cases, any type of communication or mechanism for guaranteeing security must first ensure that the intervening entities are, in fact, who they claim to be.

Authentication is the process that validates the user's identity. Confidentiality brings together the aspects of security that limit access to information only to authorized entities (previously authenticated), be they human users, machines or processes.

LEAVE AN ANSWER

Please enter your comment!
Please enter your name here