Page 22 - 166 Varsity ebook
P. 22

20 /


        “We need to be more vigilant.  face and what options are available
        The tragedy reminds me that ev- to counter these risks, such as us-
        ery teacher should keep an eye on  ing strong and random passwords,
        changes in teaching software and  not clicking unknown links, and
        chat rooms,” Li continues.          not sharing account information
                                            with anyone,” Meng says.
        Assistant professor Meng Wei of
        the Department of Computer Sci- “To prevent potential misuse, on-
        ence and Engineering at the Chi- line  conference  software develop-
        nese University of Hong Kong at- ers should devote more resources
        tributes the tragedy to abuse and  in developing user-friendly inter-
        misuse of technology.               faces with sound security features.
                                            Two-factor authentication is one
        “Security features of some online  example,” Meng says.
        conference softwares fail to pre-
                                            “A stronger level of restriction is to
                        “                   use a guest whitelist. But in many

         We need to be more                 cases, it is hard to trade usability
                                            for security, and people deliberate-
          vigilant. The trag-               ly choose convenience over securi-

            edy reminds me                  ty,” he says.

          that every teacher                *Name changed at interviewee’s re-
                                            quest
             should keep an

           eye on changes in                Sub-edited by Charmaine Choi

           teaching software

            and chat rooms,

                        ”



        vent malicious cyber attacks by
        hackers. Some users might even
        share passwords with these attack-
        ers,” he says.


        Meng, who researches cyber secu-
        rity, points out that it is important
        to educate internet users about the
        importance of protecting their ac-
        counts.


        “Users should learn what kind of
        network security risks they may
   17   18   19   20   21   22   23   24   25   26   27