Cyber Crime, Cyber Safety, and Cyber Ethics PDF
Document Details
Uploaded by IntimateCanyon
Tags
Summary
This document provides an overview of cyber threats and protective measures, emphasizing internet safety and cyber ethics. It covers topics such as viruses, spyware, phishing, and cyberbullying, along with ways to protect against malicious online activities, including proper internet usage. The document strongly emphasizes responsible digital citizenship.
Full Transcript
# Cyber Crime, Cyber Safety and Cyber Ethics ## Objectives: By the end of this chapter, you will be able to: - Understand various cyber threats. - Protect yourself from cyber threats. - Protect yourself against cyber bullying. - Respect online privacy of others. - Respect intellectual property ri...
# Cyber Crime, Cyber Safety and Cyber Ethics ## Objectives: By the end of this chapter, you will be able to: - Understand various cyber threats. - Protect yourself from cyber threats. - Protect yourself against cyber bullying. - Respect online privacy of others. - Respect intellectual property rights of others. - Avoid piracy and plagiarism. ## Targeted Skill Set: Be a responsible netizen. Abstain from piracy and plagiarism. Respect IPR. When we buy a vehicle and drive it on the road then we need to follow traffic rules so that our freedom of driving does not threaten the freedom/safety of others. Similar principles apply to the usage of devices such as mobile phones and computers, especially when we are online where others interact with us. Considering the right usage of devices comes under the principles of cyber ethics. A set of rules or principles that guide us in using computers and devices without harming others in any way is called **computer ethics**. ## Ethics in Computing The computer ethics broadly cover the following norms: 1. We must not cause any sort of harm to others while using computers and while being online. 2. The data and information of other people on their computer must not be interfered with in any way. 3. The privacy and sensitive data (identity, passwords, user IDs, etc.) of other people is as important as ours. 4. We must use the genuine software procured from reliable and authenticated sources. 5. We have to keep the social well-being and fairness for all while writing computer programs and software. 6. A computer must not be used to threaten or bully anyone in any way. 7. The technology must be used in a productive way, not be abused. 8. We must respect others and their identity without indulging into abusive behaviour. ## Cyber Threats and Protection from Them There are a variety of cyber threats on the internet today that may cause psychological harms as well as loss of your important data and information. An online computer is exposed to the threat of viruses, spyware, unauthorized access and information theft. Once information is stolen, it can be used for criminal purposes by hackers. Hackers can use a computer to commit criminal activities and send out spam. ## Viruses, Trojans and Worms - **Viruses** are malicious codes that attach themselves with program files and corrupt them. They destroy useful data, format or corrupt data storage. Entire computer systems can be rendered useless. - **Trojans** are the malicious programs that are promoted as useful utilities or software and, once installed, affect the computer system and files. - **Worms** are the program codes that spread their copies over a network from one computer to the other and make the computers slower in processing. ## Protection - **Anti-viruses**: Anti-viruses like Norton AntiVirus, McAfee VirusScan, Kaspersky, etc provide robust and effective protection to the computer. Users should have the anti-virus software installed on their computers. It is also important to keep the antivirus updated regularly to identify and neutralize newly developed malicious programs. - **Firewall**: A firewall provides another level of protection to prevent incoming attacks. Operating systems provide firewall protection which can be activated to filter unwanted access to the computers over a network. Private networks use firewalls to keep unwanted IP addresses filtered out. - **Operating System Update**: Windows updates and update of your browser fills any security holes and bugs which hackers can use to access your computer. Do not install undesired utilities or plugins in your browser. Do not open strange, unrecognized emails or attachments even from a reliable source. Worms spread by infected attachments and may launch email attacks to other users. Necessary attachments should be saved and virus scanned. ## Spyware or Adware Spyware installs itself on the computer without user's knowledge and monitors keystrokes, takes screenshots, reads chat, collects device and user information and forwards it to the malicious owners of such programs. Loss of confidential information and identity theft are the threats posed by spywares. ## Protection - Install an effective spyware detecting software. - Keep your operating system and browser updated. - Check if any unnecessary software is being installed. It is often during the installation steps and in the User Agreement. - Carefully read and close any warning boxes that look like important messages. - Be careful while installing free programs, games or shareware. Free programs may contain spyware. ## Spam Spam is unsolicited or undesired junk email usually a promotional material. Senders of such emails are called spammers. Spams have a link that lures the user into clicking it. This confirms user's email ID and that brings in more spam in future. ## Protection - Use spam filtering settings in the email service. - Share your personal email ID only with those you trust. - Do not display your email ID online for everyone to access. - Create separate email accounts for public use. - Look out for spelling mistakes and bad grammar in the mail. These mistakes are done by spammers to pass through the spam filter. ## Phishing and Pharming - **Phishing**: Fraudulently acquiring sensitive information from the users by impersonating trusted websites like banks and e-commerce merchants, etc. is called Phishing. Phishers target the details like pins, passwords and answers to security questions. Phishing occurs generally in the form of an email or through a legitimate sounding phone call. - **Pharming**: When website's traffic is redirected to another unauthorized fake URL then it is called pharming. Hackers somehow get access to the website's servers and manipulate the configuration files which identify the server as host website on the internet. ## Protection - Install anti-phishing software. - Never give away any sensitive information related to finance and security like pins, passwords, bank balance, transaction details, identification numbers, etc. in reply to undesired emails and never on phone. - Always cross check the source of email and phone call with the concerned agency. - Today, all authentic agencies like banks and merchants have their own secured apps for transactions. Download and use them on your mobile phones instead of unknown third-party apps. - Phishers address their targets with fancy terms like “valued customer" but genuine agency will address you by your correct name, username, customer ID, etc. - Regularly check your financial statements and account details. - Secured Socket Layer Certification is done for websites by authorized Certification Authorities (CA). CAs do not issue SSL certificates to any agency that is not properly identified and cleared. Check the website's certificate icon of a padlock in the address bar. All secured websites have SSL certificates. If the padlock icon is of an open lock then the website is not secured and must be left immediately. - Never ignore operating system, antivirus and browser upgrades. Do them as and when prompted or required. ## Firewalls Websites should deploy effective firewalls with suitable settings to keep away unauthorized access and intrusion. Let us understand what a firewall is and what it does. A firewall is a security combination of hardware and software that is used to protect a server and network resources from unauthorized access and intrusion. Firewall checks the incoming data packets over the networks and filters out which do not have suitable and sufficient permission to access the network. This way an extra level of protection is created right at the gates of the network. ## Internet Frauds and Scams Today we virtually live and shop on the internet. Scammers send the users tempting newsletters and prompts of getting rich quick through online gambling, lottery or games alluring them to click the link. Once you accept the offer they attempt to take sensitive information like credit card numbers, pins, etc. ## Protection - Ignore and do not fall for online offers that seem too exciting to be true. - Ask yourself: Do I really need it? Does it really concern me? - Avoid individuals asking for donations. - Avoid accepting or vouching for any financial transaction with online friends whom you have never met especially those in known notorious regions of the world. - Avoid charity involvement offers, placement schemes with instant visas, medical claims of quacks to cure certain disease instantly. ## Cyber Bullying Any sort of threat or harassment over the internet is the act of cyber bullying. Messages in bad taste and intentions, online mockery in friend groups or circles, stalking someone's online profile and trying to post unwanted updates, sending unsolicited private messages, videos, and pictures are considered as cyber bullying that affects young minds intensely even up to the threat of death. ## Protection - Children must know that their parents and teachers are always available for them when they face cyber bullying. - Children must know that no matter what, parents and teachers are their first support. - Children should inform their elders about any incident that sounds nasty even remotely. - Children must know the fact that cyber bullies are not capable of doing any harm and they can never carry out their claims of harming someone. - Children must block such intruders immediately and never entertain them. - In case of a cyberbully attack, save all their messages as evidence for later use. ## Malicious Smartphone Applications Many smartphone applications seem attractive but in fact contain malicious code that steals information stored in the smartphone, such as the address book data without the owner's knowledge. The personal information stolen this way is forwarded to the hackers who abuse it to commit cyber crimes such as spam operations, billing frauds and cyber scams. Every trending app is not worth downloading. ## Smartphone Safety Measures - Set up emergency numbers for instant calling. - Do not use cell phones everywhere - keep your senses free to perceive other stimuli while crossing the road, driving, using escalators, in crowded areas, etc. - Get rid of unwanted data as soon as possible - keep your phone data tidy. - Protect your phone from physical theft. Make it a habit to check while leaving any place. - Keep good password and pattern protection. - Keep the anti-virus and software updated. - Sign out of and close the apps that are used. - Avoid automatic download settings. - Keep your wireless access secured. - Do not install just any app impulsively or in peer pressure. - Keep a regular backup of your phone data. ## Digital Footprints From the moment we logon to any online platform until we logoff, websites and apps are programmed to track our movement in various ways like: - Which pages and other websites we visited? - Which links or buttons we clicked? - How much time we spent on a web page? - Which products or services we clicked on to? - Which products did we add to the shopping cart but didn't buy? - Which products we did buy? - Which products we marked as 'liked'? - Who all are our frequent friends and what are their likes/dislikes? - How often we visit which websites or particular section of a website? The above are common actions that leave a trail of data we create. This is called a digital footprint. Digital footprints show our browsing habits and online activities. ## Online Privacy We should respect other people's privacy online and insist that others also do the same. We should avoid the following to ensure other's privacy: - Do not send unwanted messages to others. - Avoid stalking (visiting online profiles of people and liking or commenting in their accounts. - If a person does not want to connect with you online, do not follow him/her unnecessarily. Limiting or preventing access to anyone's personal, financial and other private details by unauthorized agency is called safeguarding privacy. Exchange of information between two parties online should be protected by both the parties. For example, buyer registers on a website and buys a product or service. It is the responsibility of the buyer to provide required information correctly and businesses are responsible to keep these details secured. Websites must apply privacy policies for the customers. ## Intellectual Property Protection In this information age, information is created, transferred, used and changed in several ways. Information created through creativity and ideas in any form is called intellectual property. Some common examples of intellectual property are: - Inventions - Literary and artistic work - Software applications The prime owner of the information is the creator of that information and owns the right to do whatever needs to be done with that. Without owner's consent, information cannot be used, reused or exploited in any way. The right to protection of the intellectual property is called **intellectual property right.** ## Digital Property Any intellectual property in digitized form is called **digital property**. For example, a written song recorded in a video or sung in an audio, social media accounts and pages, images, videos, audios, all kind of accounts that access digital media, online gaming accounts, registered domain names, mobile apps, software, online service account, etc. ## Piracy and Plagiarism The unauthorized use of any intellectual property is called **piracy**. Piracy can be done in different ways such as reproducing someone's work as it is without suitable authorization like copying songs, stories, designs, etc. **Plagiarism** generally refers to stealing literary or academic work or content from original creator and claiming to be its owner. Following are some common examples of piracy: - **Software piracy**: Cracking software licenses, making copies and downloading unauthorized software from the internet is called software piracy. - **Counterfeiting**: Unauthorized copy and distribution of copyrighted material. - **License overuse**: This is the usage of a software by more users than allowed in the license. - **Illegal disk loading**: Selling storage media with illegal or unauthorized copies of software and other digital content. ## Avoiding Piracy and Plagiarism We need to follow some discipline to avoid piracy up to some extent: - Ensure not to purchase pirated content, insist on buying original software. - Avoid distributing pirated content unintentionally among friends and relatives. - As your moral duty help spread awareness about using genuine products. ## Measures against Plagiarism - Educational institutes should discourage plagiarism in students' work by educating them about it. - Appreciate and recognize genuine content. - Take permission to use and acknowledge the source of content in citation sections of your work. - Use plagiarism detection applications like PlagScan and iThenticate, etc. ## Glossary - **Trojans**: A malicious program that is promoted as useful utility but causes harm to the computer. - **Firewall**: Protects a server and network resources from unauthorized access and intrusion. - **Spam**: Unsolicited junk email. - **Pharming**: When website's traffic is redirected to another unauthorized fake URL. - **Cyber bullying**: Any sort of threat, scare or harassment over internet. ## Key Points - A set of guiding principles for using computers without causing harm to others is called **computer ethics**. - **Viruses** are malicious codes that attach themselves with program files and corrupt them. - **Trojans** are the malicious programs that are promoted as useful utilities but harm the computer. - **Worms** are the program codes that replicate over a network from one computer to the other and make the computers slower. - A **firewall** is used to protect a server and network resources from unauthorized access and intrusion. - **Spyware** is used for the purpose of eavesdropping. - **Spam** is unsolicited or undesired junk email usually a promotional material. - **Plagiarism** is the act of presenting someone else's work as your own. ## Exercise: 1. **Choose the Correct Answer**: a) A ______ leads to the loss of confidential information of the user. - Worm - Virus - Trojan - Spyware b) Cyberbullying mostly affects the minds of which of the following? - Parents - Children - Teachers - All of these c) Running a regular Windows update ensures which of the following? - Removal of malicious program - Installation of firewall - New features in Windows software - Fixing of security bugs d) To minimize the receipt of undesired junk mail, which of the following is the best way? - Install a firewall - Use spam filtering settings in the email service - Install SSL certificate - Unsubscribe such mails manually. e) Which of the following is not an example of cyber bullying? - Sending a message in good taste and intentions - Sending undesired messages in bad taste and intentions - Stalking someone's online profile and trying to post unwanted updates - Sending unsolicited private messages 2. **Fill in the Blanks**: - Set of rules to ensure use of computer without causing harm to others is _______. - _______ installs itself on the computer without user’s knowledge and monitors activities on that computer. - _______ cause the computers to process the data slowly. - Fraudulently acquiring sensitive information from the users is called _______. - A website’s SSL certificate icon is denoted by a closed _______. 3. **Tick (✔) the Correct Statement and Cross (X) out the Wrong One**: - Plagiarism refers to the usage of pirated software or program. - We should keep a good password and pattern protections for our mobile phone. - Children must immediately inform police about any cyber bully threat. - Pharming is website's traffic redirected to another unauthorized fake URL. - Intellectual property is the outcome of creative ideas. 4. **Answer the following questions**: - What is a virus? How an antivirus protects the computer from viruses? - Briefly describe Phishing and Pharming. Mention the two most effective ways to protect a computer from them. - List any five steps children must take if they are threatened by a cyber bully. - What is a firewall? How does it keep networks safe? - Why Windows updates are important to be done regularly? 5. **Value based Questions for Critical Thinking and Open Discussion**: - Plagiarism is an unethical practice. How can we prepare our content such as project reports and assignments by avoiding plagiarism? - We must know how to deal with cyber bullying but should we indulge in this immoral act ourselves? How can we enlighten and educate people to avoid bullying others online? - Deaths due to extreme selfies and obsessive mobile phone usage have been on rise recently. Do we really need to be constantly busy with the mobile phone? What limits should we set for ourselves?