Cyber Zone 6 Internet Ethics and Safeguard PDF
Document Details
Uploaded by BetterThanExpectedHydrogen
Tags
Summary
This document provides a beginner's guide to internet safety, covering topics such as spyware, pop-up ads, spam emails, phishing, and viruses. The document also emphasizes the role of parents and teachers in protecting children from online dangers.
Full Transcript
# Cyber Zone ## 6 Internet - Ethics and Safeguard ### Objectives - Understand how to protect yourself on the web. - Learn about the role of parents and teachers in protecting children from the digital world. ## Internet - Internet, also called Net, is one of the largest networks that links milli...
# Cyber Zone ## 6 Internet - Ethics and Safeguard ### Objectives - Understand how to protect yourself on the web. - Learn about the role of parents and teachers in protecting children from the digital world. ## Internet - Internet, also called Net, is one of the largest networks that links millions or trillions of computers all over the world. - You can access this network via communication devices and media such as modems, cables, telephone lines, and satellites. - Through the Internet, you have access to information from all around the globe. - The Internet enables you to read the latest news, do research, shop, communicate, listen to music, play games, and access a wide variety of information. - Internet has truly revolutionized the means of communication. - Any person who gets connected to the Internet gets connected to you. You can communicate with anyone on the Internet. It touches the lives of everyone. ## Protecting Yourself from Potential Threats on Web - You can protect yourself from a potential threat by understanding and preventing a number of security and privacy problems while using the Internet. - It is important when you want to send personal information like your bank account or credit card number over the Internet. - If you do not take measures to protect yourself from potential threats in the cyberworld, you and your computer could become the target of cybercrime. - Cybercrimes are those instances when a person illegally accesses your computer for malicious reasons. - Given below is a list of the different types of threats that are out there along with some recommended precautions you can take to protect yourself. ### Spyware - Spyware is a software program that gets installed on your computer without your knowledge or consent. - It gets downloaded from websites, email messages, instant messages or direct file sharing connections. - It can also enter in your computer while installing a software. - This program secretly gathers data from your computer, steals your passwords, displays unwanted advertisements, and takes control of your web browser. - Precautions: - Use an Internet security program to protect the computer from spyware and other security risks. - Install a personal firewall (software that protects network resources from outside intrusions). - Do not accept or open any doubtful error dialogs from within the browser. - Do not accept free deals because spyware may come as a part of a "free deal" offer. ### Pop-Up Ad - Pop-up Ad is an advertisement that disturbs your web browsing by appearing in a separate browser window on the top of your current window. - Pop-ups are dangerous because clicking items in the pop-up window can cause spyware or viruses to be installed on your computer. - Precaution: - You can use a pop-up blocker to block such ads in the browser. ### Spam Email - Email spam, also known as junk mail, involves sending unwanted messages by a spammer to a large number of recipients. - It can be used to deliver emails that contain viruses and targeted attacks aimed at obtaining sensitive, personal information. - Some spam may include hidden text that becomes visible only if you highlight the content; it is a common trick that spammers use to get their email to pass through spam filters without detection. - Precautions: - Sign up for email filtering through your ISP, or use an anti-spam program. - Do not click links in spam or reply to spam for any reason. - If you suspect an email to be spam, do not respond; just delete it. - Keep your security software up-to-date. ### Phishing - Phishing is a scam in which you will receive an official or legitimate-looking email message that attempts to obtain your personal and/or financial information. - These messages request you to update your credit card number, bank account number, password, or other private information. - Phishing scams can be executed via email messages, websites, and even on the phone. - Precautions: - If you receive an email from someone requesting you to verify online account or financial information, do not reply. - If you receive a phone call from someone claiming to be from a legitimate company or bank, record caller name and the time of the call. Do not disclose personal or financial information to the caller. - Never click on links in email messages even if you know the sender. - While visiting a bank's website that requires you to enter confidential information, make sure to type the web address correctly. Typing it incorrectly may take you to a phishing website where the information you enter can be collected by an unknown party. - Enable phishing filter in your browser that warns or blocks you from suspicious websites. ### Virus - Viruses are programs which are created deliberately to damage data. - A virus can badly affect or infect your computer without your knowledge. - Once a virus is in your computer, your files and operating system may be damaged. - Viruses usually enter into your computer when you open an email attachment or download data from the web. - Precautions: - Open only those email attachments that come from trusted sources and are expected. - Delete all unwanted emails without opening. - Do not click on web links sent by someone you do not know. - Install an antivirus program and keep it updated. - Scan all files with an antivirus program before transferring them to your system. ### Keyloggers - A keylogger (keystroke logging) is a type of software that gets installed very easily and is often found on public computers. - It records keystrokes you make to enter the data in the computer in a hidden file. - Precautions: - Avoid checking your email or performing banking activities on public computers. These computers may be running keyloggers, which record keystrokes in a hidden file or other tracking software. - If you use a public computer for critical activities, be certain to sign out of any password-protected website and to clear the browser history. ### Manage Password - When you add User name and Password to login your account in a particular website, the web browser sometimes displays a prompt message that offers to remember the password you have typed. - If you click on 'Yes' and then access the website in future, the web browser bypasses the login page and takes you directly to the site. Therefore, anyone who uses your computer can also access your account from the site. - Precaution: - Always click on 'No' when your web browser prompts to remember the password. ### Cookies - A cookie is a small text message that a web browser stores on your computer to keep track of websites. - Cookie files typically contain data about you, such as your user name, postal code, or viewing preferences. - Websites use cookies for a variety of purposes: - Most websites that allow for personalization use cookies to track user preferences. - Some websites use cookies to store user names and/or passwords, so that users do not need to enter this information every time they sign into the website. - Online shopping sites generally use cookies to keep track of items in a user's shopping cart. - Other websites use cookies to track how often users visit a website. - Precautions: - Some websites sell or trade information stored in your cookie to advertisers. - If you do not want personal information to be distributed, you should limit the amount of information you provide to a website or adjust how your browser handles cookies. - Clear or disable cookies in your browser. - Most modern browsers allow users to decide whether to accept cookies and the time frame to keep them. - However, rejecting cookies makes some websites unreadable. ### Vulnerabilities - Vulnerabilities are flaws in a computer software that weaken overall security of your computer. - They can also be created by improper computer or security configurations. Cybercriminals, like hackers or crackers, exploit such weaknesses and damage the computer or tamper its data. - Precautions: - Keep software and security patches up-to-date. - Configure security settings for your operating system and Internet browser. - Install an antivirus and keep it updated to block threats targeting vulnerabilities. - Clear cookies in your browser. ### Cyberbullying - Cyberbullying is a harassment that takes place using technology which includes sending or forwarding threatening text messages; posting embarrassing or altered pictures of someone without his or her permission; or setting up a fake online social network page where others make harsh comments and spread rumors about someone. Teenagers face the problem of cyberbullying most often. - Precautions: - Never give your personal information and password to any unknown person. They can use this information to harass you. - Check for privacy settings, usually found on the Settings on most social networking sites, to set permissions. In this way, you can control who can review your profile and photos, make comments, and if desired, block certain people from viewing your page. - You should search your name on major search engine such as Google on regular basis. If any personal information or photo appears, which may be used for cyberbullying, you must take an action to remove it. - Installation of filtering software on the computer can protect teenagers from viewing inappropriate content online. ### Hacking - The term hacker refers to someone who accesses a computer or network illegally. This is known as hacking. - This can happen either for positive or negative reasons. - Some hackers claim the intent of their security breaches is to improve security (positive). - Other hackers develop computer malware or virus to gain access to confidential information (negative). - A cracker is someone who also accesses a computer or network illegally, but has the intent of destroying data, stealing information, or carry out other malicious action. - Both hackers and crackers have advanced computer and networking skills. - Precautions: - You should make a strong password and change it frequently. Your password should be at least six characters long and include at least one number, letter (combination of upper and lower cases) and special character (@, *, &, !, etc.). Do not use your date of birth, name or any sensitive information as your password. - It is strongly advised that you use different passwords for different accounts. ### Social Engineering - Social engineering is a term used for gaining unauthorized access or obtaining confidential information by taking advantage of the trusting human nature of victims. - It is the art of convincing people to reveal confidential information, such as user names and passwords, on the social network or on the Internet. Human nature of trust is the basis of such social engineering attacks. - Social engineers are aware of the fact that most people are unaware of their valuable information and are careless about protecting it. They obtain information from users who do not conceal information properly. ### Phases in a Social Engineering Attack - Research on the Target (person or a company) - From websites, employees, tour information, etc. - Select the Victim - Identify the frustrated employees of the target. - Develop Relationship - Develop relationship with the selected employees. - Exploit the Relationship - Collect sensitive and financial information ### Precautions - Verify the identity of the person or organization requesting personal or confidential information. - While relaying personal or confidential information, ensure that only authorized people hear your conversation or get the information. - When personal or confidential information appears on a computer or mobile device, ensure that only authorized people can see your screen. - Shred all sensitive or confidential paper documents after use. - After using a public computer, clear the history in its browser. - Avoid using public computers to conduct banking or other sensitive transactions. ### Digital Footprint - Everytime you surf the Internet, you leave a trail behind known as digital footprint. - Whatever activity you perform on the Internet such as checking mails, filling forms, online banking, buying and selling things, and posting on social networking leaves traces of your personal information online. - This information can be seen by other users. - Open the history section of your web browser, and you can see all the websites you have visited in the past. - Everyone who uses the Internet has a digital footprint, so it is not something to be worried about. - However, it is wise to consider what trail of data you are leaving behind. ### Precautions - Keep your privacy settings as high as possible. - Never post personal information such as home address, telephone number, or office address of your family members. - Never upload or download inappropriate picture or videos. - Never post inappropriate matter about any person because your post is public. - If you see something online that makes you feel uncomfortable, unsafe or worried, leave the website and turn off your computer. If you want, tell a trusted adult immediately. - When you use a public computer, make sure you logout of the accounts you have accessed before leaving the computer. ## Role of Parents and Teachers - The growth and popularity of technology, especially the Internet, has brought up a 'digital generation' which excites as well as worries parents and teachers. So, both parents and teachers have to play their role and protect the children in the virtual world. - Parents and teachers should advise children to play only those online games which are suitable for their age. - Parents and teachers should advise children that most social networks are not suitable for children under 11-12 years of age. - They should be an active part of the children's online life. At the same time, they should gain their trust as far as the use of Internet is concerned. - They should advise children not to share any personal information to any unknown person. - They should make such environment at home and at school so that children can discuss their internet-related problems openly, without hesitation. - They should advise children to create a strong password for every account (such as email account) and keep on changing password after a certain period of time. Most importantly, never share it with anyone. - Internet is full of objectionable content such as violence and obscene material. Parents and teachers should use content filtering to restrict access of minors to inappropriate sites. - Let us not forget that Internet is an excellent tool for education, entertainment, and communication. - Parents and teachers should be aware that the online world is here and the only thing they can do is to prepare their children/students to become responsible digital citizens.