Nothing Special   »   [go: up one dir, main page]

Lesson 2.1: Online Safety, Security and Netiquette

Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 6

LESSON 2.

1: ONLINE SAFETY, SECURITY AND NETIQUETTE


Online safety refers to the practices and precautions that should be observedwhen using the
internet to ensure that the users as well as their computers and personal information are safe
from crimes associated with using the internet. Below are personal information that must be
kept confidential.

There are numerous delinquencies that can be committed on the internet such as stalking,
identity theft, privacy violations, and harassment.

To avoid these online crimes, follow the following online safety measures:

Never give any personal information out about yourself over the internet.

Do not give any banking or sensitive information unless you are sure that it is a reputable
business having a secure service. To makesure that you are in a secured network, the website
address should begin with “https://’ as opposed to “http://”. Never access your accounts by
following an email link, instead type your URL by yourself.

Never open messages or attachments from someone you do not know.


Regularly review your privacy settings in your online accounts to make sure you are not
sharing important personal information.
When using a public computer terminal, be sure to delete your browsing data before
leaving.
Keep your software updated to avoid security holes.
Do not download or install software or anything on your computer or cell phone that is
unknown to you.

Netiquette is a combination of the words network and etiquette. It is a set of rules for
behaving properly online. Below are the 10 rules of netiquette:
FLAME WARis a series of flame posts or
messages in a thread that are considered
derogatory in nature or are completely off-
topic. Often these flames are posted for the
sole purpose of offending or upsetting other
users. The flame becomes a flame war when
other users respond to the thread with their
own
flame message.

Image from:
https://twitter.com/Parkster00/status/1246347
088625045504

LESSON 2.2: Kinds of Online Threats


There is no doubt that you need to be vigilant online. As the World Wide Web evolved over the
years, many internet predators have been playing on vulnerabilities to attack computers and
retrieve sensitive data from individuals. Half the time, we aren’t even aware it is happening until
it is too late.

Online Threatis deemed any malicious act that attempts to gain access to a computer network
without authorization or permission from the owners. These are usually done by computer
hackers who uses the World Wide Web to facilitate cybercrime. Web threats use multiple types
of malware and fraud, all of which utilize HTTP or HTTPS protocols, but may also employ other
protocols and components, such as links in email or Instant Messaging apps, or any malware
attachments on servers that access the Web. They benefit cybercriminals by stealing
information for subsequent sale and help absorb infected PCs into botnets. Web threats pose a
broad range of risks, including financial damages, identity theft, loss of confidential
information/data, theft of network resources, damaged brand/personal reputation, and erosion
of consumer confidence in e-commerce and online banking.

The following are the top kinds of online threats that you should be aware of:
* Phishing happens when an email is sent from an internet criminal disguised as an email from
a legitimate, trustworthy source. The message is meant to lure you into revealing sensitive or
confidential information.

* Pharming happens when a hacker (or “pharmer”) directs an internet user to a fake website
instead of a legitimate one. These “spoofed” sites can capture a victim’s confidential
information, including usernames, passwords, and credit card data, or install malware on their
computer. Pharmers usually focus on websites in the financial sector, including banks, online
payment platforms, or other e-commerce destinations.

* Internet Scam generally refers to someone using internet services or software to defraud or
take advantage of victims, typically for financial gain. Cybercriminals may contact potential
victims through personal or work email accounts, social networking sites, dating apps, or other
methods in attempts to obtain financial or other valuable personal information. Online scams
may come in various forms such as lottery scam, charity fraud scams, job offer scams, and
online dating scams to name a few.

* Internet Robots are also known as spiders, crawlers, and web bots. It is a software
application that is programmed to do certain tasks. Bots are automated, which means they run
according to their instructions without a human user. Some bots are useful, such as search
engine bots that index content for search or customer service bots that help users. Other bots
are "bad" and are programmed to break into user accounts, scan the web for contact
information for sending spam, or perform other malicious activities. If it's connected to the
Internet, a bot will have an associated IP address.

* Malware or malicious software, is any program or file that is harmful to a computer user.
Here are the most common offenders in the rogues’ gallery of malware:

Adware (advertising supported software) is unwanted software designed to throw


advertisements up on your screen. Example, pop-up ads and banner ads.

Spyware is malware that secretly observes the computer user’s activities without permission
and reports it to the software’s author. Example is a keylogger.

Virus and Worms are malwares that attach to another program and, when executed—
unintentionally by the user—replicates itself by modifying other computer programs and
infecting them with its own bits of code.

Trojan, or Trojan horse, is one of the most dangerous malware types. It usually represents
itself as something useful in order to trick you. Once it’s on your system, the attackers behind
the Trojan gain unauthorized access to the affected computer. From there, Trojans can be used
to steal financial information or install threats like viruses and ransomware.

Ransomware is a form of malware that locks you out of your device and/or encrypts your
files, then forces you to pay a ransom to get them back.  Spams are unsolicited emails, instant
messages coming from recipients that are not granted verifiable permission for the message to
be sent. Spam messages can be damaging if you open or respond to it.

Cyberstalking refers to the use of the internet or other electronic device to harass or stalk
individuals or organizations.
* Cyberbullying refers to the act of tormenting, harassing, or embarrassing another person
using the internet.

* Spoofing happens when someone or something pretends to be something else to gain our
confidence, get access to our systems, steal data, steal money, or spread malware.

You might also like