ETech Q1 M2a

Download as pdf or txt
Download as pdf or txt
You are on page 1of 4

11/12

Empowerment
Technologies
Quarter 1 – Module 2:
Online Safety, Security,
Ethics, and Etiquette
Internet Threats
Here are some of the threats you should be aware of when using the Internet:

1. Malware – or malicious software, is any program or file that is harmful to a


computer user.
Types:

a. Virus - a malicious program designed to replicate itself and transfer


from one computer to another (internet, local networks, FDs, CDs, etc.)

b. Worm - a malicious program that transfers from one computer to


another by any type of means.
Ex. ILOVEYOU Worm - The malware originated in
the Pandacan neighborhood of Manila in the Philippines on May 5,
2000.

c. Trojan - a malicious program that disguises as a useful program but


once downloaded or installed, leaves your PC unprotected and allows
hackers to get your information.

d. Spyware - a program that runs in the background without you knowing


it (thus called “spy”). It has the ability to monitor what you are currently
doing and typing through keylogging.
Ex. Keylogger – used to record keystrokes done by the user. This is
done to steal their password or any other sensitive information. The key
logger software typically uses log file to store its recording.

e. Adware - a program designed to send you advertisements, mostly as


pop-ups.

f. Ransomware - or ransom software is a type of malicious software from


cryptovirology that threatens to publish the victim's data or perpetually
block access to it unless a ransom is paid.

2. Spam - an unwanted email mostly from bots or advertisers. It can be used to


send malware.

3. Phishing - its goal is to acquire sensitive personal information like passwords


and credit card details. This is done by sending you an e-mail that will direct
the user to visit a fake website and be asked to update his/her username,
password, credit card or personal information.

11
Protecting Reputations Online
Here are the things you might want to consider before posting something over the
internet:
1. Before your post something on the web, ask these questions to yourself: Would
you want your parents or grandparents to see it? Would you want your future
boss to see it?
2. If you feel that a post can affect you or other’s reputation, ask the one who
posted it to pull it down or report it as inappropriate.

Copyright Infringement
It is the use of works protected by copyright law without permission for a usage where
such permission4 is required.

Here are some tips that could help you avoid copyright infringement:

1. Always assume that the work is copyrighted.


2. Do not copy, share or alter without seeking permission.
3. Review and retain licensing agreements.
4. Consider buying content.
5. Give credit to the original author of the page or information.

12
What’s More

Activity 1: Case Study


Read and understand the text. And answer the question on the next page.

CASE STUDY: WHAT THE? —Online scams and identity Theft

Transcript

“Well, I downloaded a lot of stuff to my computer—heaps of stuff actually:


music, programs, games. I guess in the back of my mind I’ve always been worried
about security but I didn’t think I could do anything about it, or anything that bad
could happen to me. I guess when you’re connected and doing frequent downloads
you never know what’s coming down your phone line.

One day I downloaded this particular program, and after that my computer
seemed to be a lot slower. It was taking forever for pages to load and even normal
things like writing an email or writing a Word document would take a long time. I
didn’t think too much of it ‘cos my computer was getting pretty old and I had heaps
of stuff on it. But then my home page got changed to some free download site and
when I checked my internet settings I found that they’d all been changed. But
things kept on getting worse. Whenever I went online to the internet I got
bombarded with pop-ups and, like, my computer would just crash and I would
have to manually reset it.

Then things got really serious. I couldn’t log-in to my email account and I
discovered that someone was using my internet banking. I had anti-virus software
installed onto my computer but it just wasn’t picking up anything.

What I didn’t realize at the time was that when I’d downloaded this free
program a couple of months ago, a smaller program downloaded and installed
itself onto my computer. But, I had no idea.

This spyware program monitored all my internet activity and the keylogger
recorded all the keystrokes I made on the computer such as my log-in, my
passwords and all the emails I sent to my mates. It then sent all this information
to the software developer. I ended up taking my machine to a computer specialist
who was able to find and remove all the spyware. I had to contact my bank and
my ISP to change my account details.

You know, even free stuff comes at a cost nowadays and I know it sounds
corny, but if itʼs too good to be true then it probably is. Before I download anything
now I make sure thereʼs no adware or spyware associated with it and I read the
user agreement statement. There are websites
13 online that, sort of, help you out
with this and can offer great reviews and advice on the program and company that
you’re downloading from. If itʼs free, thereʼs usually a catch. I guess I learnt the

You might also like