Empowerment Tech - Lesson 2

Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 7

LESSON 2: Online Safety, Security and Netiquette

The internet is the guiding technology of the Information Technology Age just as
the electrical engine was of the Industrial Age. In these times, more and more
people are already engaged in the use of technology. These people who are raised
in a digital, media-saturated world are called digital natives. No doubt, the Internet
has been very useful to us but with the rise of instant messaging, chat rooms,
emails and social networking sites, it can also bring trouble - from cyberbullying to
more serious Internet dangers, including exposure to sexual predators. Thus,
internet safety is always our primary concern.
LESSON 2.1: ONLINE SAFETY, SECURITY AND NETIQUETTE
Online safety refers to the practices and precautions that should be observed when
using the internet to ensure that the users as well as their computers and personal
information are safe from crimes associated with using the internet. Below are
personal information that must be kept confidential.
There are numerous delinquencies that can be committed on the internet such as
stalking, identity theft, privacy violations, and harassment.
To avoid these online crimes, follow the following online safety measures:

Never give any personal information out about yourself over the internet.

Do not give any banking or sensitive information unless you are sure that it is a
reputable business having a secure service. To make sure that you are in a
secured network, the website address should begin with “https://’ as opposed
to “http://”. Never access your accounts by following an email link, instead type
your URL by yourself.

Info source: https://www.wikihow.com/Find-if-a-Website-Is-Legitimate


Never open messages or attachments from someone you do not know.
Regularly review your privacy settings in your online accounts to make sure
you are not sharing important personal information.
When using a public computer terminal, be sure to delete your browsing data
before leaving.
Keep your software updated to avoid security holes.
Do not download or install software or anything on your computer or cell phone
that is unknown to you.

NETIQUETTE is a combination of the words network and etiquette. It is a set of rules for
behaving properly online. Below are the 10 rules of netiquette:

Flame war

Flame war is a series of flame posts or messages in a thread that are considered
derogatory in nature or are completely off-topic. Often these flames are posted for the
sole purpose of offending or upsetting other users. The flame becomes a flame war
when other users respond to the thread with their own flame message. Image
from:https://twitter.com/Parkster00/status/1246347088625045504

LESSON 2.2: KINDS OF ONLINE THREATS


There is no doubt that you need to be vigilant online. As the World Wide Web
evolved over the years, many internet predators have been playing on vulnerabilities to
attack computers and retrieve sensitive data from individuals. Half the time, we aren’t
even aware it is happening until it is too late.
Online threat is deemed any malicious act that attempts to gain access to a computer
network without authorization or permission from the owners. These are usually done
by computer hackers who uses the World Wide Web to facilitate cybercrime. Web
threats use multiple types of malware and fraud, all of which utilize HTTP or HTTPS
protocols, but may also employ other protocols and components, such as links in email
or Instant Messaging apps, or any malware attachments on servers that access the
Web. They benefit cybercriminals by stealing information for subsequent sale and help
absorb infected PCs into botnets. Web threats pose a broad range of risks, including
financial damages, identity theft, loss of confidential information/data, theft of network
resources, damaged brand/personal reputation, and erosion of consumer confidence
in e-commerce and online banking.
The following are the top kinds of online threats that you should be aware of:
 Phishing happens when an email is sent from an internet criminal disguised as
an email from a legitimate, trustworthy source. The message is meant to lure
you into revealing sensitive or confidential information.

Imagesource:https://searchsecurity.techtarget.com/definition/phishing

 Pharming happens when a hacker (or “pharmer”) directs an internet user to a


fake website instead of a legitimate one. These “spoofed” sites can capture a
victim’s confidential information, including usernames, passwords, and credit
card data, or install malware on their computer. Pharmers usually focus on
websites in the financial sector, including banks, online payment platforms, or
other e-commerce destinations.
Image source: https://ed451phishnpharm.weebly.com/how-to-spot-a-fake-website-
pharming.html

 Internet Scam generally refers to someone using internet services or software


to defraud or take advantage of victims, typically for financial gain.
Cybercriminals may contact potential victims through personal or work email
accounts, social networking sites, dating apps, or other methods in attempts to
obtain financial or other valuable personal information. Online scams may
come in various forms such as lottery scam, charity fraud scams, job offer
scams, and online dating scams to name a few.
 Internet robots are also known as spiders, crawlers, and web bots. It is a
software application that is programmed to do certain tasks. Bots are
automated, which means they run according to their instructions without a
human user. Some bots are useful, such as search engine bots that index
content for search or customer service bots that help users. Other bots are
"bad" and are programmed to break into user accounts, scan the web for
contact information for sending spam, or perform other malicious activities. If
it's connected to the Internet, a bot will have an associated IP address.

 Malware or malicious software, is any program or file that is harmful to a


computer user. Here are the most common offenders in the rogues’ gallery of
malware:
Adware (advertising supported software) is unwanted software
designed to throw advertisements up on your screen. Example, pop-up
ads and banner ads.
Spyware is malware that secretly observes the computer user’s
activities without permission and reports it to the software’s author.
Example is a keylogger.
Virus and Worms are malwares that attach to another program and,
when executed—unintentionally by the user—replicates itself by
modifying other computer programs and infecting them with its own bits
of code.
Trojan, or Trojan horse, is one of the most dangerous malware types.
It usually represents itself as something useful in order to trick you.
Once it’s on your system, the attackers behind the Trojan gain unauthorized access to
the affected computer. From there, Trojans can be used to steal financial information
or install threats like viruses and ransomware.
Ransomware is a form of malware that locks you out of your device
and/or encrypts your files, then forces you to pay a ransom to get them
back.
 Spams are unsolicited emails, instant messages coming from recipients that
are not granted verifiable permission for the message to be sent. Spam
messages can be damaging if you open or respond to it.
 Cyberstalking refers to the use of the internet or other electronic device to
harass or stalk individuals or organizations.

 Cyberbullying refers to the act of tormenting, harassing, or embarrassing


another person using the internet.
 Spoofing happens when someone or something pretends to be something
else to gain our confidence, get access to our systems, steal data, steal money,
or spread malware.

You might also like