Module 7 Policing The Internet
Module 7 Policing The Internet
Module 7 Policing The Internet
Learning Outcomes:
Introduction:
Hello my dear students! Welcome to this chapter, data breach is a cybercrime
in which a cybercriminal extracts data from a certain source, usual data breach is done
through remote network or through a physical access to a computer or a network. The
internet police on the other hand, is an organization led by the government agencies in
countries that are in charge with policing internet. Keep Fighting! And Enjoy Learning!
Abstraction:
A. Privacy and Surveillance
Data Breach
With this, companies - like banks, hospitals, email providers, that are holding
personal data - are keeping on reminding their clients to be careful with their data
because with the technology today, all data are vulnerable to be leaked and used by
other person.
Cybercrime Police
Spyware is a program or software that will steal information and changing user
data. It is usually taken by unauthorized installation of software, downloading
applications and a random pop up advertisement. Spyware can usually get into the
computer or phone through shareware and freeware. From these, the spyware can
successfully install and start transferring data or collecting it.
In this world, there are already loads of cybercriminals (hackers, crackers, etc.)
who can get your information in a snap. Just in United States of America, there are
over ten (10) million cases a year of identity theft. There are countless cases that credit
card information and email details gets stolen, security nuinbers and identifying data
obtained, and addresses known. All happened with the help of the internet.
Even when connecting to a public Wi-Fi, your personal data could be at risk.
Whether you're at a coffee shop, in a library, in the mall, or even hundred and thousands
of feet off the ground, these public Wi-Fi can help risk of information leakage. But
how is this done? Open Wi-Fi networks or public networks allow channels to
communicate. Since there are a lot of people connected to one internet connection, or
Wt-Fi, this allows hackers to transverse through each channel or device and spy on
what those other networks are doing. What is making these public networks that
dangerous? It's their lack of encryption.
A simple person could do this, you do not even need the technical knowledge
and education to try and attempt it. You're lucky if these hackers do not discover your
IP or MAC address. If that did happen, a hacker can open a connection to your device
and snatch your data.
To prevent this type of danger, you can use a Virtual Private Network. VPN or
a Virtual Private Network extends a private network across a public network. With
that, it will enable users to receive and send data across public networks as if their
computer are directly connected to a private network. This will mask your device's
legitimate IP address.
Public networks aren't the only ones that can risk your personal data. Here are
some ways hackers can get into your device:
4 Hijacking advertisements
6. Smishing
This is phishing but via phone call or SMS messages. It is when
someone tricks you into giving them your information.
Privacy Issues
Philippines might have suffered its most terrible government knowledge breach
for just about a month before its elections. Personal data, as well as fingerprint
knowledge and passport information that belongs in a span of seventy million
individuals are alleged to have been compromised by hackers. A terrifying assemblage
of smart hackers used their chance to attack the openness of the system together with
the automated voting machines. The group Anonymous Philippines has asserted their
responsibility for the damage.
Philippine banks are always targets of foreign hackers. It has always been a
problem in regards to international cybersecurity due to its weak spots. The attacks are
somehow considered as examples to determine the weaknesses of the banks. According
to Philippine Daily Inquirer, there was a discovery in the Central Bank of Bangladesh,
where $81 million were stolen. The massive amount of robbery was verified that it
started in the month of November 2015 up to March 2016 and took them on at least
five (5) months to fully steal the said cash.
We first identify what is ethics. Ethics is defined as what deals with moral
principles, it is the understanding and knowing the difference of what is good and bad.
While etiquette is the way people behave in an orderly manner in a social setting, and
it refers to your polite behavior and good manners.
Everyone can gain access to the internet and everyone too can post and interact
with almost everything that is posted publically in the internet. With this kind of
freedom, there should be proper manner/behavior to be observed. Social etiquettes do
not only exist in the real interacting environment but also online. There are dos and
don'ts in the online world and users must know and apply them to create a good
interaction with everyone.
Netiquette is the combination of the two words network and etiquette. It refers
to the distinguished set of rules for what is considered to be acceptable as good online
behavior. It also emphasizes on what are tolerable usage of online resources.
As an online user, you should be responsible for the actions you are doing in
the web by the means of interacting with other personal businesses. That being said,
here are 8 guidelines to follow for achieving netiquette.
To be able to complete any decision from the two results in a predictable rate
to a certain condition is called dilemma. The usefulness and influences on the
performance of the website is included on the down sides of a development dilemma
on the web.
From the experience of the past years, the professionals for web have
established and settled upon overall moral values and a lot of professions inherited
from the other. Below are the following examples of right conduct for web specialists:
Spam
It is a message thru email that the receiver did not want or ask to receive a
message from the sender. It is unwanted e-mail that whether you are aware of whether
you like it or not you will be receiving this kind of message if someone sent it to you.
Everyday millions of spam messages or unwanted mail are sent to the users of Web
regardless to their location.
Some of the people are using this kind of unwanted mail to cause harm to other
people, to fool other people and to make money to other people. As a web user,
sometimes we didn't notice or recognize that we are already encountering or reading a
spam message. Below are the some examples of unwanted mails that we didn't know
that we have encountered it.
In this message, the sender is trying to fool you that you are so lucky that you
have won on something that even you yourself didn't know how this thing happened to
you, and where this thing came from.
Online Safety and Security
Online Safety
Online Safety may be considered to be one of the biggest worries of parents for
their children. Parents always want their children to be safe, may it be outside their
homes or in the online world. Since there have been great innovations in the technology
realm from the creation of computer, online safety became much easier to achieve and
Onlineimproves
it continually Safety, orinInternet safety, is the
the future.
knowledge of cultivating and maximizing the
user's private personal safety and security risks
on their private information that is in the
internet. Users of the internet continually grow
every day and they are concerned with the
information they put up. These concerns are
commonly heard as any type of offensive or
malicious websites, users, and software.
Crimes can also be committed online like
stealing someone's identity, stalking, and more.
These are the reasons that some pages put up safety measures and chat sites just
to promote online safety. The government has also taken action on this matter,
producing organizations and groups to enforce online safety.
Online Security
Or Internet Security is a branch of security that takes on the internet field. Their
purpose and objective is to establish guidelines, dealings, and measures to use against
the occurrences that attack over the internet. Different ways and methods have been
used to counter and protect the transferring of private data, this includes encryption.
Internet security involves browsing security but it can be generally applied in
applications and operating systems.
6. Protecting your
Mobile Life. Devices
are vulnerable to any
attacks you may
encounter online.
7. Safe Shopping and
Surfing. Check the site
you visit if the URL
section contains a
padlock icon and if the
address starts with
"https" or "http. These
indicate that the site is
secured and the
information being
transferred are
encrypted.
8. Update. Keep up to
date . with your software
and latest security
patches.
9. Keep a lookout.
Threats also
,continually evolve so
make sure you know what their latest scams are. Stay safe by being
informed.
10. Guard up. Be always cautious on what you are doing online, what you
are sharing, and which you visit. Backup you data regularly and take
preventive measures.
Online Etiquette is considered one of the most important things that online
users are supposed to have when having full access to the internet. Because of its
relevance, organizations found in the world-wide-web and researches related
to it are provided for the people to have guides on proper behavior, discipline
and responsibility for computer and communication ethics.
Here are some of the following:
References:
Congratulations! You did a great job for this lesson! You can now proceed to the next
lesson.