Professional Documents
Culture Documents
Lesson 2: What Is Internet Safety?: Unit 2
Lesson 2: What Is Internet Safety?: Unit 2
TECHNOLOGIES
Unit 2: Online Safety, Security, Ethics and Etiquette
“I think computer viruses should count as life. I think it says something about human nature that the only
form of life we have created so far is purely destructive. We’ve created life in our own image.”
- Stephen Hawking
Most of us are ‘connected’ via our laptops, mobile phones, tablets or personal computer.
The potential for the internet to be a valuable and a fun resource for entertainment,
making friends, keeping in touch and learning is huge. But if you use the internet, you
could be at risk of illegal activity or abuse - be it bullying, fraud or something more serious.
Unlike seeing someone face to face, on the net, people aren't always what they first seem.
In the same way you learn about safety when you leave the house, it is important to learn
how to stay safe online. These are skills that will stay with you for life.
say things on a status update / post / tweet they would never say face to face
give out personal information about themselves or others (including photos) that
they would normally keep private
A common example
A young person tries to let their friends know about their birthday party by posting the
information about when and where on their social networking site. This means hundreds
of people end up knowing about the party and turn up uninvited. The party could turn into
chaos with people getting angry and even refusing to leave. The police would have to get
involved to turn people away.
Cyber bullying
Cyber bullying can work in the same way as bullying in the playground; the victim feels
frightened and alone, while the bully tries to hide from being caught.
Comments, images and videos about a person can be posted online causing the
victim to feel frightened and upset.
It is even possible for cyber bullies to hack into the victim's personal accounts and
harass them from within their own user profile.
Often cyber bullies feel braver because they can't be seen, but it can be the most
traceable form of bullying because there's evidence that it's happened.
But because bullies think they can cover up their identity online sometimes people
who wouldn't normally bully might do so online.
Cyber stalking
Harassment on the internet can be just as frightening as other forms of stalking.
Women and girls are usually the victims of this kind of behavior.
They might be harassed by an ex-boyfriend or girlfriend who is upset about the
end of their relationship, for example.
It can also begin when a purely online friendship turns sour.
It can even begin entirely at random, by one online stranger towards another.
email address
phone number
postal address
any banking information
photos of yourself
The consequences of fraud can be huge, so you should be aware of the very serious
risks. If someone steals you or your parent's identity they can:
naked pictures
'underwear shots'
any sexual texts, images or videos
These images or videos can be sent from a boyfriend or girlfriend or a friend or someone
you've met online. You also may have sent a sexual photo, video or text to someone else.
Sexting can happen because:
your friends are boasting about sending or having photos on their mobile phone.
you want to fit in with in with friends
you’re worried about being seen as 'frigid' or 'shy'
you’re pressured to ‘prove’ your sexuality
you’re harassed, threatened or blackmailed into sending pictures
someone keeps asking for things and you feel that it's easier just to ‘give in’
you’re made to feel guilty if you don’t do what they ask
you think you ‘owe’ your boyfriend or girlfriend or
you feel it’s ok because you’re in love with the person and trust them
you feel proud of your body and want to share it with other people
you want to have a sexual relationship with some you have an online relationship
with
Remember:
Often anyone can access these sites, even when parental controls are in place.
You could be encouraged to view them via content shared by others on social
networking sites.
Online grooming
The internet is a highly interactive tool which can allow people to communicate with each
other very easily, through internet chat programs and social networking sites and even
mobile apps and games.
Pedophiles have been known to use this method to contact young people by disguising
themselves as another young person. This can lead to gaining the trust of an individual
and their friends. These false relationships based on lies can often pave way for exposure
to upsetting images and online content and in some cases arranging a meeting in person.
Online grooming is the term used to describe inappropriate behavior towards a young
person, putting them at risk to a sexual offence.
Even if nothing dangerous does happen, knowing you may have had contact with
somebody like this can be extremely upsetting.
Making ‘friends’
We all know it's not healthy to spend hours and hours in front of a computer screen. But
another problem with social networking is the pressure you can feel to make sure you
have lots of ‘friends’. But here are some things to remember:
Friendships made online are made by clicking a button rather than talking to people
and sharing experiences.
Being online ‘friends’ with someone is much less meaningful than face to face
friendship.
You can easily fall out with an online ‘friend’ because of a misunderstood comment.
It is far easier, and healthier, to sort out arguments and problems when you can
Fast Facts
Phishing, also referred to as brand spoofing or carding, is a variation on "fishing," the idea being that bait
is thrown out with the hopes that while most will ignore the bait, some will be tempted into biting.
Fast Facts
Worm can replicate itself on system, does not require human action to spread.
Trojan appears useful but damages system, requires human action to run, do not self-replicate.
When a Trojan is activated on your computer, the results can vary. Some Trojans are
designed to be more annoying than malicious (like changing your desktop, adding silly
active desktop icons) or they can cause serious damage by deleting files and destroying
information on your system. Trojans are also known to create a backdoor on your
computer that gives malicious users access to your system, possibly allowing confidential
or personal information to be compromised. Unlike viruses and worms, Trojans do not
reproduce by infecting other files nor do they self-replicate.
What Is a Blended Threat?
A blended threat is a more sophisticated attack that bundles some of the worst aspects
of viruses, worms, Trojan horses and malicious code into one single threat. Blended
Fast Facts
Sophisticated, bundles aspects of viruses, worms and Trojan horses, most require no human action.
2. Use a Firewall
You should also install a firewall. A firewall is a system that prevents unauthorized use and access
to your computer. A firewall can be either hardware or software. Hardware firewalls provide a strong
degree of protection from most forms of attack coming from the outside world and can be purchased
as a stand-alone product or in broadband routers. Unfortunately, when battling viruses, worms and
Trojans, a hardware firewall may be less effective than a software firewall, as it could possibly ignore
embedded worms in outgoing e-mails and see this as regular network traffic.
For individual home users, the most popular firewall choice is a software firewall. A good software
firewall will protect your computer from outside attempts to control or gain access your computer, and
usually provides additional protection against the most common Trojan programs or e-mail
worms. The downside to software firewalls is that they will only protect the computer they are installed
on, not a network.
It is important to remember that on its own a firewall is not going to rid you of your computer virus
problems, but when used in conjunction with regular operating system updates and a good anti-virus
scanning software, it will add some extra security and protection for your computer or network.
Fast Facts
Did You Know... CodeRed, a blended threat, launched DoS attacks, defaced Web servers, and its variant,
CodeRed II, left Trojan horses behind for later execution. CodeRed was processed in memory — not on
a hard disk — allowing it to slip past some anti-virus products. Computer Economics has estimated the
worldwide cost of CodeRed at $2.62 billion dollars. [Source: Symantec Web site]
Spyware
Key loggers
Computer viruses or worms.
Financial malware - which is designed to scan a computer system for information
related to financial transactions, are more common than other types. One example
is Cridex, a sophisticated strain of banking malware.
sending you an attachment (in most cases contain a virus, adware or malware)
sending abusive or explicit content
The golden rule is, if the email is from someone you don't know, delete it.
“Ethics is not definable, not implementable, because it is not conscious; it involves not
only our thinking, but also our feeling.”
- Valdemar W Setzer
A brief History
60’s & 70’s: Computer crime, ACM code of ethics, Weizenbaum’s ELIZA
New branch of “applied ethics”: Walter Maner teaching a medical ethics
course in 1976 came up with the term “computer ethics”
Wiener-Maner-Gorniak hypothesis:
“Computer” ethics will become a new universal, global ethics, and so will become the
“ordinary” ethics.
Johnson’s hypothesis:
Computer ethics are “new species of generic moral problems,” and will continue to
presuppose existing ethical theories.
ETHICS IN GENERAL
A guideline is needed to stop the current technology products from being exploited for
example replicating original CDs and selling them as pirated software, this unethical
behavior can be controlled by the code of conducts.
LAW IN GENERAL
Law is a legal system comprising of rules and principles that govern the affairs of a
community and controlled by a political authority. Law differs from one country to another.
In the era of technology, computer law is needed to clarify goods or actions that fall under
the computer law. Computer law refers to all areas in law that requires an understanding
of computer technology such as hardware, software and Internet.
RESPECTING OWNERSHIP
We must respect ownership by not stealing other people’s work either by duplicating or
distributing it. Duplicating and distributing copies of audio tapes, video tapes and
computer programs without permission and authorization from the individual or company
that created the program are immoral and illegal.
RESPECTING PROPERTY
Property here means ownership. Since an individual data and information are
considered as property, therefore, an act of tampering and changing electronic
information is considered as vandalism and disrespect for other people’s property.
Both ethics and law are complimentary to each other and are made:
• to guide user from misusing computers
• to create a healthy computer society, so that computers are used to contribute to a better
life
• to prevent any crime
Law
crime is committed.
“A Cyber Security Policy Would Have Defined the Roles of All the Stakeholders in The Crisis, He Said. At
Present, There Was a Complete Lack of Coordination”
- Pavan Duggal
Cyber law is the area of law that deals with the Internet's relationship to technological
and electronic elements, including
Computers,
Software,
Hardware and
Information systems (IS).
Information access,
Privacy,
Communications,
Intellectual property (IP)
And freedom of speech
Internet
Websites
Email
Computers
Cell phones
Software
And hardware, such as data storage devices.
The increase in Internet traffic has led to a higher proportion of legal issues worldwide.
Because cyber laws vary by jurisdiction and country, enforcement is challenging, and
restitution ranges from fines to imprisonment.
1. The law Penalizes (section 8) sixteen types of cybercrime (Section 4). They
are:
Types of Cybercrime Penalty
Illegal access Prison mayor (imprisonment of six years
Unauthorized access (without right) to a and 1 day up to 12 years) or a fine of at
computer system or application least Two hundred thousand pesos
(P200,000) up to a maximum amount
commensurate to the damage incurred or
BOTH. If committed against critical
infrastructure: Reclusion temporal
(imprisonment for twelve years and one
day up to twenty years) or a fine of at
least Five hundred thousand pesos
(P500,000) up to a maximum amount
commensurate to the damage incurred or
BOTH.
Illegal interception
Unauthorized interception of any non-
public transmission of computer data to,
from, or within a computer system.
Data Interference
Unauthorized alteration, damaging,
System Interference
Unauthorized hindering or interference
with the functioning of a computer or
computer network by inputting,
transmitting, damaging, deleting,
deteriorating, altering or suppressing
computer data or program, electronic
document, or electronic data messages,
and including the introduction or
transmission of viruses. Authorized action
can also be covered by this provision if
the action of the person went beyond
agreed scope resulting to damages
stated in this provision.
Misuse of devices
The unauthorized use, possession,
production, sale, procurement,
importation, distribution, or otherwise
making available, of devices, computer
program designed or adapted for the
purpose of committing any of the offenses
stated in Republic Act
10175.Unauthorized use of computer
password, access code, or similar data by
which the whole or any part of a computer
system is capable of being accessed with
intent that it be used for the purpose of
committing any of the offenses under
Republic Act 10175.
Computer-related Fraud
Unauthorized input, alteration, or deletion
of computer data or program or
interference in the functioning of a
computer system, causing damage
All crimes defined and penalized by the Penalty to be imposed shall be one (1)
Revised Penal Code, as amended, and degree higher than that provided for by
special laws, if committed by, through and the Revised Penal Code, as amended,
with the use of information and and special laws, as the case may be
communications technologies shall be
covered by the relevant provisions of this
Act.