Professional Documents
Culture Documents
Internet safety or online safety or cyber safety or E-Safety is trying to be safe on the
internet and is the knowledge of maximizing the user's personal safety and security
risks to private information and property associated with using the internet, and the self-
protection from computer crime.
As the number of internet users continues to grow worldwide, internets, governments
and organizations have expressed concerns about the safety of children using the
Internet. Safer Internet Day is celebrated worldwide in February to raise awareness
about internet safety. In the UK the Get Safe Online campaign has received
sponsorship from government agency Serious Organized Crime Agency (SOCA) and
major Internet companies such as Microsoft and eBay.
CYBERATTACK
In computers and computer network an attack is any attempt to expose, alter, disable,
destroy, steal or gain unauthorized access to or make unauthorized use of
an asset. A cyberattack is any type of offensive maneuver that targets computer
information systems, infrastructures, computer networks, or personal computer devices.
An attacker is a person or process that attempts to access data, functions or other
restricted areas of the system without authorization, potentially with malicious
intent. Depending on context, cyberattacks can be part
of cyberwarfare or cyberterrorism. A cyberattack can be employed by sovereign states,
individuals, groups, society or organizations, and it may originate from an anonymous
source.
A cyberattack may steal, alter, or destroy a specified target by hacking into a susceptible
system. Cyberattacks can range from installing spyware on a personal computer to
attempting to destroy the infrastructure of entire nations. Legal experts are seeking to
limit the use of the term to incidents causing physical damage, distinguishing it from the
more routine data breaches and broader hacking activities.
Cyberattacks have become increasingly sophisticated and dangerous. User behavior
analytics and SIEM can be used to help prevent these attacks.
Dos and Don’ts of Cyber
Safety
The Dos
1. While you are banking, shopping or paying your bills online, check if the website’s
URL begins with ‘https’. Also look for the padlock icon, which indicates that the
connection is secure.
2. Go for unique, and hard to guess passwords. Never keep the same password for
different online accounts. Create a password that has a mix of uppercase and
lowercase letters, special characters, and numbers.
3. Use your primary email address to stay in touch with people you know or are
acquainted with.
4. For social media sites, use an email address that you do not use for important
communications.
5. Avoid using free, unsecured Wi-Fi for shopping or banking on the Internet and even
for logging into your social media profiles.
6. Delete old accounts that you do not use anymore.
7. Before downloading any free software, research on the software and the website
hosting it. Ensure the software’s publisher is verified.
8. Access your bank’s website by manually typing its URL in the address bar. Never
access it from an email or a text message.
9. Never click on links or download attachments in unwanted, unexpected emails, even
if such emails look like they are from a known source.
10. Take regular backups of all your important files. Doing this is more important now
that ransomware attacks are becoming so rampant. It is recommended to store the
backup on external hard drives and connect them to your PC as less as possible.
Alternatively, you can also use a trusted cloud-based backup service.
The DONT’s
1. Avoid making your personal information public on social media sites and the Internet
in general.
2. Avoid checking ‘Keep me logged in’ or ‘Remember me’ options on websites,
especially on public computers.
3. Never use your official email address for social media sites.
4. Never use any of your personal information such as name, date of birth, address,
etc., as your password.
5. Never respond to pop-up ads that may come up on your screen. Close such pop-ups
from the task manager; press Alt+Ctrl+Delete.
6. Avoid visiting inappropriate websites or websites that you are not fully aware of.
7. Always log out of online accounts when you are done. This is especially important
when you are using a public computer.
8. Do not install software that comes as an attachment in emails.
9. Avoid saving your credit/debit card information on websites and web browsers.
10. Never share your personal/bank details on phone, email or SMS, even if the
caller/sender seems genuine.
CYBERBULLYING
Cyberbullying or cyberharrasment is a form of bullying or harassment using electronic
means. Cyberbullying and cyberharassment are also known as online bullying. It has
become increasingly common, especially among teenagers. Cyberbullying is when
someone, typically teens, bully or harass others on the internet, particularly on social
media sites. Harmful bullying behavior can include posting rumors, threats, sexual
remarks, a victim’s personal information, or pejorative labels. Bullying or harassment
can be identified by repeated behavior and an intent to harm. Victims may experience
lower self-esteem, increased suicidal ideation, and a variety of negative emotional
responses, including being scared, frustrated, angry, and depressed.
Awareness in the United States has risen in the 2010 due in part to high-profile
cases. Several US states and other countries have laws specific to cyberbullying. Some
are designed to specifically target teen cyberbullying, while others use laws extending
from the scope of physical harassment. In cases of adult cyberharassment, these
reports are usually filed beginning with local police.
Research has demonstrated a number of serious consequences of cyberbullying
victimization.
Internet trolling is a common form of bullying over the Internet in an online community in
order to elicit a reaction, disruption, or for someone's own personal
amusement. Cyberstalking is another form of bullying or harassment that uses
electronic communications to stalk a victim; this may pose a credible threat to the victim.
Not all negative interaction online or on social media can be attributed to cyberbullying.
Research suggests that there are also interactions online that result in peer pressure,
which can have a negative, positive, or neutral impact on those involved.
CYBER PHISHING
Phishing is the fraudulent attempt to obtain sensitive information such as usernames,
passwords and credit card details by disguising oneself as a trustworthy entity in
an electronic information. Typically carried out by email spoofing or instant messaging, it
often directs users to enter personal information at a fake website which matches
the look and feel of the legitimate site.
Phishing is an example of social engineering techniques being used to deceive users.
Users are often lured by communications purporting to be from trusted parties such
as social web sites, auction sites, banks, online payment processors or IT
administrators.
Attempts to deal with phishing incidents include legislation, user training, public
awareness, and technical security measures (the latter being due to phishing attacks
frequently exploiting weaknesses in current web security).
The word itself is a neologism created as a homophone of fishing.
Antivirus software
Antivirus software, or anti-virus software (abbreviated to AV software), also known
as anti-malware, is a computer programe used to prevent, detect, and remove malware.
Antivirus software was originally developed to detect and remove computer viruses,
hence the name. However, with the proliferation of other kinds of malware, antivirus
software started to provide protection from other computer threats. In particular, modern
antivirus software can protect users from: malicious browser helper
objects (BHOs), browser hijackers, ransomware, keyloggers, backdoors, rootkits, trojan
horses, worms, malicious LSPs, dialers, fraudtools, adware and spyware. Some
products also include protection from other computer threats, such as infected and
malicious URLs, spam, scam and phishing attacks, online identity (privacy), online
banking attacks, social engineering techniques, advanced persistent threat (APT)
and botnet DDoS attacks.
SOCIAL NETWORKING SITES
A social networking service (also social networking site or social media) is an online
platform which people use to build social networks or social relationship with other
people who share similar personal or career interests, activities, backgrounds or real-life
connections.
The social network is distributed across various computer networks. The social
networks are inherently computer networks, linking people, organization, and
knowledge. Social networking services vary in format and the number of features. They
can incorporate a range of new information and communication tools, operating
on desktop and on laptops, on mobile devices such as tablet
computers and smartphones. They may feature digital photo/video/sharing and "web
logging" diary entries online (blogging). Online community services are sometimes
considered social-network services by programmers and users, though in a broader
sense, a social-network service usually provides an individual-centered service whereas
online community services are group-centered. Defined as "websites that facilitate the
building of a network of contacts in order to exchange various types of content online,"
social networking sites provide a space for interaction to continue beyond in person
interactions.
Social networking sites allow users to share ideas, digital photos and videos, posts, and
to inform others about online or real-world activities and events with people in their
network. While in-person social networking – such as gathering in a village market to
talk about events – has existed since the earliest development of towns, the web
enables people to connect with others who live in different locations, ranging from
across a city to across the world. Depending on the social media platform, members
may be able to contact any other member. In other cases, members can contact anyone
they have a connection to, and subsequently anyone that contact has a connection to,
and so on. The success of social networking services can be seen in their dominance in
society today, with Facebook having a massive 2.13 billion active monthly users and an
average of 1.4 billion daily active users in 2017. Linkedln, a career-oriented social-
networking service, generally requires that a member personally know another member
in real life before they contact them online. Some services require members to have a
preexisting connection to contact other members.
These are some of the advantages and disadvantages of social media for the society.
However, these are the enough advantages and disadvantages to decide which way to
go on the social media.
TYPES OF SOCIAL
NETWORKING SITES
Types of social networking sites are:
1. Facebook
2. WhatsApp
3. Instagram
4. Snapchat
5. YouTube
6. Pinterest
7. Twitter
8. Skype
The personal information you share online could give cyber criminals enough to
piece together your email address and password.
Cyber criminals could gain access to any account that has a password recovery
service and use any saved information to make purchases.
Links in messages from cyber criminals posing as someone you know could be a
part of a phishing attack trying to trick you into sharing personal information or
contain malware that infects your computer.
Geotagged photos are photos that have geographical information, like your
current location, added to them – and today, most smartphones and digital
cameras have a function that automatically geotags all your photos unless you
turn it off. Geotags can expose where you live, when you're traveling and even
what car you drive, which could make you a target for robbery.
When you update your status with your whereabouts on a regular basis, you
could tip someone off to your routine, and invite real-life threats like robberies,
break-ins or stalking.
If you add "friends" you don't know, you could become the victim of a scam.
Apps deleted from your account may not be fully deleted – the creator may still
have access to your information.
If you don't have a strong password, others could gain access to your profile and
pose as you – and potentially send out spam or fake posts that are damaging to
you.
Potential employers could search social networking sites to get a sense of your
character. If you've uploaded damaging or embarrassing photos or posts to your
social network account, you could hurt your reputation and your chances of
employment.
3. Set up your security answers. This option is available for most social
media sites.
5. Be selective with friend requests. If you don’t know the person, don’t
accept their request. It could be a fake account.
6. Click links with caution. Social media accounts are regularly hacked.
Look out for language or content that does not sound like something your
friend would post.
8. Become familiar with the privacy policies of the social media channels
you use and customize your privacy settings to control who sees what.