You are on page 1of 26

Computer

4 security

1. Active and passive security 4. Digital identity. Digital certificates

2. Security on the computer 5. Ownership and distribution of software


Threats to the computer: malicious software and information
Types of malware Software licences
More terminology File exchange: P2P networks
Software to protect the computer: computer
security

3. Personal safety
Threats to people or their identity
Software for personal protection
Our attitude, the best protection

136 Information and Communication Technologies - 4º ESO - Editorial Donostiarra


Computer security
4
Learn

1. Active and passive security


The Internet is a network that connects computers and people around the world. It is a form
of communication with many advantages, but it also has its risks: it is a world of information in
which we have to move carefully. A computer is not a harmless tool.
If we want to travel safely by car, it’s not enough to know how to drive: we must also know what
safety devices the vehicle has (seatbelt, airbags, ABS, etc.) and the traffic rules that govern inter-
action with other vehicles. Similarly, if we are going to use a computer on a network, we must:
•• Know how to use it (we should be careful when using tools that we are unfamiliar with,
especially online).
•• Know what security tools are available to us (so we’ll know if we are protected against
viruses, spam and websites with unwanted content).
•• Apply a set of basic security rules to guide our interaction with other Internet users.

We use the term active security to refer to the set of actions aimed at protecting the computer and its content (e.g.
using safe passwords, keeping the antivirus program up to date, etc.). Passive security aims to minimise the impact
of possible computer damage (e.g. making regular backup copies).

2. Security on the computer


We are going to start by learning about the main threats to our computer, i.e. what it needs to
be protected from and what tools are available to do this.

„ Threats
„ to the computer: malicious software
Malware (from malicious software) is software developed for malicious purposes, such as vi-
ruses, Trojans, worms, spyware, etc.
The different types of malware are shown in the figure on the following page.

Signs that our computer has been attacked


•• Computer processes or the Internet connection are working
very slowly.
•• There is less available disk space (warnings of insufficient disk
space).
•• Unknown programs appear, new browser home pages open
or elements are added that can’t be deleted.
•• Unknown icons appear on the desktop (which sometimes
can’t be deleted).
•• The keyboard and mouse do strange things.

Information and Communication Technologies - 4º ESO - Editorial Donostiarra 137


Computer security
4
Learn

„ Types
„ of malware

Virus Keylogger
This is a program that installs itself on the computer (From key [tecla] and logger
without the user’s consent with the aim of causing harm. [registrador]). This is a type of
It can self-replicate and infect software that attempts to ob-
other computers. It can use port- tain and memorise keystrokes.
able drives, software or the Inter- It can be used for remote spy-
net to spread itself. Viruses are ing, with the aim of obtaining
the best known threat and the passwords from the user.
most important one because of
their volume of risk.

Worm
This is malware whose purpose is
to flood the system memory by
reproducing itself.

Spyware
Not all spyware is malware.
Spyware programs with ma-
licious code are basically Tro-
jans, adware and hijackers.
Trojan
This is a type of virus that contains in-
structions, camouflaged in another pro-
gram, whose purpose is to destroy or
gather information saved on disks. The
name refers to the Trojan horse, because
Adware
these viruses are usually housed in apparently harmless
elements, such as an image or music file, and are installed (From advertisement software).
in the system when the containing file is opened. Adware is advertising includ-
ed in programs that appears
after installation. Some of this
comes with shareware or free-
ware licences, where advertis-
ing is included to pay for them, so that if the user
Hijackers
wants an advertising-free version, they can choose
These are programs that “hijack” to pay for the registered licence version. The prob-
other programs to use their rights lem arises when these programs act as spyware,
or change their behaviour. The most including code to gather personal information on
common case is a browser attack, the user (information that is not necessarily used
changing the home page and redirecting search pages maliciously: sometimes it is about discovering us-
without the user’s consent. ers’ tastes, but it can be passed on to other parties
without authorisation).

138 Information and Communication Technologies - 4º ESO - Editorial Donostiarra


Computer security
4
Learn

„ More
„ terminology
As well as malware, you should be familiar with other concepts related to security:

Crackers
Hackers These are people who try and
These are computer experts who, change how a commercial pro-
in theory, are only looking for an gram works or produce applica-
intellectual challenge. They do tions to obtain valid serial num-
not necessarily cause harm; in- bers in these types of programs
deed, there are ethical hacking in order to use them without a
(or white hacking) companies licence (pirate them).
that help people and businesses
find out how secure they are against malicious hackers. Hack-
ers are sometimes confused with black hackers, who try to
attack Internet security systems and make money from it.

Cookies
These are text files that are saved
to the computer by the browser
when we visit a website, for the
site to read them on subsequent
visits. They are not a risk or a threat
as long as they only aim to pro-
vide access to the site. Thus, for
Pharming
instance, when we visit an online shopping website for the
This practice involves redirecting a second time on the same computer, it is usual to find cer-
domain name to a different computer, tain parameters already completed the configuration from
so that a user who enters a URL goes the previous visit has already been selected, or we may even
to the attacking website. Thus, for in- receive a customised welcome message, all because of the
stance, it can replace a bank website cookies saved from the first visit. They could be considered
to obtain the victim’s passwords. non-malicious spyware.

Hoaxes
These are chain e-mails start-
Spam or junk mail ed by companies to gather
These are e-mail messages that e-mail addresses from large
flood the network in order to ad- numbers of users and then
vertise products, sometimes of carry out mailings (which
dubious legality, so the recipients are also spam). They abuse
buy them. They are sent en masse, people’s good intentions, credulity and superstition. It
since it has been shown that 1 in is currently not an illegal practice. A chain starts when a
12 million sent e-mails receive a company sends a message such as ‘Lost child’ or ‘Careful,
positive reply. Studies indicate dangerous virus!’ to millions of invented e-mail addresses
that spam currently represents (those that do not produce error messages exist and can
80% of e-mail traffic worldwide. then be used); some of these recipients resend the mes-
sage in good faith and thus a chain starts; after a large
number have been sent, the chain will reach the company
again, now full of valid e-mail addresses.

Information and Communication Technologies - 4º ESO - Editorial Donostiarra 139


Computer security
4
Learn

„ Software
„ to protect the computer: computer security
Computer security consists of identifying what parts of the system are vulnerable and establish-
ing measures to minimise the risk. Keeping our computer security updated is key to avoiding
attacks and loss of information.
The software and prevention elements in the computer are:
•• Antivirus. An antivirus is a program that analyses the different units and devices and in-
coming and outgoing data flows, checking the code of files and looking for fragments of
characters. It uses a database with the characteristic strings of characters of different virus-
es. The antivirus program can detect viruses and only sometimes identify them. Although
virus creation is quick and always ahead of the antivirus manufacturing companies, having
one installed and up to date provides peace of mind. Antivirus programs protect against
viruses, Trojans and worms and most of them contain antispyware and even spam filters.
•• Firewall. This is a defence system that controls and filters incoming and outgoing net-
work traffic. The firewall is set up to control traffic through ports (our computer connec-
tions go through them) and provide alerts asking for confirmation for any program that uses
the Internet connection. Therefore, it is very important to set it up logically. Normally, they
are included in the operating systems, but there are also other types of free or commercial
software.
•• Proxy. This is software installed on a computer that functions as an entry port; it can be
configured as a firewall or a website blocker.
•• Passwords. These can help protect the security of a file, folder or computer on a local net-
work or the Internet. It is recommended to use between six and eight characters so they
cannot be easily cracked, although the level of security will be different for our computer
user password than for a Wi-Fi router, for example.
•• Cryptography. This is the encrypting of information used to protect files, communications
and passwords.

Preventing attacks
As in many other aspects of life, the best security is prevention. A few simple preventative measures are sufficient
to ensure secure use of our school or domestic computer, but keep in mind that absolute security does not exist. It is
advisable to:
•• Make regular backup copies (or backups) of the system so it can be restored if necessary.
•• Use secure passwords for all devices and applications.
•• Use only open trusted Wi-Fi networks to exchange private data.
•• Install an antivirus program and keep it updated (and know its functions and limitations).
•• Keep your operating system up to date.
•• Regularly check the devices plugged into your computer.
•• Take care when downloading files with P2P (peer-to-peer) programs (eMule, Ares, BitTorrent, etc.), which are a
new way for unknown files possibly containing viruses to get into our computers.
•• Be cautious when setting up the firewall to permit communication between these programs.
•• Take care also with free downloads of programs.

140 Information and Communication Technologies - 4º ESO - Editorial Donostiarra


Computer security
4
Learn

3. Personal safety
When it comes to security, the most important thing is protecting people. Damage to the com-
puter is, after all, no more than material damage, but damage caused to people stays with them
over time and affects other aspects of life. We will focus on online safety here, although per-
sonal safety covers many other areas, such as adopting the correct posture when sitting at the
computer or the risk of computer addiction.

„„
Threats to people or their identity
We are all vulnerable and our vulnerability increases the more we expose ourselves. On the In-
ternet, we reveal ourselves to others to a varying degree. Among the dangers that can threaten
us are:
•• Unintended access to illegal or harmful information.
•• Identity theft, robbery or fraud. For example, phishing is a type of computer fraud that
consists of acquiring information on a user (bank details, passwords, etc.) using deceptive
techniques, which is then used fraudulently. The name refers to ‘fishing’ for passwords. The
most common example is an e-mail that reaches a user, replacing an e-mail from a bank and
asking for passwords due to a false security alert.
•• Loss of our intimacy or harm to our identity or image.
•• Cyberbullying, which is a type of harassment, consisting of threats, blackmail, etc., be-
tween peers over the Internet, mobile or video games.

Take care when using the webcam


1. It can fool you. It lets you be seen, but you can’t see who’s looking at you.
2. People can record you without your knowledge.
3. It shows relevant information about you and where you are.
4. It can be activated without you realising.

„„
Software for personal protection
Programs are available to facilitate parental control over Internet use. They can limit searches,
permit or block websites, control instant messaging programs, establish filters by age and so
on. Examples of parental control programs are: KidsWatch (www.kidswatch.com) and K9 Web
Protection (www1.k9webprotection.com).

„„
Our attitude, the best protection
As well as the software available to us, we must be clear that the best protection we can have is
ourselves and adults we trust: parents, teachers and specialists.
The following page provides some basic recommendations for your protection, which could be
considered a basic code for surfing the Internet for young people.

Information and Communication Technologies - 4º ESO - Editorial Donostiarra 141


Computer security
4
Learn

Habits to protect personal intimacy


1 Talk to your parents about your Internet browsing; they can always help if you are unsure about anything. If you
receive something unusual or unpleasant, talk to an adult about it or report it.
2 On the Internet, do not ask for or give out data such as addresses, passwords, telephone numbers, the place
where you study, places where you normally hang out or any other information that could identify you. Use aliases
and nicknames that do not contain your date of birth or information about you.
3 Do not talk to strangers. People are not always what they say they are. Be wary of anybody who wants to know a
lot of information about you. Remember that there are safer ways to make new friends.
Turn your webcam to a dead angle or put a sticker over it when you are not using it so that it cannot record
4
images. Webcams can be operated remotely by malicious software. The police have been warning us for years
that the images we think come from the webcam of another person are often actually images that they have faked.

5 Think before you publish photos or videos of yourself; if you decide to do it, only publish things that will not dam-
age your current or future image and publish them in places with restricted access and with the consent of your
parents. Remember not to post pictures of anybody without their consent. Be respectful to others.
6 Keep up to date with technology and limit how long you spend on the Internet.

7 Make sure that you are of the minimum age required to enter a site. You will find this age in the terms of use of
the site. You must read these terms before clicking on “I agree”. If you do not read them, you may be allowing the
site owners to use your data, pictures, etc.
8 Inform yourself about sites. On some sites you cannot “unsubscribe” so we must be careful about what we post
on them; we can sometimes give away our data forever.
9 Never exchange private information on open Wi-Fi networks that are not trustworthy. Both the administrator and
some of the connected users can use techniques to steal your information.
In short: use common sense and do not do things on a computer that you would not do in everyday life.

Social networks and safety


A social network is a website that permits different kinds of exchange (financial, friendship, specialist subjects, among
others) between individuals, based on the relationship between members of the network. When we use a social network,
we must ensure our safety and respect for others. Apart from this, the social networks fulfil the function they are de-
signed for and there is no reason for them to pose a danger. However, bear in mind the following:
•• To join the social network you must be over a minimum age. The age can be found in the terms of use of the site,
which you should read before clicking on the “I agree” button.
•• By agreeing, you are accepting both the terms of use and the privacy policy. If you click on it before reading the
terms, you may be authorising the owners of the social network to use your data, images and more.
•• After signing up, they usually ask for very personal details, such as religious beliefs, political ideology, etc., which
you should not provide. Nor should you provide details such as your phone number or where you study, as this
could enable them to locate you.
•• On some networks, it is not possible to deregister. The data remain there forever for the owning company to use,
and the user can only disable (not delete) the account. Therefore, we must be careful what information we share
on the Internet.

142 Information and Communication Technologies - 4º ESO - Editorial Donostiarra


Computer security
4
Learn

4. Digital identity. Digital certificates


Everything you do on the Internet leaves a trace, a digital footprint that talks about you. This
information is your digital identity. It is your duty to take care of it and the law protects you for
this purpose. As well as the precautions described throughout this unit, there are other mecha-
nisms that can help us protect our online identity and prevent fraud, such as digital certificates.
A digital (or electronic) certificate is a digital document that contains electronically validated
personal identification data, which can be used as a means of identifying the signatory.
A digital certificate lets you carry out procedures securely from your personal computer,
24 hours a day, without having to travel or queue.
In particular, an electronic signature is a type of digital certificate that has the same validity
as a written signature. Another digital certificate is the electronic ID, which is issued by the
Ministry of the Interior.
All digital certificates permit access to public services so that the two parties involved in a proce-
dure (the user and a government body) can identify each other securely as the parties involved
in the interaction. In addition, they prevent other people from finding out the information that What can I do with a digital
is being shared. certificate?
Getting an electronic certificate is free; to do it, you have to follow this procedure: •• Apply for grants and
subsidies
1. On a computer with Internet access, apply for the certificate from a certification service pro- •• Present tax returns
vider.
•• Consult driving licence
2. Accredit your identity in person at a registration office. points and traffic fines
3. Download the certificate from the Internet. •• Apply for certificates

How can I find out if a digital certificate is installed on a computer?


To view the digital certificate once installed in a browser, go to Herramientas / Opciones de
Internet. In the Contenido tab, click on Certificados and, in the new window, click on Ver.
A window will open showing the personal certificates installed in our browser.

5. Ownership and distribution of software and information


The Internet can provide us with a lot of information and services of interest. We can also find all
kinds of software online that it might be useful to have.
It is very important to know that software, as with other artistic creations, such as books, songs,
graphic works, etc., is protected by intellectual property law.
Copyright is a set of standards and principles that regulate the legally recognised moral and
property rights given to authors for the creation of a published or original work. Intellectual
property covers all forms of copyright regarding the availability and use of the author’s creation.
When we access a website to download an application, it is very important to know what type
of licence the software has. Not all downloads are illegal or infringe intellectual property rights.

Information and Communication Technologies - 4º ESO - Editorial Donostiarra 143


Computer security
4
Learn

„„
Software licences
All software used or acquired by different means (shops, downloads, the Internet, etc.) has a
user licence, in other words, a contract with a series of terms and conditions that must be ob-
served.

Commercial A company’s software sold for profit. It is sometimes called proprie-


software tary software, although not all proprietary software is commercial.
Examples: Microsoft Office, Windows 8.

Freeware This is software with no monetary cost but which is not free. It is pro-
prietary software. Examples: Microsoft Edge, Adobe Flash Player.

Free software This can be freely used, copied, modified and redistributed. Its source
code is available and is known as open source. Examples: Libre-
Office, GIMP, Audacity.

Copyleft User licence that accompanies free software so it can be modified or


redistributed.

GNU/GPL (general A licence that accompanies packages distributed by the GNU project.
public licence) The author reserves the rights and permits redistribution and modifi-
cation under the same licence.

„„
File exchange: P2P networks
One of the most widespread ways of obtaining software online are P2P networks (peer-to-peer
networks). Computers on these networks behave as peers, acting as both clients (information
requesters) and servers (information providers). This permits the direct exchange of information
between computers in the network. P2P networks optimise the bandwidth of all the network
users, making use of the connectivity between them.
The information is split up and sent over the network. Users exchange these information pack-
ets, which are reconstructed when the user has received all the components. This permits the
exchange of large files and is one of the characteristics that made them popular.
However, the fact that the information is exchanged directly between users has made it possible
to share applications that are not free. This has generated a great deal of controversy about the
legality of exchanging content protected by intellectual property rights and copyright.
This point requires reflection: we should objectively value the creators’ efforts and work to ob-
tain the product (software, music, books, etc.) and the harm caused when this product is im-
properly obtained by others without copyright.
There are a large number of Internet sites where content can be downloaded legally and even,
in many cases, for free.

144 Information and Communication Technologies - 4º ESO - Editorial Donostiarra


Computer security
Step-by-step practical
4

Practical 1. Your digital footprint


Everything you do on the Internet leaves a trace, a digital footprint that
talks about you. This information is your digital identity and it is your duty
to take care of it. You are protected by the law in this.

„ Exercise
„ 1. Find out your Internet IP
As we have seen, every time we connect to the Internet we are identified
by a unique address assigned to our computer, called an IP address. We
will now see how easy it is to find out our assigned IP.
1. Open your browser and go to www.google.es. Type “find out my pub-
lic IP” in the search box.
2. Click on any link, look up the IP address you are browsing with and
write it down (it will look like the one in Figure 1).
3. Repeat the operation by clicking on another link and check that it de- Fig. 1
tects the same IP.
Some sites give us more information than the IP.

„ Exercise
„ 2. Know your browser
1. Open any browser. Press the key combination Shift + Ctrl + Supr.
This opens a window where you can delete your browsing data (Fig-
ures 2 and 3).
2. Press the Eliminar button to delete everything that has been select-
ed. Nonetheless, there will be some terms that you do not understand.
3. Search for information on the meanings of each term that appears in
the window.
4. Open a text document and create a table like the one below. Now
complete it with the meanings of the terms that you find.
Browsing history Explanation

Information that is stored on our computer by


websites to remember our preferences, such as Fig. 2. Privacy settings
Cookies in Mozilla Firefox
the sites we have visited, what we like, what we
usually do, or our location
Form data
ITE H ERE
OT W R
DO N
History
Download history

5. Do an online search for information and answer the following ques-


tion in the same document: what is private browsing?
6. Remember that mobile phones also have a browser: check your priva-
cy settings when you browse on a mobile phone.

„ Exercise
„ 3. Take care of your personal information
1. The biggest footprint that you can leave is what you upload to the In-
ternet. Discuss this statement in your document and give your opin-
ion on it. Fig. 3. Privacy settings
in Google Chrome
2. Save the file with the name P1_namesurname.
Information and Communication Technologies - 4º ESO - Editorial Donostiarra 145
Computer security
4 Step-by-step practical

Practical 2. Let’s stop cyberbullying by talking about it


You must have consent from your parents or legal guardians to do this
practical.
We are going to create a presentation using Prezi called “Stop cyber-
bullying”. Prezi is an online tool for creating presentations. The only re-
quirement is for you to register.
1. Go to prezi.com and click on the Log in button or the Get started
button, depending on whether you are registered or not. If not, sign
up for Prezi Public (the free option). Once you are in the main screen,
select Create your first Prezi.
2. Choose a similar template to the one in Figure 4 (called “Explain a Top-
ic”) and click on Use template. This opens the desktop with a tem-
plate containing instructions on how to use Prezi.
3. Click on the first slide and type the title: “Stop cyberbullying”.
4. Click on the second slide and type: “Cyberbullying is a type of harass-
ment that uses threats, blackmail, etc., between peers on the Internet,
Fig. 4
mobile phones or video games”.
5. Let’s insert a picture. To do this, drop down Insert and choose Image.
Choose an image from the Internet that looks similar to the one in
Figure 5.
6. Add different images or text to each slide until you have filled in
all the ones that appear by default in the template. Your presenta-
tion should contain information on the following points, which you
should develop:
•• The Jokin case (2004)
•• The serious consequences of cyberbullying and its high preva-
lence
•• How difficult cyberbullying is to detect
7. Insert the cyberbullying video from the pantallasamigas.net website
by copying the link.
8. The last slide should contain the following text: “Put a stop to cyber-
bullying. If you are being bullied, let people know. If you see some-
body else being bullied, let people know. We need your solidarity”.
9. In this last step, we will define the path or order that we want Prezi
to use to display the objects or slides on the desktop. Click on Edit
path (bottom left) and move the numbered paths to put them in the
correct order.
Fig. 5
10. View your presentation by clicking on Present.
11. Save your presentation, leave the editing window by clicking on Exit
and, in Share, copy the link and paste it into a text document. Save
the file with the name P2_namesurname.

146 Information and Communication Technologies - 4º ESO - Editorial Donostiarra


Computer security
Step-by-step practical
4

Practical 3. Security poster: “Threats and solutions”


Open a presentation program (PowerPoint or Impress) and make a poster
similar to the one shown here, putting into practice what you learnt in
Unit 2. Save the file with the name P3_namesurname.

THREATS SOLUTIONS

•• Identity theft.

TO THE INDIVIDUAL
Our attitude, the best protection.
•• Phishing. A type of computer fraud that uses trickery
to obtain information about a user (bank details, pass-
words, etc.) in order to use it fraudulently.
•• Loss of privacy.
•• Damage to our identity or image.
•• Cyberbullying. A type of harassment that uses
threats, blackmail, etc., between peers on the Internet,
mobile phones or video games.

•• Viruses and Trojans Antivirus. An antivirus is a program that can pro-


Programs that install themselves on a computer without tect our computer from attacks by viruses and Tro-
the user’s permission for the purpose of causing damage. jans if it is kept up to date.
They can self-replicate and infect other computers. These
viruses are installed on the system when the file that con-
tains them is opened.

TO COMPUTERS
•• Spyware Firewall. A defence system that controls and filters the incoming and
outgoing traffic of a network through our computer ports. It displays
Software that tries to obtain data alerts to ask for confirmation for any program that uses the Internet
from users. Not all spyware is mali- connection.
cious; sometimes it is designed to
make searching easier.

White hacking. Activity carried out by people who help individuals and
•• Black hackers businesses to discover how secure their systems are against malicious hack-
Expert computer criminals who ers.
attempt to bypass Internet se- Cryptography. The encryption of information to protect files, communica-
curity systems to make money tion and passwords.
from it. Passwords. These can enhance the security of a file, folder or computer on a
local network or the Internet. The security level of our computer user will be
different to the security level of a Wi-Fi router, for example.

Information and Communication Technologies - 4º ESO - Editorial Donostiarra 147


Computer security
4 Step-by-step practical

Practical 4. Presentations in Padlet. “My computer is under attack!”


You must have permission from your parents or legal guardians to do this
practical.
In this practical, you are going to use Padlet to explain to your classmates
what Internet threats can put your computer under attack. You will need
the images from the virtual CD (Unit 4 folder).
1. Open the browser and go to www.padlet.com to start using Padlet.
Click on Sign up and sign in with your Gmail account (Figure 6). If you
do not have a Gmail account, you can create a Padlet account.

Fig. 6 2. Click on Make a padlet. In the next window, Start with a blank...,
select Wall (Figure 7).
3. On the next screen, double-click on the title and change it to “My
Computer is Under Attack!”, and type “Computer threats on the Inter-
net” (Figure 8) in the description.
4. You can also change the wallpaper in this window, if you wish. When
you have made these changes, click on Next.
5. In the next step, check that your padlet is secret by default. Click on
Next until a window appears that lets you save it.
6. Double-click on the wallpaper on the screen to start publishing en-
tries. As the title of your first entry, type “Viruses and Trojans” and copy
the information from the “Learn” section of this unit about viruses and
Fig. 7 Trojans (Figure 9). Click on the Upload icon and upload the image
P4_Virus.jpg from the virtual CD.
7. Repeat the process with the information and images on spyware and
hackers.
8. Now create another entry to include a video on Internet security. Type
“Security Videos” as the title of this entry and enter the description
“Viruses”. Click on the Link icon and paste the address of the video
that you will find in the text file P4_Security_videos_addresses on
the virtual CD.
9. Repeat these steps to insert the spyware video.
10. Click on Modify in the top menu and, at the end of the menu, change
the address of your padlet. Type “computersecurity” as the address
(Figure 10). Open a new tab in the browser and type in the full ad-
dress to view the result.
Fig. 8
11. Click on the Share option in the same menu. Under the Share/Ex-
port/Embed tab, you have several options, including e-mailing the
padlet to somebody, inserting it on a website and exporting it as a
PDF file.
12. Choose the Print code option and save the image (generated QR
code) with the name P4_namesurname. Then scan the code with a
code reader to see the result.
Fig. 9

Fig. 10

148 Information and Communication Technologies - 4º ESO - Editorial Donostiarra


Computer security
Step-by-step practical
4

Practical 5. Video with PowToon. Our attitude, the best protection


You must have permission from your parents or legal guardians to do this
practical.
In this practical, you are going to create an animated presentation with
PowToon to explain to your colleagues how to protect themselves when
they browse the Internet or use a mobile phone.
1. Visit www.powtoon.com. Go to the Start now option. To enter the
application, you need to register and create an account. You can also
enter it using your Gmail account.
2. Once you have signed in, choose Explainer video. You will see seve-
ral themes or templates; select one and click on Preview to see how
it might look. Do not choose one that says Pro because it will contain
elements that disappear in the free option.
3. Now click on Use. A screen will appear with slides in it.
4. Click on the text in the first slide and type “Protect yourself on the
Internet". A pop-up window will appear where you can change the
font size to adjust it.
5. In the base image Swap option, you can swap the background image
for another one that the program offers to you. Change it to whatever
image you like.
6. You can also click on each of the elements in the slide. This makes
the Swap or Settings options appear and you can then change the
colour, font, etc. Change the text colour and the background colour of
the text to one that you prefer but keep the design the same.
7. Click on the Play option below the slide to see the effect.
8. Browse through the other slides and select the most appropriate one
for the headline and text. Delete all the other slides except for the last
one, which we will use to finish off. Do this by clicking on the trash can
that appears when you position the mouse on the slides.
9. After selecting the slide, go to it and add the title “Habits to protect
personal intimacy”. Complete the slide with the information you con-
sider relevant (from the theory part of this unit).
10. Click on the ellipsis that you see on the slide thumbnail and select
Duplicate. On the duplicate slide, which will be our third one, add the
title “On the Internet, use your common sense”. Complete the slide
with relevant information.
11. Complete the last two slides to finish off in whatever way you like.
12. Click on Preview & export in the top menu and watch the presen-
tation.
13. Click on Export to bring up the export options; select PPT. Wait a few
seconds for the process to complete and then copy the link and paste
it into a text document. Save it with the name P5_namesurname.

Information and Communication Technologies - 4º ESO - Editorial Donostiarra 149


Computer security
4 Step-by-step practical

Practical 6. E-mail security

„ Exercise
„ 1. Choosing an appropriate user name
When we choose a user name to create an e-mail account, we should think
about what we want to use the account for. It can be formal (as in name.
surname, or with the first name initial and the whole surname, for exam-
ple) if we are going to use it in an academic or professional setting, or it
can be more “fun” or informal if it’s for friends. In any event, you should
never use a name such as Gabriel96, which gives the year you were born
and lets people easily know your age
1. Open file P6_E1_Usernames in Unit 4 of the virtual CD and answer
the questions in it.
2. Save the file with the name P6_E1_namesurname.

„ Exercise
„ 2. Minimum age for creating an e-mail account
Do you know what the minimum age to create an e-mail account is?
Where do you think you could find this information?
1. Enter the Gmail settings and search for “Privacidad” and “Condiciones”.
2. Look in these texts for the minimum age required to have an account.
When you find it, take a screenshot by pressing Impr pant (imprimir
pantalla or print screen) on your keyboard, paste the image into a text
document and save the file with the name P6_ E2_namesurname.
3. In the same document, write a brief commentary on how easy or dif-
ficult it is to find this information.

„ Exercise
„ 3. Spam and hoaxes
We often receive two types of malicious messages on our computer or
mobile device: unwanted mail (spam) and chain e-mails containing false
rumours (hoaxes). To combat spam, e-mail account providers (such as
Gmail, Hotmail, Yahoo, etc.) have systems to prevent it. Antivirus software
usually includes a spam filter. The problem with hoaxes is that they nor-
mally come from known e-mail addresses, so the above filters are ineffec-
tive, as they are valid senders. To try and stop the trend, there are websites
that compile information on these rumours which you should to visit be-
fore resending a “caring” message to all the contacts in your address book.
1. Enter your Gmail account and find out where it saves spam. Take a
screenshot showing where it is, paste the image into a text document
and save the file with the name P6_ E3_namesurname.
2. In the same document, explain if you’ve ever received a hoax by com-
puter or mobile.

150 Information and Communication Technologies - 4º ESO - Editorial Donostiarra


Computer security
Step-by-step practical
4

Practical 7. Security on YouTube

YouTube is a website that lets users share digital videos online. It is cur-
rently owned by Google.
To upload a video to YouTube, you need to create a free account. The min-
imum age for doing so is 14. If you try and create an account giving a date
of birth younger than 14, the following error message will appear: “Lo
sentimos. Según la información que nos has proporcionado, no te puedes
registrar en YouTube.com”.
1. Go to www.youtube.com.
2. Look for the terms of service (condiciones del servicio) and the pri-
vacy policy (política de privacidad) and try and find the minimum
required age in these documents. If you manage it, take a screenshot
with the Impr pant key, paste the image into a text document and
save the file with the name P7_namesurname.
3. In the same document, write a brief commentary on how easy or dif-
ficult it is to find this information.
4. In the privacy policy, try to understand what personal details Google
can collect and how it can use them. Is it easy to understand this in-
formation? Do you think a person with the minimum required age
would be able to make decisions about these details?
5. Look for the Community guidelines (Normas de la comunidad)
section. Read the Respect the YouTube community (Respeta la co-
munidad de YouTube) section. Take a screenshot and paste it in the
same text document.

6. Do you think that you can upload images of other people without
their consent? Write a short statement about the possible conse-
quences of disseminating images of other people.
7. Have you ever thought about all the information out there that can
help identify a person, even though it is not immediately obvious? For
example: street names, names of schools, school uniforms or football
kits. Do you think this information could reach people who can make
malicious use of it?
8. How long do you think a YouTube video can stay uploaded? What
happens if a person uploads a video to his or her account without our
consent and a few years later we realise it is inappropriate?
9. Write a statement about YouTube and copyright. Put all your answers
in the same document and save it again.

Information and Communication Technologies - 4º ESO - Editorial Donostiarra 151


Computer security
4 Step-by-step practical

Practical 8. Security on P2P networks


As we have seen, P2P (peer-to-peer) networks permit the exchange of in-
formation between computers in the network and the downloading of
files provided by other users.
To access P2P networks, we have to install a program that connects our
computer with others to exchange files. This exchange can create differ-
ent risks that we should bear in mind before participating.
Answer the following questions in a text document:
1. How many file exchange programs do you know? Have you ever used
one of them? What for?
2. If you install a program to use P2P networks, they allow other people
to access your computer. How many people do you think can connect
at the same time over a file exchange program?
3. As other people are accessing your personal computer, you need to
be very familiar with the programs and take great care about what
you share. Home computers may contain bank or health details or tax
returns, among other information, along with other personal items.
Thus, it is essential to share only one folder and take care not to share
the whole hard disk. Have you ever thought that by sharing these
types of program you could be allowing other users to access your
private files or you could be sharing folders you didn’t intend to?
4. The files you download are not always what you expect. Sometimes
they may even have content that is unpleasant or offensive. Do you
know what you should do if you find yourself in this situation?
5. Sometimes downloads are infected with viruses, spyware or adware.
It is important to keep your antivirus and antispyware software up-
dated before you start participating in a P2P network. It is also neces-
sary to delete all programs your antivirus detects as a threat and scan
the downloaded files to check whether they contain malware. Who
do you think contaminates download files with spyware or adware?
For what purpose?
6. Some download programs remain active even after closing the pro-
gram window; they do not shut down their network connection and
remain active so that other users can copy files at any time. To avoid
this situation, it is worth configuring the file sharing program so that
it does not open automatically when we turn the computer on. What
else can we do?
7. Do you agree that we should objectively value the creators’ efforts
and work to obtain a product (software, music, books, etc.) and the
harm caused when this product is improperly obtained by others
without copyright? Write a small reflection on this.
When you have answered the questions, save the file with the name P8_
namesurname.

152 Information and Communication Technologies - 4º ESO - Editorial Donostiarra


Computer security
Step-by-step practical
4

Practical 9. Checking computer security


We are going to learn to check the security elements on our computer.
Create a table in a word processor as shown below and then following the
instructions on each of its elements:

Element Status Comments


1 Antivirus
R E
2 Updates
E HE
3 Firewall
R I T
4 Windows Defender
T W
5 Network NO
6 Browser DO

1. Antivirus. Check that the computer has an antivirus program in-


stalled. To do this, locate its folder in Inicio / Todos los programas.
If there is an antivirus program, write “Installed” in the Status column
and in Comments, write “Date of last update:”. To find this date, go to
the antivirus control panel using the icon in the status bar and look
for the date; add it to the column. If there is no antivirus program,
write “Not installed” in the Status column and in Comments write
“Install antivirus”.
2. Updates. Check that the computer is configured to update the op-
erating system automatically. To do this, access the centro de se-
guridad in the control panel. In Status, indicate whether updates
are enabled and in Comments indicate the type of set-up (“Notify”,
“Download and notify”, etc.).
3. Firewall. In the centro de seguridad you can access the firewall set-
up to check that it is enabled. In Status, indicate whether it is and in
Comments indicate any established exceptions.
4. Windows Defender. Check whether this utility is installed. To do this,
locate its icon in Inicio / Todos los programas. In Status, indicate
whether it is enabled and in Comments, indicate the dates of updates
and the last scan. If it is not installed, write “Install” in Comments.
5. Network. Check the shared folders on the computer. To do this, look
for Redes e Internet on your computer and check the listed folders.
Write the folders in Comments and check their permissions.
6. Browser. Go to Herramientas / Opciones and check the information
on security and privacy. In the Comments column, note the user set-
up for cookies, passwords, component installation, etc.
When you’ve completed the table, save the file with the name P9_name-
surname.

Information and Communication Technologies - 4º ESO - Editorial Donostiarra 153


Computer security
4 Step-by-step practical

Practical 10. Protection software

„ Exercise
„ 1. Free antivirus
If you do not have an antivirus program installed on your computer, you
can choose a free one for home use, such as Avast!, Avira, Bitdefender,
etc. In this practical, we are going to download and install the Avast! anti-
virus program in Spanish.
1. Go to www.avast.com/es-ww/free-antivirus-download.
2. Download the latest available version of the program.
3. Once downloaded, double-click on the file to start installation and
follow the steps shown in the wizard. To be able to install it, you need
to accept the manufacturer’s licence terms. Once installation is com-
plete, it will ask if you want to carry out an initial system virus search
after rebooting the system. You should allow this to be sure that there
are no viruses on the computer (this process will be carried out during
boot-up and should last around 10 minutes).
4. Take a screenshot showing the installation wizard and paste it into
a text document. Save the file with the name P10_namesurname.

„ Exercise
„ 2. Windows Defender
As well as antivirus programs, software is available specifically for detect-
ing and deleting other types of malicious software.
1. To open Windows Defender, click the Inicio button. In the search
box, type “Defender” and press Intro.
2. Click on Examinar ahora to see whether your computer is protected
against malware.
3. Once the scan is complete, take a screenshot of the results and save
them in the same text document as Exercise 1.

„„
Exercise 3. Antispyware: Lavasoft Ad-Aware
1. Go to www.adaware.es. Click on Descargar and follow the instruc-
tions to get your free version of this tool.
2. Once the download is complete, execute the file to start installation.
Select the language and follow the steps in the wizard. Click on Fi-
nalizar to complete the installation and an Ad-Aware update win-
dow will automatically open. Once the process is complete, reboot
the computer to activate the changes.
3. After rebooting the system, open the Ad-Aware program by double-
clicking on the task bar icon and selecting the Analizar sistema op-
tion. If it detects anything, follow the recommendations indicated by
the tool to solve the infection.
4. Once the scan is complete, take a screenshot of the results and save
them in the same text document.

154 Information and Communication Technologies - 4º ESO - Editorial Donostiarra


Computer security
Step-by-step practical
4

Practical 11. Protecting content


One option for protecting content when uploading a file to the Internet
(e.g. in a blog) is to use a password.

„ Exercise
„ 1. Compressing with a password
1. If you don’t have a file compression program, you can get one by
going to www.winrar.es/descargas. Consult the terms of the licence.
Once the program has downloaded, double-click on the file to start
installation and follow the steps shown in the wizard until it is com-
plete.
2. Create a folder with the name P11_namesurname and save a file of
any sort in it. Next, open the file explorer and go to a level higher than
the created folder, which is the directory you want to protect. Right-
click on the folder and choose the Añadir al archivo... option. In the
Avanzado tab, click on Establecer contraseña.
3. Click on Aceptar to generate a compressed file (RAR) with all the con-
tents of the directory. Once complete, you can delete the directory
you have compressed.
4. From now on, when you double-click on the RAR file, you will be
asked for the password you set before showing you the content.

„ Exercise
„ 2. Passwords in word processors
Practically all programs you can use on your computer offer the option
of protecting files with passwords in their security tools. Let’s look at two
examples:

Microsoft Word
1. Open a document. Go to Archivo / Información / Permisos and click
on Proteger el documento. Select Cifrar con contraseña.
2. Write the password “Sunlight” in the Cifrar documento dialogue
box. Next, click on Aceptar.
3. Write the password again and click on Aceptar.

LibreOffice Writer
1. Open the document. Go to Archivo / Guardar como.
2. Enable the Guardar con contraseña option and click on Guardar.
3. Write and confirm the password “Sunlight”, then click on Aceptar.
Save the files in the folder P11_namesurname and then try to open
them.

Information and Communication Technologies - 4º ESO - Editorial Donostiarra 155


Computer security
4 Step-by-step practical

Practical 12. Security protocols. Preventing fraud in e-commerce


Electronic commerce (e-commerce) permits the online purchase and
sale of products and services between companies and individuals. Pay-
ment can be by card or bank account, so tools are required to ensure se-
cure transactions.
On the Internet, we can find pages that use a secure connection: they use
a secure cryptographic protocol, called HTTPS (hypertext transfer proto-
col secure). Encryption of these pages is based on SLL (secure sockets lay-
er) certificates, creating an encrypted channel that cannot be interpreted
if someone intercepts the connection. As well as e-commerce, it is used by
banks and services that require personal details or passwords to be sent.
1. Go to a bank website. We are going to check if the page has a secure
connection.
2. Look to see whether the website address starts with https instead
of http. Depending on the browser version and the type of security
certificate, the address bar might also appear in another colour to in-
dicate a secure connection (sometimes it does not appear directly on
the home page but on the customer access page).
3. Find the closed padlock icon in the tool bar or status bar. Take a
screenshot, paste the image into a text document and save the file
with the name P12_namesurname.
4. Click on the padlock to open a website identification window. Click on
the Ver certificado button to access information about the website.
Here you can consult information on the certificate issuing body or
the issue and expiry dates. Take another screenshot and paste it into
a text document.
5. Finally, in the same file, create a table like the one below. In it, write
five products that are normally purchased online, the website with
its URL and, if the website is certified, the name of the issuer. The first
row provides an example.

Product URL Issuer

Amazon Symantec Class 3


1 Travel
(www.amazon.es) Secure Server

3
E HER E
T W R I T
4
DO N O
5

156 Information and Communication Technologies - 4º ESO - Editorial Donostiarra


Computer security
Extend your knowledge
4

Extension 1. I don’t want to be a phonbie

Use a search engine to find out what a phonbie is. Next, based on Prac-
tical 5, create a video in PowToon to explain everything you’ve found
out: what phonbies are, how they can affect you, what you can do to
avoid becoming one, etc.

Extension 2. Sharing problems: awareness is prevention

This practical can be done alone and then shared in class or, if your
teacher shares a document with the whole class using Drive, you can
produce a joint presentation, even with all of you working on it at the
same time. This enables a lot of information to be gathered quickly.
1. In your Gmail account, click on Apps (in the top right menu) and in
the pop-up menu click on Drive.
2. Open the New menu and select the Google Slides option. A doc-
ument will open in a new window.
3. In the document, write your name and a real case that you person­
ally know, which matches what we have seen on personal threats.
In the description, don’t say who it happened to, even if it’s you
or just someone you know. When you have finished, click on Save
now and save the file with the name Sharing problems: aware-
ness is prevention.
4. Share the file with three classmates using the Share option. If your
teacher asks you to, share the document with him or her.
5. Next, go to your Gmail account and open a file that someone has
shared with you. Check that you can write in it.

Extension 3. Cryptography

Cryptography is the encrypting of information to protect files, commu-


nications and passwords. One option for protecting documents is to
use encrypting tools. This can be done with the PixelCryptor program,
which lets you encrypt and decrypt files using an image as an encryp-
tion key (easy for us to remember but difficult for potential intruders
to identify).
PixelCryptor is a free tool for personal use.
Find out how it works, collect the results in a text document and save
the file with the name X3_namesurname.

Information and Communication Technologies - 4º ESO - Editorial Donostiarra 157


Computer security
4 Review

UNIT SUMMARY

 Active and passive security


 Active security is a set of actions aimed at protecting the computer and its content (e.g. using safe passwords, keep-
ing the antivirus program up to date, etc.). Passive security aims to minimise the impact of possible computer damage
(e.g. making regular backup copies).
If we are going to use the computer on a network, we must:
•• Know how to use it (we should be careful when using tools that we are unfamiliar with, especially online).
•• Know what security tools are available to us (so we’ll know if we are protected against viruses, spam and websites
with unwanted content).
•• Apply a set of basic security rules to guide our interaction with other Internet users.

 Security on the computer


 Malware or malicious software is software developed for malicious purposes, such as viruses, Trojans, worms, spyware,
etc.
 Viruses and Trojans are programs that install themselves on a computer without the user’s permission for the purpose of
causing damage.
 Spyware is software that tries to obtain data from users.
 A keylogger is a type of software that attempts to obtain and memorise keystrokes.
 Black hackers are expert computer criminals who attack system security.
 Cookies are text files that are saved to the computer by the browser when we visit a website, for the website to read them
on subsequent visits.
 A firewall is a defence system that controls and filters incoming and outgoing network traffic of a network.
 Cryptography is the encrypting of information used to protect files, communications and passwords.

 Personal safety
 Phishing is a type of computer fraud that consists of acquiring information about a user (bank details, passwords, etc.) in
order to use it fraudulently.
 Cyberbullying is a type of harassment consisting of threats, blackmail, etc., between peers over the Internet, mobile or
video games.
 When we use the Internet, we must bear in mind our security and respect for others. The law protects us.
 As well as the software available to us, we must be clear that the best protection we can have is ourselves and adults we
trust: parents, teachers and specialists.
 Use common sense and do not do things on a computer that you would not do in everyday life.

 Digital identity. Digital certificates


 Everything you do on the Internet leaves a trace, a digital footprint that talks about you. This information is your digital
identity. It is your duty to take care of it and the law protects you for this purpose.
 A digital (or electronic) certificate is a digital document that contains electronically validated personal identification
data, which can be used as a means of identifying the signatory.
 An electronic signature is a type of digital certificate that has the same validity as a written signature. Another digital
certificate is the electronic ID, which is issued by the Ministry of the Interior.

 Ownership and distribution of software and information


 Copyright is a set of standards and principles that regulate the legally recognised moral and property rights given to
authors for the creation of a published or original work. Intellectual property covers all forms of copyright regarding the
availability and use of the author’s creation.
 When we access a website to download an application, it is very important to know what type of licence the software has.
Not all downloads are illegal or infringe intellectual property rights.
158 Information and Communication Technologies - 4º ESO - Editorial Donostiarra
Computer security
Review
4

COMPREHENSION ACTIVITIES

When you have completed the topic, do the following exercises. You can complete them online by going to the relevant
unit on the publisher’s website (www.editorialdonostiarra.com) and hand them in as PDFs.

 Active and passive security


1.  Explain the difference between active and passive security.
2.  Give an example of an act of active security that you do in everyday life and an act of passive security.
3.  Describe the three basic rules that we must follow when we use a computer on a network.

 Security on the computer


1.  What are the symptoms that our computer is under attack?
2.  Explain the different preventative measures to protect the computer that we’ve seen in this unit.
3.  Match up the elements in these two columns:

Threat Solution
1. Virus a) Cryptography
2. Trojans b) Firewall
3. Black hackers c) Antivirus
4. Cyberbullying d) Passwords
5. Spyware e) Reporting
6. Loss of intimacy f) Ethical hacking
7. Identity theft g) Protecting your privacy

4.  Open file Comprehension4_revision.doc in Unit 4 of the virtual CD and check your knowledge of security by filling
in the table without looking in the book. Next, correct it and complete it by re-reading the contents of the unit. Save the
file with the name Comprehension4_namesurname.doc.
5.  In relation to Practical 9, explain which security elements should we check on our computer.

 Personal safety
1.  Explain what Internet fraud is and how it can be avoided.
2.  Say whether the following statements on Internet security are true or false and why:
a) We can post photos of another person on the Internet without their consent, so long as the person is not doing any-
thing in the photo that could harm their image.
b) If we switch our webcam off, we do not have to worry about people recording us.
c) We can sometimes extract more personal information than we might first think by studying a photo or a video care-
fully.
3.  In relation to Practical 1, explain what your digital footprint is.

 Digital identity. Digital certificates


1.  Define the following concepts: digital identity, digital certificate, electronic ID.
2.  In relation to Practical 12, explain what a secure protocol is and what certificates are and who or what issues them.

Information and Communication Technologies - 4º ESO - Editorial Donostiarra 159


Computer security
4 Review

MULTIMEDIA ACTIVITIES

When you have studied the topic, test your knowledge by doing the following online exercises, which you can find in the
relevant unit on the publisher’s website (www.editorialdonostiarra.com). You can hand them in as PDFs.

1. Test on active and passive security


Open exercise Unit04 01 Test on active and passive security in Unit 4 of the virtual CD
and test your knowledge.
There is only one correct answer to each question.
Once you have finished, you can print the test as a PDF and give it to your teacher with the
mark you obtained.

2. Test on security on the computer


Open exercise Unit04 02 Test on security on the computer in Unit 4 of the virtual CD and
test your knowledge.
There is only one correct answer to each question.
Once you have finished, you can print the test as a PDF and give it to your teacher with the
mark you obtained.

3. Test on personal safety


Open exercise Unit04 03 Test on personal safety in Unit 4 of the virtual CD and test your
knowledge.
There is only one correct answer to each question.
Once you have finished, you can print the test as a PDF and give it to your teacher with the
mark you obtained.

4. Test on digital identity and digital certificates


Open exercise Unit04 04 Test on digital identity and digital certificates in Unit 4 of the
virtual CD and test your knowledge.
There is only one correct answer to each question.
Once you have finished, you can print the test as a PDF and give it to your teacher with the
mark you obtained.

160 Information and Communication Technologies - 4º ESO - Editorial Donostiarra


Computer security
Review
4

MOBILE APPS

 Security on mobile devices


Antivirus apps
Antivirus applications for mobile devices are different to the ones for computers because they have different functions:
•• Anti-theft tools, such as phone finders and alarms.
•• Protection from websites that impersonate or attempt to steal private information (data from credit cards, e-mails,
etc.)
One example of an antivirus app for Android devices is Avast Mobile Security. For iOS, we have Avira Mobile Security.
But is it really necessary to install an antivirus on a mobile device? According to data from Google Play, the probability of
being infected by malware when downloading to an Android device is less than 0.5%. The disad-
vantage with these apps is that they run in the background, consuming RAM and slowing down
the performance of the device.
1. Search for information on the need to install an antivirus on your phone. Once you have all the
information, express your views in a text document.
2. Save the document with the name App_namesurname.
Anti-theft apps
Although some antivirus apps include this feature, specific apps are available and these have the
following features:
•• Remote control of the device through their website or SMS, allowing us to disable a stolen
device even when it is not connected to the Internet
•• GPS tracking
•• Silent function that takes real-time images of the possible thief
Cerberus is one of the best known anti-theft apps.

ONLINE ACTIVITIES
 Websites that protect you
1. Open file Internet1_Websites.doc in Unit 4 of the virtual CD and complete the table after visiting the websites indica-
ted in it.
2. Save the file with the name Internet1_namesurname.

 Security videos
1. Go to www.pantallasamigas.net (or www.youtube.com/user/pantallasamigas) and watch the following videos: “Cuida
tu imagen on-line”, “Netiqueta joven para redes sociales”, “Cuidado con la webcam: sus usos positivos y riesgos” and
“Sexting: ¡no lo produzcas!”.
2. In a word processor, summarise the main idea in each video. Save the file with the name Internet2_namesurname.

ON THE INTERNET: USEFUL ADDRESSES


denuncia-online.org A website with information for Internet users interested in computer crime, with resources to report
situations they detect or suffer directly or indirectly.
www.agpd.es Website of the Spanish Data Protection Agency (Agencia Española de Protección de Datos), with information
on all our rights regarding the processing of our personal data, both online and offline.
www.gdt.guardiacivil.es Website of the Guardia Civil Online Crime Group (Grupo de Delitos Telemáticos), with information
on online security and help for reporting crimes.

Information and Communication Technologies - 4º ESO - Editorial Donostiarra 161

You might also like