You are on page 1of 7

Online Safety, Security, Ethics, and Etiquette

Email Spam
• AKA Junk mail •
Usually unsolicited commercial email sent from an unknown source with identical message sent to multiple recipients. •
Usually not dangerous but can be time and space consuming. • Dangerous ones can carry viruses and other malicious
software (Malware)

Email Spoofing
• It is a deceitful email practice in which the sender address is changed, so that it would appear to have come from a different
source which is usually someone you know. • Email spoofing is usually used by spammers to hide the origin of the spam.

Phishing
• It is a deceitful practice of trying to get confidential information such as passwords and usernames, and credit card details
by making it appear as if it comes from a trustworthy source. • It is usually done through emails or using popular entity such
as Microsoft, Yahoo, Google, Amazon, and financial institutions.

Pharming
• This is a dangerous hacker attack on a website which directs all traffic to that website to another fictitious website. • The
main objective is to obtain username and passwords, as well as credit cards add financial information, and use these to steal
their money electronically or use the credit cards of the victims. • It is a major concern of many online banking and
electronic commerce transactions.

Spyware
• A computer program that is installed covertly on a personal computer to collect information or even take control over the
computer without the knowledge of the user. • It can monitor and collect information about the user’s internet habits and
practices. • It can also affect the performance and setting of the computer.

 Computer Worm
• It is a dangerous computer program that replicates itself through a network.
• Some worms delete files, others disrupt the network function.
• It is usually spread through email and running of attachments from suspicious sources.
• It spreads by exploiting weaknesses in operating systems (but BLESS OS updates!)

Trojan Horse
• A malware fronting to perform a good task, but covertly performs undesirable function with the intention of entering the
computer without the user’s consent.
• It can disable the computer’s defenses, opening it to unauthorized entry. It can erase data, can corrupt files, allow access to
computer.

Computer Virus
• It is a program that duplicates itself and then infects the computer. It spreads like a biological virus.
• It can be transferred by the use of removable storage media devices.
• Damages may be mild to severe.

Hacker
• This is a person who is able to enter and control other people’s computer without authorization. • Usually vandalizes the
victims’ website, steals personal information, obtains intellectual property, and performs credit card fraud.
• Firewalls are able to prevent entry by hackers.

WINDOWS SECURITY

1. Changing and Adding User Accounts


2. Creating a New Password
3. Setting up/Changing the Screen Saver Security Setting
4. Fortifying the Security Center
CHANGING AND ADDING USER ACCOUNTS
Possible users of your account are your parents, siblings, children, friends, lovers, etc.

The disadvantage of having a single account is that everyone who uses the computer will share
the same application settings, files, and system permissions.

Kinds of Accounts
1. Computer Administrator – controls all the contents and users of the computer, installs
programs, and adds and deletes users.
2. Limited Account – has limited control and only have access to his/her particular account.
3. Guest – accounts created for transient users and do not have access to the other computer
accounts and their content.
10 Commandments of Computer Ethics

 It was written by Dr. Ramon C. Barquin in 1992 from the Computer Ethics Institute.
It means to create a set of standards to guide and instruct people on the ethical use of
computers.
 
10 Commandments of Computer Ethics
1. Thou shalt not use a computer to harm other people.
2. Thou shalt not interfere with other people’s computer work.
3. Thou shalt not snoop around in other people’s files.
4. Thou shalt not use a computer to steal.
5. Thou shalt not use a computer to bear false witness.
6. Thou shalt not use or copy software which you have not paid (ouch..)
7. Thou shalt not use other people’s computer resources without authorization.
8. Thou shalt not appropriate other people’s intellectual output.
9. Thou shalt think about social consequences of the program you write.
10. Thou shalt use a computer in many ways that show consideration.

You might also like