Professional Documents
Culture Documents
Week 002-Module Online Safety and Security
Week 002-Module Online Safety and Security
The Internet has become a part of our daily lives. The technology has
become so advanced that the average person can now access vast
amounts of information and communicate with people from all over
the world using devices that can fit in his pocket. In what is called the
Information Age, the Internet has become not only a privilege but also
a necessity for many people.
Information Security
We usually need to submit some personal information in order to gain
access to online sites and services. These personal details are often
required to secure our online activities and transactions. However, in
the wrong hands, our personal information can be used to cause
inconvenience, loss or even harm to us and other people. Here are
some of the most commonly shared personal details, how they can be
used in dishonest and malicious ways and what you can do to secure
them.
Full Name
Almost every app and website with a log-in feature require your full
name. Most of the time, they just ask for it to determine how to
properly address you in emails and personal messages. Some sites, like
Facebook, use it to label your account and online interactions.
Username
Password
2
MODULE OF INSTRUCTION
Birth Date
Birth dates are mostly required to determine if you are old enough to
access certain contents and features in the Internet. Sometimes, it is
also used in security checks to determine if it is indeed the rightful
owner who is accessing the account since birth dates are not usually
widely known.
Some online services ask for users’ home address. Some apps
can automatically determine your current location using your
device’s GPS (Global Positioning System) feature. They do
this in order to give you location-specific contents and options.
For example, YouTube determines the user’s location and
suggests videos that are relevant to that area.
Phone Numbers
4
MODULE OF INSTRUCTION
Email Address
Financial information
Internet, some of them also spread through offline means such as flash
drives and local area networks (LAN)
1. Virus
2. Worm
6
MODULE OF INSTRUCTION
3. Trojan
4. Spam
5. Adware
6. Phishing
8
MODULE OF INSTRUCTION
You don’t have to sign up every time you are asked to. To avoid
getting spam, weigh the benefits of signing up against the risk of
compromising your email address.
Fake prizes are probably the bread and butter of online scams. When
you receive an email or see a pop-up that says you’ve won something,
you can almost always be sure that it’s not true. As a rule, do not
believe anyone who tells you that you won a prize for a contest that
you didn’t join.
If you see a link that promises a prize or offers something that s too
good to be true, like a free iPad or ways to get free Internet access, it
may direct you to a website that has malware. As a rule, do not trust
any ad or message that says you’ve won something in a contest that
you did not join.
8. Install an ad-blocker
10