You are on page 1of 10

MODULE OF INSTRUCTION

Online Safety and Security

The Internet has become a part of our daily lives. The technology has
become so advanced that the average person can now access vast
amounts of information and communicate with people from all over
the world using devices that can fit in his pocket. In what is called the
Information Age, the Internet has become not only a privilege but also
a necessity for many people.

Information Security
We usually need to submit some personal information in order to gain
access to online sites and services. These personal details are often
required to secure our online activities and transactions. However, in
the wrong hands, our personal information can be used to cause
inconvenience, loss or even harm to us and other people. Here are
some of the most commonly shared personal details, how they can be
used in dishonest and malicious ways and what you can do to secure
them.

Full Name

Almost every app and website with a log-in feature require your full
name. Most of the time, they just ask for it to determine how to
properly address you in emails and personal messages. Some sites, like
Facebook, use it to label your account and online interactions.

What’s the risk?


Your name is probably the most widely known detail about you but it
can still be used in the simplest forms of identity theft. Anyone can use
your full name to sign up and create a fake account. This account can
then be used in ways that may put you in trouble like posting
malicious content or leaving rude comments.

What can I do?


Just like in the real world, you should always be careful of whom you
tell your name to. Online, you can refrain from using your full name
especially in apps and sites where they are not really required.

Online Safety and Security 1


X.X Module Title

Username

A username is an alias that represents your online presence. It


can be your real name or combinations that totally depend on
your creativity. Some apps and websites address you by your
username instead of your full name. In many cases, your
username, along with your password are all that is needed to
log in to your account.

What’s the risk?


In the Internet, your username is as good as your actual name.
Therefore anyone who knows it can start looking for you or
sometimes-even contact you.

What can I do?


Like your real name, do not readily give out your username,
especially with people that you don’t trust. As a precaution,
you can select usernames that do not include your real name.

Password

The password is one of the most important bits of information


in the Internet. Basically, it is a group of characters that, when
paired with your username or email address can unlock your
user account. For this reason, website and app owners have
many ways to keep your password secure.

What’s the risk?


For obvious reasons, hackers take special interest in people’s
passwords. People tend to use similar if not identical passwords
for their online accounts so figuring out the password to one
account may also compromise the others.

What can I do?


There are several steps that you can do to keep your passwords
secure:
1. Do not share your password with ANYONE.
2. Memorize your password. Do not write it down
anywhere.
3. Do not use obvious passwords like important dates or
names of you or your loved ones.
4. Use combinations of uppercase letters, lowercase
letters, numbers and special characters. Some websites

2
MODULE OF INSTRUCTION

require this but it’s a good practice to do so even if it’s


not.
Tip: To prevent yourself from forgetting your
password, use phrases that are easy for you to
remember but hard for others to guess like lines from a
song or movies or phrases that have personal meaning
to you.
5. Do not use the same passwords for different accounts.
Tip: More specifically, do not use the same passwords
for apps that are used for leisure (Facebook, Instagram)
and apps that are used for financial transactions
(Paypal, eBay, online banking)
6. Change your passwords periodically
7. Do not save your password when using public
computers or other people’s device.
Tip: Web browsers commonly give you the option to
save your password when you first log in to some
websites. This feature may be convenient when using
your own computer or mobile device but it can be
dangerous if you accidentally save your password in
someone else’s computer or device especially if it is in
a public place like a library or a computer shop.

Birth Date

Birth dates are mostly required to determine if you are old enough to
access certain contents and features in the Internet. Sometimes, it is
also used in security checks to determine if it is indeed the rightful
owner who is accessing the account since birth dates are not usually
widely known.

What’s the risk?


The birth date, along with other personal details can be used to pass
security checks and hack personal accounts.

What can I do?


For your own protection, observe the age restrictions of online content.
Websites are required by law to add warnings to age-sensitive content
but it is still up to the users to choose whether or not to view them.

Online Safety and Security 3


X.X Module Title

Home Address and Locations

Some online services ask for users’ home address. Some apps
can automatically determine your current location using your
device’s GPS (Global Positioning System) feature. They do
this in order to give you location-specific contents and options.
For example, YouTube determines the user’s location and
suggests videos that are relevant to that area.

What’s the risk?


Carelessly sharing your location or home address can
ultimately compromise your physical security because it will
tell potential criminals where you are. Also, because it is
usually required information in online commerce like online
shopping, your home address can be used in identity theft.

What can I do?


Always check if a website or app requires you to submit your
address or allow them to automatically track you. If it is
required then check the settings if you can hide your address
and current location from other users. If it is not required then
don’t submit it at all.

Phone Numbers

Phone numbers are usually required by many online services in


order to have a direct line to their clients.

What’s the risk?


Home phone and mobile numbers should not be shared
carelessly since anyone who has your phone number has a
direct way to harass, threaten, or inconvenience you.

What can I do?


Because of the sensitivity of this information, very few apps
and websites insist on getting your phone number. Do not
submit your phone number unless it is absolutely necessary.

4
MODULE OF INSTRUCTION

Email Address

Almost every website that has a sign-up feature requires an email


address to confirm the user’s identity.

What’s the risk?


Like phone numbers, your email address is a direct link to you. The
practicality and versatility of emails make it the most used and abused
method of communication in the Internet. The most common forms of
Internet fraud such as spamming and phishing (to be discussed later in
this chapter) are done through emails.

What can I do?


You can create multiple email addresses. You can have dedicated
email address for leisure purposes like online gaming and social
media. This email can then be shared and used to sign up to apps and
websites. On the other hand, you can create another one for formal use
like job applications and schoolwork.

Financial information

This includes bank account names, account numbers, credit card


numbers and security details like pin codes and answers to security
questions. These details, especially the credit card number are used in
online commerce.

What’s the risk?


These details can be used to access your financial accounts. Therefore
anyone who has this information can spend or take the contents of
your bank account or make purchases that will be charged to you.

What can I do?


Treat this information with the same care as you do with your money
because they are as valuable as your money. Don’t do online financial
transactions with suspicious looking websites and merchants. Do a
background check to make sure that the person or website that you are
dealing with is legitimate.

Malware: Online Threats


These are some of the most common types of malicious software or
Malware. Keep in mind that while all of them can spread through the

Online Safety and Security 5


X.X Module Title

Internet, some of them also spread through offline means such as flash
drives and local area networks (LAN)

1. Virus

A virus is a program designed to interfere with your computer, device


or network's normal operation. A virus attaches itself in a program or a
file and like real-life viruses, computer viruses can multiply or make
complete copies of themselves when you copy the program or file that
it is attached to.

What can they do?


Because a virus is a program, it can be programmed to do different
sorts of harm to your system. It can slow down your device or
computer or network’s speed by running unwanted processes or it can
fill your computer’s memory with unwanted files. In the worst cases, a
virus can overload servers and cause entire networks to shut down.

How do they spread?


A computer virus can spread whenever a computer makes contact with
another computer. It can spread in a network like LAN or the Internet
or through indirect means like infecting a flash drive or a DVD. Keep
in mind that a virus relies on human action to spread. It is, therefore,
possible to have a virus in your computer and still be uninfected unless
your open the file or program that it is attached to.

2. Worm

A worm is considered as a type of virus. Like a virus, it can make


copies of itself in computers that it comes in contact with.

What can they do?


Like a virus, a worm can harm your system in different ways which
can range from minor annoyances like hiding your icons or major
damage like destroying your files or causing your computer to shut
down on it’s own.

How do they spread?


The main difference between viruses and worms is that worms don’t
rely on human action to propagate. A worm will automatically spread
and copy itself.

6
MODULE OF INSTRUCTION

3. Trojan

A Trojan Horse or simply a Trojan is a type of malware that disguises


itself as a useful and/or harmless program or file. Named after the
fictional wooden horse used by the Greeks to defeat Troy, a Trojan’s
goal is to get through your computer’s security features and cause
harm once it’s in.

What can they do?


Like a virus, a Trojan can damage your computer or system in
different ways, which include but are not limited to deleting, copying
and altering files. It can also cause harm slowing down system
performance.

How do they spread?


Unlike worms, Trojans cannot create copies of themselves. Instead,
they pose as harmless files or programs such as pictures or videos and
rely on people to send, copy, and download them.

4. Spam

A spam is an unwanted and unsolicited message/email.

What can they do?


Spam emails are usually just promotions to sites and services. Though
not normally harmful, large amounts or spam emails are annoying and
can use up your memory space. It is not uncommon to have hundreds
or even thousands of spam in your email address. In the worst of cases,
viruses can also be attached to spam emails.

How do they spread?


People who spread spam or Spammers collect emails using several
methods. The easiest way is to simply guess email addresses though
this process can be automated using programs. They can use programs
that search web pages for email addresses or by hacking mailing lists.
It is also known that some dishonest website owners sell list of their
subscribers’ emails to spammers.

5. Adware

Online Safety and Security 7


X.X Module Title

And adware is a type of malware that launches unwanted


advertisements in your Internet browser or your desktop

What can they do?


Other than being majorly bothersome, adware programs can cause
your system to slow down because they initialize automatically and
remain running in the background.

How do they spread?


Adwares are usually included in the installers of other programs or
browser add-ons. Installing these programs and add-ons will also cause
the adware to be installed.

6. Phishing

Derived from the word “fishing”, phishing is the fraudulent practice of


stealing important information from users such as passwords, pin
codes and credit card numbers.

What can they do?


Information stolen via phishing can be used in identity theft and
stealing money. For example, someone can use stolen credit card
details for purchasing items, which will then be charged to the real
account holder.

How do they spread?


Phishing is done by tricking people into submitting their personal
details. It can be done by sending emails and offers that imitate
legitimate businesses like banks and credible websites.

How to Avoid Malware


The risk of falling victim to malware will always be present as long as
mankind uses interconnected digital devices. However, there are
precautions that can be taken to minimize this risk.

1. Install an anti-virus program

An anti-virus program can detect and delete virus in your computer. It


can also block malware before they infect your system. Many trusted
anti-virus companies give out free versions of their products. Try them
and find one that suits your needs.

8
MODULE OF INSTRUCTION

2. Do not submit your email address to suspicious looking


websites

You don’t have to sign up every time you are asked to. To avoid
getting spam, weigh the benefits of signing up against the risk of
compromising your email address.

3. Don’t fall for obvious tricks

Fake prizes are probably the bread and butter of online scams. When
you receive an email or see a pop-up that says you’ve won something,
you can almost always be sure that it’s not true. As a rule, do not
believe anyone who tells you that you won a prize for a contest that
you didn’t join.

4. Don’t open spam emails

Spam emails are normally obvious. Delete these emails immediately


and block the sender.

5. Do not click suspicious looking links

If you see a link that promises a prize or offers something that s too
good to be true, like a free iPad or ways to get free Internet access, it
may direct you to a website that has malware. As a rule, do not trust
any ad or message that says you’ve won something in a contest that
you did not join.

6. Read before you install.

Sometimes even legitimate and useful programs come with unwanted


“freebies”. These so called freebies are often small programs that may
alter your computer’s settings or automatically subscribe you to
unwanted services and newsletters. Read through the installation steps
to see if another program will be installed. There is usually an option
to leave out the freebies and install only the main program.

7. Do not download pirated contents

Online Safety and Security 9


X.X Module Title

Because pirated files and software are unregulated, they tend to be a


breeding ground for malware. Also, piracy is against the law. (to be
discussed in the next chapter)

8. Install an ad-blocker

Ad-blockers are browser add-ons that prevent ads from being


displayed in your browser. Most ad-blockers are free.

10

You might also like