You are on page 1of 29

UNIT 3

OPERATING ONLINE
6 RISK TO DATA AND PERSONAL
INFORMATION

 Big data - large volume of information stored and


processed in the cloud.

 Information Security (Traids of InfoSec)


C onfidentiality
I ntegrity
A vailability
 Threats and Vulnerabilities
 Hacking - Refers to illegal access and abuse of
Computer resources.

 Hackers - Types of hackers


 White hat hacker (Ethical Hackers)
 Grey hat hacker
 Black hat hacker (Cracker)
 Phishing - is an attempt to obtain sensitive
information (Credentials) often for malicious reasons
by disguising as a trustworthy entity. (Unsolicited
email), Smishing (Smishing is a form of phishing that
involves a text message or phone number.)

 Pharming - Redirecting a user for a bogus website.


Fradulent practise of directing internet users to a
bogus website that mimics, the appearance of a
legimate one. (Defacing)

 DoS(Denial of Service) - is an attempt to a make a


machine or network resource unavailable to its
intended users.
 Malware (Malicious Software)
 Computer Virus : Replicates/copies itself without the user's
knowledge.
 Computer Worm : Self replicates, but do not need a carrier
program/document (host)
 Trojan : Pretends to be legitimate , but actually carries out
hidden harmful functions.
example : Keyloggers
 Spyware : a software/app that aims to gather information
about a person / organization without knowledge.
 Ransomware : Ransomware is a form of malware that
encrypts a victim's files. The attacker then demands a
ransom from the victim to restore access to the data upon
payment(Crypto currency - Bitcoin).
 Physical and Software enabled Security measures

 Physical Security measures


 Install Biometric Scanner (Facial, Voice, Iris/Retina, Fingerprint) for access
 CCTV camera
 Mounting racks in server rooms
 Burglar alarms

 Software enabled security measures


 Encryption
 Types of encryption
 - Symmetric (same key to encrypt and decrypt)

 -Asymmetric ( Two different identical keys , Private Key and Public Key)

 PIN, Passwords , Passphrase, CAPTHA and Security questions


 Firewall
 Antivirus guards
 Set File and Folder Permissions, Active directory services.
 Protocol

Set of rules governed during data communications.


-defined set of valid error messages e.g HTTP 404
-Encryption and decryption method
HTTP, FTP, SMTP, IMAP, POP3

Securing websites
 Protocols for data encryption
- HTTPS (Hyper Text Transfer Protocol Secure )
- SSL ( Secure Socket Layer )
- TLS ( Transport Layer Security)
SECURE PAYMENT
 Online third party payment processors
e.g
 PayPal,
 Google Pay.
 WePay.
 2CheckOut.
 Authorize.Net.
 Skrill.
 Intuit.
 ProPay.
 Dwolla.
BANK CARDS
 When paying online , you usually need to enter
the
 Card number
 Expiry date
 Name on the card/PIN/OTP(One Time Password
 Three-or the four digit card security code (CSC)
NFC (NEAR FIELD COMMUNICATION)

 NFC - Contactless debit card or credit card to pay


for things by waving it over the machine, without
using a pin number.
7 IMPACT OF INTERNET
 Internet is a network of networks.
 WWW is collection of websites; (service which
offered through the internet.)
 Economical
- Globalization ( Global village concept )
- Enabling of larger market coverage.
- Exchange of information anytime and anywhere (24
x 7)
- Growth in global investment
- Growth in global trade
- Enabling of higher quality products and services
- Drastically introduced new job roles.
- Widening of digital divide.
- Multilingualism
- Charge of Internet Service ( Fees based information
resources and services)
 Social
- Education system has grown by creation of new
job roles.
- Lack of job security
- Cultures are being affected.
- Lack of Anonymity ( Scams , Harrasements and
Identity theft )
- Computerisation of all daily routines will
compel people to be IT literate.
- Health and Safety issues.
 Environmental
- E-waste is a huge problem around the world.
- Environment's sheer amount of electricity used
to power up million of computers around world ;
tends to produce greenhouse gases.
 Legal and Ethical
 Copyrights (Intellectual property)
 Plagriarism - coping another individuals work,
gaining ownership.
 - Privacy and piracy
Cyberbulling - Manipulation sound-lipsing, photo
morphing, media manipulation
Hacking , Dissemination of Viruses Worms,Trojan
Horses, Spamming.
 Stay safe online

 -Keep Personal Information Professional and


Limited.(ZIP IT)
 -Keep Your Privacy Settings On
 -Practice Safe Browsing
 -Make Sure Your Internet Connection is Secure. Use a
Secure VPN Connection
 -Be Careful What You Download
 -Choose Strong Passwords
 -Make Online Purchases from Secure Sites
 -Be Careful What You Post
 -Be Careful Who You Meet Online
 -Keep Your Antivirus Program Up To Date
8 ONLINE COMMUNITIES
 Social networking sites
 Profile : Personal description of the account holder(
Biographical Details :Name , Gender , Age ) , Short
description, Contact Information, Details of Work and
Education, Profile Background theme, Profile Picture.
 Wall, Timeline
 examples
 Facebook - Friends --> Posts --> Status Updates --> Tagging
--->Rating (likes, emotions, upvotes and
downvotes), Comments, Notifications, Share
 Twitter - Followers --> Tweets --->@google
 Instagram - Followers --> Posts--> #Tagging
 Snapchat - Friends
 Linkedin - Connections-->Posts
 Online gaming Communities
 Multiplayer Gaming (example : Fornite) -
MMORPG's (Massively Multiplayer Online Role
Playing Games
 Examples:
Discord
Twitch
 Discussion Boards / Forums - Cheat Codes (Tactics),
Complete Guide, Status, notifications
 Online workspace
Ex: Microsoft Sharepoint
- Collobrate together for better results.
 Features
 - Chat rooms
 - Virtual meeting spaces (VOIP)
 - Cloud storages
 - Sharing of documents
VLE (Virtual Learning environments )
Ex : Moodle, Google Classroom , MS Teams

 Features
 - Wall
 - sharing audio, video and links
 - quizzes and assignment which will be graded
automatically
 - notice board, announcement of
courses(Notifications)
 User generated reference sites

 WIKI ( ex : wikipedia )

 Features
 - Login system - For users/content providers
 - editors,search tools and structured language.
 - Forums
 User generated Content

 Video sharing and Photo sharing ( Youtube,


Instagram, Flickr, Vimeo,Metacafe)
 Blogs (Web log) and Vlogs (Blogger, Wordpress,
Youtube)
 Social Booking sites
Ex : Pinterest, tumblr, Reddit
 Features
 User accounts
 Tagging and categories URL
9 IMPLICATIONS OF DIGITAL
TECHNOLOGIES
 Data protection ACT 2018
 used fairly, lawfully and transparently
 used for specified, explicit purposes
 used in a way that is adequate, relevant and limited
to only what is necessary
 accurate and, where necessary, kept up to date
 kept for no longer than is necessary
 handled in a way that ensures appropriate security,
including protection against unlawful or
unauthorized processing, access, loss, destruction or
damage
 Copyright
 Intellectual Property ( Software, Any form of Art )
 Copyright refers to the legal right of the owner of
intellectual property.
 Patent
 A patent is a form of intellectual property that gives
its owner the legal right to exclude others from
making, using, or selling an invention for a limited
period of years in exchange for publishing an
enabling public disclosure of the invention.
 Geoblocking
 geo-blocking is when content is not available due to
your geographic location

Sustainability Issues in ICT


 Contamination of underground water source by
erosion of soil by Electronic Devices with contain
Nickel, Chromium and Cadmium which are used as
landfills
HEALTH AND SAFETY ISSUES
 Health Issues
 Back pain
 Eye strain
 RSI (Repetative Strain Injuries )
 Canal carpal syndrome

Overcome
 Good posture and Ergonomic chairs
 Better lighting,Filters , Computer Glasses and regular

breaks
 Ergonomic keyboards/devices
10 ONLINE INFORMATION
 Search engines
 Google
 Bing
 Yahoo
 Duck Duck Go

 Algorithm – Keywords (Suggested search results)


 SEO
 Ranking of Website based on SEO factors

You might also like