Professional Documents
Culture Documents
The knowledge of maximizing the user's personal safety and security risks to private
information and property associated with using the internet, and the self- protection
from computer crime in general.
HOW SAFE ARE YOU?
1. First Name
2. Last Name
3. Middle Name
4. Current and Previous Schools
5. Cellphone Number
6. The name of your father and mother
7. The name of your siblings
8. Your address
9. our home phone number
10. Your birthday
TIPS TO STAY SAFE ONLINE
1. Be mindful of what you share online and what site you share it to.
2. Do not just accept terms and conditions; read it
3. Check out the privacy policy page of a website to learn how the website
handles the information you share.
4. Know the security features of the social networking site you use. By keeping
your profile private, search engines will not be able to scan your profile.
5. Do not share your password with anyone.
6. Avoid logging in to public networks/Wi-Fi. Browsing in “Incognito mode”, a
feature of the browser will not protect you from the hackers.
7. Do not talk to stranger’s weather online or face to face.
TIPS TO STAY SAFE ONLINE
8. Never post anything about future vacation. It is similar to posting, “Rob my house at
this date”.
9. Add friends you know in real life.
10. Avoid visiting untrusted website.
11. Install and update an anti-virus software on your computer. Use only one anti-virus to
avoid conflicts.
12. If you have Wi-Fi at home, make it private network by adding password.
13. Avoid downloading anything from untrusted websites. You are most vulnerable in
peer to peer downloads. As the download is most likely not monitored by the site owner.
14. Buy software; do not use pirated ones
15. Do not reply or click links suspicious emails.
INTERNET THREATS A WEB THREAT
is any threat that uses the World Wide Web to facilitate cybercrime. Web threats use
multiple types of malware and fraud, all of which utilize HTTP or HTTPS protocols,
but may also employ other protocols and components, such as links in email or IM,
or malware attachments or on servers that access the Web
ROGUE SECURITY SOFTWARE
is a form of malicious software and Internet fraud that misleads users into
believing there is a virus on their computer, and manipulates them into paying
money for a fake malware removal tool (that actually introduces malware to the
computer).
PHISHING PHISHING
is the practice of defrauding users into giving up their usernames, passwords, credit
card numbers and other personal information. Phishing emails will often try to get
you to click on links that take you to fake websites; they often pretend to be from
organizations such as a bank, PayPal, Amazon or even Stanford.
SPAM
INTERNET SCAMS are schemes that deceive the user in various ways in attempt to
take advantage of them. Internet scams often aim to cheat the victim of personal
property directly rather than personal information through false promises, confidence
tricks and more
COPYRIGHT INFRINGEMENT
The use of works protected by copyright law without permission, infringing certain
exclusive rights granted to the copyright holder, such as the right to reproduce,
distribute, display or perform the protected work, or to make derivative works.
examples of copyright infringement
include
1. Downloading movies and music without proper payment for use
2. Recording movies in a theater
3. Using others’ photographs for a blog without permission
4. Copying software code without giving proper credit
5. Creating videos with unlicensed music clips
6. Copying books, blogs or podcasts without permission
7. Anything where you are copying someone else’s original work without an
agreement
CYBERBULLYING
Various websites on the internet contain material that some deem offensive,
distasteful or explicit, which may often be not of the user's liking. Such websites may
include internet, shock sites, hate speech or otherwise inflammatory content. Such
content may manifest in many ways, such as pop-up ads and unsuspecting links.
THINK BEFORE YOU CLICK
1. Before you post something on the web, ask these questions to yourself: Would
you want your parents or grandparents to see it? Would you want your future
boss to see it? Once your post something on the web, you have no control of who
sees your posts.
2. Your friends depend on you to protect their reputation online. Talk to your
friends about this serious responsibility
3. Set your post to “Private”. In this way, search engines will not be able to scan
that post.
4. Avoid using names. Names are easy for search engines to scan.
5. If you feel that a post can affect you or other’s reputation, ask the one who
posted it to pull down or report it as inappropriate.
WHAT IS NETIQUETTE?
the practice of netiquette depends on understanding how email, the Usenet, chatting,
or other aspects of the Internet actually work or are practiced
Type of Netiquette
Type of Netiquette