Professional Documents
Culture Documents
Lesson 2
• The internet has radically changed
the way people interact with the
world. They have accounts on
different online platforms; some
have unlimited Internet access, and
some are active users of the web.
Threats
1. Malware
• Short for Malicious Software. It is any program or file that is
harmful to a computer user.
• It is a software used or created to disrupt computer operation,
gather sensitive information, or gain access to private
computer systems.
• Malware is a general term used to refer to a variety of forms of
hostile, intrusive, or annoying software.
• It can appear in the form of code, scripts, active content, and
other software.
Usage of Malware
• Used primarily to steal sensitive personal, financial, or business
information for the benefit of others.
• It uses a network to send copies of itself to other computers on the network and it may do
so without any user intervention.
• It is commonly used to send junk mail and initiate Denial of Service attacks.
• Trojan horses are applications which appear to be useful, legitimate applications, but run malicious,
hidden code that can be used to remote access a computer system.
• Can be used to capture your logins and passwords, may result in changing desktop wallpaper,
creating pop-ups, or even deleting files.
– Ex. Keylogger – used to record keystrokes done by the user. This is done to steal their password or any other sensitive
information. The key logger software typically uses log file to store its recording.
2. Account/Identity Theft
• Many types of malware include keylogger functions, designed
to steal accounts and passwords from their targets.
What Malware can do to you?
3. Botnets
• Many types of malware also subvert control over the user's
computer, turning it into a "bot" or "zombie“ which is used to
execute a Distributed Denial of Service attacks.
4. Financial Loss
• If a hacker gains access to a credit card or bank account via a
keylogger, he can then use that information to run up charges
or drain the account.
How will I know if my system or device is infected?
• Your device is running at a slower pace than usual
• Your computer restarts on its own, then fails to run normally
• Applications are not working correctly
• You receive unusual error messages
• Appearance of strange files, programs, or desktop icons
• There seems to be a lot of network activity when you are not
using the network
• File names are changed or files are strangely modified (hidden)
Tips on How to Prevent Malware Infection
• This is done by sending you an e-mail that will direct the user
to visit a fake website and be asked to update his/her
username, password, credit card or personal information.
TIPS TO STAY SAFE ONLINE
• Be mindful of what you share online and what site you
share it to.
• Do not just accept terms and conditions; read it.
• Check out the privacy policy page of a website to learn
how the website handles the information you share.
• Know the security features of the social networking site
you use. By keeping your profile private, search engines
will not be able to scan your profile.
TIPS TO STAY SAFE ONLINE
• Do not share your password with anyone.
• Avoid logging in to public networks/Wi-Fi. Browsing in
“incognito (or private) mode”, a feature of the browser,
will not protect you from hackers.
• Do not talk to strangers whether online or face-to-face.
• Never post anything about a future vacation. It is similar
to posting, “Rob my house at this date.”
TIPS TO STAY SAFE ONLINE
• Add friends you know in real life.
• Avoid visiting untrusted websites.
• Install and update an antivirus software on your
computer. Use only one antivirus software to avoid
conflicts.
• If you have a wi-fi at home, make it a private network by
adding a password.
TIPS TO STAY SAFE ONLINE
• Avoid downloading anything from untrusted websites.
You are most vulnerable in peer-to-peer downloads
(torrents)as the download is most likely not monitored
by the site owner.
• Buy the software; do not use pirated ones.
• Do not reply or click links from suspicious emails.
Computer Code of Ethics
• Information stored on the computer should be treated
as seriously as written or spoken word.
• Privacy should not be violated. In case of academic use,
it is known plagiarism.
• Information from public viewing should not be modified
or deleted or inaccessible since these are considered as
destructive acts.
Computer Code of Ethics
• Intrusive software such as "worms" and "viruses" which are
destructive to the computer system is also illegal.
• Congesting somebody’s system with a lot of unwanted
information is also unethical.
• Sending obscene and crude messages through mail or chat is
also forbidden.
• Sending sexually explicit content, message or pictures is also
forbidden.
. Just like you are advised to say “please”
and “thank you” when you talk to others,
there is a special set of manners for the
internet users called Netiquette.
Netiquette in other word is network
etiquette, the do's and don'ts of online
communication.
The Ten Golden Rules Of Netiquette
1. The Golden Rule – Treat others as you
would like to be treated.
2. No Flaming – It is a personal insult
communicated through the internet.
Watch your posts or comments
3. Don’t Type in ALL CAPS – People may
misinterpret it because it means you’re
SHOUTING.
4. Do not Spam or Flood – Used in instant
messaging chat rooms by people who want to
disrupt the chat.
5. Don’t talk with people you do not know
– do not arrange to met anyone you have
just meet online.
6. Obey Copyright Laws – don’t steal
someone else’s idea, property, and rights.
7. Use Proper Grammar and Spelling -
errors diminish the credibility of the
message.
8. Be HONEST / Be Yourself – tell the
truth, do not pretend to be someone
else.
9. Follow the TOS – Terms of Service
rules and policy of the sites.
10.Be forgiving of other people's mistakes –
sometimes, you will see a stupid question,
unnecessarily long response, or misspelled
words; when this happens, practice kindness
and forgiveness as you would hope someone
would do if you had committed the same
offense.
• It is the use of works protected by
copyright law without permission for a
usage where such permission is required.