Professional Documents
Culture Documents
CYBER-SAFETY THREATS
First, let’s talk about some common cyber-safety threats and the problems they can
cause . . .
Hackers
Viruses Hackers are people who “trespass” into your
Viruses infect computers through email computer from a remote location. They may
attachments and file sharing. They delete use your computer to send spam or viruses,
files, attack other computers, and make your host a Web site, or do other activities that
computer run slowly. One infected computer cause computer malfunctions.
can cause problems for all computers on a
network.
Spyware
Spyware is software that “piggybacks” on
Identity Thieves programs you download, gathers information
People who obtain unauthorized access to about your online habits, and transmits
your personal information, such as financial personal information without your
account numbers. They then use this knowledge. It may also cause a wide range of
information to commit crimes such as fraud other computer malfunctions.
or theft.
2
TOP CYBER-SAFETY ACTIONS TO TACKLE CYBER THREATS
5. Avoid Spyware/Adware
6. Protect Passwords
Avoid leaving your laptop unsupervised and in plain view in the library or coffee
house, or in your car, dorm room or home.
Microsoft users can download the free Secunia Personal Software Inspector (
https://psi.secunia.com/), which lets you scan your computer for any missing
operating system or software patches and provides instructions for getting all the
latest updates.
4
CYBER-SAFETY AT WORK
Be sure to work with your technical support coordinator before implementing new
cyber-safety measures.
Talk with your technical support coordinator about what cyber-safety measures are
in place in your department.
5
How to Protect Yourself
DO NOT GIVE OUT THE FOLLOWING
INFORMATION:
Address
Phone #
Aadhar Card #
Birthday/Age
Other people’s information
School Name
Your Interests
What are cyber ethics?
• Ethics are the rules you use in life to help you
decide what is right and wrong.
• Web Pages
These items are all accessible by the general public.
• Podcasts
• E-mail
Consequences of violating
Cyber Ethics
• Jail
• Fines
• Loss of internet
privileges
• Loss of your integrity