You are on page 1of 10

Cyber Threats & Cyber Ethics

CYBER-SAFETY THREATS
First, let’s talk about some common cyber-safety threats and the problems they can
cause . . .

Hackers
Viruses Hackers are people who “trespass” into your
Viruses infect computers through email computer from a remote location. They may
attachments and file sharing. They delete use your computer to send spam or viruses,
files, attack other computers, and make your host a Web site, or do other activities that
computer run slowly. One infected computer cause computer malfunctions.
can cause problems for all computers on a
network.

Spyware
Spyware is software that “piggybacks” on
Identity Thieves programs you download, gathers information
People who obtain unauthorized access to about your online habits, and transmits
your personal information, such as financial personal information without your
account numbers. They then use this knowledge. It may also cause a wide range of
information to commit crimes such as fraud other computer malfunctions.
or theft.

2
TOP CYBER-SAFETY ACTIONS TO TACKLE CYBER THREATS

1. Install OS/Software Updates

2. Run Anti-virus Software

3. Prevent Identity Theft

4. Turn on Personal Firewalls

5. Avoid Spyware/Adware

6. Protect Passwords

7. Back up Important Files


3
He CYBER-SAFETY AT HOME
 Physically secure your computer by using security cables and locking doors and
windows in the dorms and off-campus housing.

 Avoid leaving your laptop unsupervised and in plain view in the library or coffee
house, or in your car, dorm room or home.

 Set up a user account and password to prevent unauthorized access to your


computer files.

 Do not install unnecessary programs on your computer.

 Microsoft users can download the free Secunia Personal Software Inspector (
https://psi.secunia.com/), which lets you scan your computer for any missing
operating system or software patches and provides instructions for getting all the
latest updates.

4
CYBER-SAFETY AT WORK
 Be sure to work with your technical support coordinator before implementing new
cyber-safety measures.

 Talk with your technical support coordinator about what cyber-safety measures are
in place in your department.

 Report to your supervisor any cyber-safety policy violations, security


flaws/weaknesses you discover or any suspicious activity by unauthorized
individuals in your work area.

 Physically secure your computer by using security cables and locking


building/office doors and windows.

 Do not install unnecessary programs on your work computer.

5
How to Protect Yourself
DO NOT GIVE OUT THE FOLLOWING
INFORMATION:

Address
Phone #
Aadhar Card #
Birthday/Age
Other people’s information
School Name
Your Interests
What are cyber ethics?
• Ethics are the rules you use in life to help you
decide what is right and wrong.

• Cyber ethics is how you act when you are on


the computer.
Netiquette: using good behavior
in cyber space
Watch your language
(written language)

ALL CAPS = Shouting

Emoticons = Show emotions

Do not send angry or insulting e-mails


(This is called flaming.)

Always think about your audience


(all online communication
is public)
INTERNET ETHICS

• Web Pages
These items are all accessible by the general public.

• Blogs Everybody can read what you write.


• My Space
BE CAREFUL WHAT
• Face Book
YOU WRITE! Anything you post can be held against you in a
• You Tube court of law!

• Podcasts
• E-mail
Consequences of violating
Cyber Ethics

• Jail
• Fines
• Loss of internet
privileges
• Loss of your integrity

You might also like