You are on page 1of 70

Digital Literacy

Chapter 2
Staying safe online
Topic 2.1
Collecting data
 Online data Collection
 Internet/website Cookies
Play Time
https://www.youtube.com/watch?v=_zZ6dnW5Nic
How data is collected online
 Online registrations
 Online shopping
Is this site secure?
Cookies
What is a cookie?
1. Essential cookies
2. Performance cookies
3. Functionality cookies
4. Advertising cookies
What are the Cookies used for?
Cookies and the law

Cookie
policy
Activity pg. 37
Good Uses of Cookies Bad Uses of cookies
Topic 2.3
Danger Online
Cybercrime
Course Content
• Cybercrime and • Virus
cybercriminal • Trojan
• Cybercrime Methods • Ransomware
1. Identity Theft • Spyware
2. Phishing • Adware
3. Scamming
4. Hacking
• Types of hacker
• Test: What type of hacker he
is?
• Malware
Cybercrime and cybercriminal
• Cybercrime is any illegal activity done using computer or
a network.
• Cybercrime is criminal activity that either targets or uses
a computer, a computer network or a networked device.
Most, but not all, cybercrime is committed by
cybercriminals or hackers who want to make money.
Cybercrime is carried out by individuals or organizations.
• Rarely, cybercrime aims to damage computers for reasons
other than profit. These could be political or personal.
(www.kaspersky.com)
Cybercrime Methods
1. Identity Theft
2. Phishing
3. Scamming
4. Hacking
1. Identity theft
• Identity theft is the crime of obtaining the personal or
financial information of another person to use their
identity to commit fraud, such as making unauthorized
transactions or purchases. Identity theft is committed in
many different ways and its victims are typically left with
damage to their credit, finances, and reputation. Types of
Identity theft are
• Financial identity theft
• Social Security identity theft
• Medical identity theft
• Synthetic identity theft
2. Phishing

• A phishing campaign is when spam emails, or other


forms of communication, are sent, with the intention of
tricking recipients into doing something that undermines
their security or the security of the organization they
work for.
• Phishing campaign messages may contain infected
attachments or links to malicious sites. Or they may ask
the receiver to respond with confidential information
2. Phishing cont…
• A famous example of a phishing scam from 2018 was one
which took place over the World Cup. According to
reports by Inc, the World Cup phishing scam involved
emails that were sent to football fans.
• These spam emails tried to entice fans with fake free trips
to Moscow, where the World Cup was being hosted.
People who opened and clicked on the links contained in
these emails had their personal data stolen.
Scamming
• A criminal sends out an email that asks for money by different
methods. Email may contains a threat that you owes money and
will have to go to court if you don’t pay debt.
• They might get in touch by phone, postal mail, text, or social
media. Protect your money and your identity. Don't share
personal information like your bank account number, Social
Security number, or date of birth.
• It can also offer something at a very low price or ask for donation
• or tell you that your relative died who lived somewhere else and
has left money for you. You have to pay the transaction fee or
legal procedure fee.
Hacking
• Hacking means compromising computer systems,
personal accounts, computer networks, or digital devices.
• Criminals breaks into a computer. Usually to steal files or
Personal information.
• Hacking term basically was used for people use high level
skill to overcome a challenge or hurdle.
• In 1986 this terms was used for computer hackers when
computer became available to general public.
Types of hacker
• Black hat
• White hat
• Gray Hat
Test: What type of hacker he is?
Choose your answer

• White Hat
• Black Hat
• Gray Hat

Image From A Hacked Internet-Enabled Baby Monitor In A


Home In Cincinnati, Ohio Where A Man Was Screaming
“Wake Up Baby!” At A 10-Month-Old Girl
Malware
• Malware is a software that a criminal
installs on a computer.
• A malware attack is where a computer
system or network is infected with a
computer virus or other type of malware.
• A computer compromised by malware
could be used by cybercriminals for several
purposes. These include stealing
confidential data, using the computer to
carry out other criminal acts, or causing
damage to data.
Virus
• Virus spreads and infects files that it meets. Some of
them are harmless as they only cause pop up messages
other might destroy data or steal personal information.
Trojan
• In computing, a Trojan horse[a] (or simply trojan)[b] is any malware
which misleads users of its true intent. The term is derived from the
Ancient Greek story of the deceptive Trojan Horse that led to the fall
of the city of Troy. (
https://en.wikipedia.org/wiki/Trojan_horse_(computing))
• . A Trojan is designed to damage, disrupt, steal, or in general inflict
some other harmful action on your data or network.

• A Trojan acts like a bona fide application or file to trick you. It seeks
to deceive you into loading and executing the malware on your
device. Once installed, a Trojan can perform the action it was
designed for.
Ransomware
• Ransomware is a type of malware used to extort money
by holding the victim’s data or device to ransom.
WannaCry is type of ransomware which targeted a
vulnerability in computers running Microsoft Windows.
• When the WannaCry ransomware attack hit, 230,000
computers were affected across 150 countries. Users were
locked out of their files and sent a message demanding
that they pay a BitCoin ransom to regain access.
• Worldwide, the WannaCry cybercrime is estimated to
have caused $4 billion in financial losses.
Spyware
• Spyware is loosely defined as malicious software designed to enter
your computer device, gather data about you, and forward it to a
third-party without your consent. Spyware can also refer to
legitimate software that monitors your data for commercial purposes
like advertising.
• Step-by-step, spyware will take the following actions on your
computer or mobile device:
1. Infiltrate — via an app install package, malicious website, or file
attachment.
2. Monitor and capture data — via keystrokes, screen captures, and other
tracking codes.
3. Send stolen data — to the spyware author, to be used directly or sold to
other parties.
Adware

• Adware is unwanted software designed to throw


advertisements up on your screen, most often within a
web browser.
• Adware generates revenue for its developer by
automatically displaying online advertisements in the
user interface of the software or on a screen that pops
up in the user’s face during the installation process. And
that’s when you start seeing dubious miracle weight loss
programs, offers for get-rich-quick secrets, and bogus
virus warnings that invite your click.
2.3 Protect your computer
Anti-Virus Software and its
working
• Antivirus software scans your computer for malware and
monitors your system for activity associated with viruses.
Firewall
• A firewall is software or firmware that
prevents unauthorized access to a
network. It inspects incoming and
outgoing traffic using a set of rules to
identify and block threats.
• Firewalls are used in both personal and
enterprise settings, and many devices
come with one built-in, including Mac,
Windows, and Linux computers. They
are widely considered an essential
component of network security.
Firewall
How does a firewall works
• A firewall establishes a border between an
external network and the network it guards. It
is inserted inline across a network connection
and inspects all packets entering and leaving
the guarded network. As it inspects, it uses a
set of pre-configured rules to distinguish
between benign and malicious packets.
• Rule sets can be based on several things
indicated by packet data, including:
• Their source.
• Their destination.
• Their content.
Test: Which police women is AV
an which one is firewall

Firewall
Anti-virus
Using your computers safely
Test: What should we do

• You were surfing on internet


and this message suddenly
popped
Cyberbullying
• Cyberbullying is bullying that takes place over digital
devices like cell phones, computers, and tablets.
Cyberbullying can occur through SMS, Text, and apps, or
online in social media, forums, or gaming where people
can view, participate in, or share content. Cyberbullying
includes sending, posting, or sharing negative, harmful,
false, or mean content about someone else. It can include
sharing personal or private information about someone
else causing embarrassment or humiliation. Some
cyberbullying crosses the line into unlawful or criminal
behavior.
Cyberbullying places
• The most common places where cyberbullying occurs are:
• Social Media, such as Facebook, Instagram, Snapchat, and Tik
Tok
• Text messaging and messaging apps on mobile or tablet devices
• Instant messaging, direct messaging, and online chatting over
the internet
• Online forums, chat rooms, and message boards, such as Reddit
• Email
• Online gaming communities
Harassment
•Harassing someone is a
common method of online
bullying. Participating in
text wars or text attacks,
which occur when bullies
gang up on the victim and
send thousands of texts.
•Posting rumors, threats, or
embarrassing information
on social networking sites
such as Facebook, Twitter,
and Instagram.
Impersonation
• Change the target’s online
profile to include sexual,
racist, or other
inappropriate things.
• Develop a screen name
that is similar to the
victim’s screen name and
then post rude or hurtful
remarks while pretending
to be the victim.
Exclusion:
• It is the act of
intentionally singling
out and leaving a
person out from an
online group such as
chats and sites
Dissing
• Dissing refers to the act of a
bully spreading cruel untrue
information about their target
through public posts or private
messages to either ruin their
reputation or relationships
with other people. In these
situations, the bully tends to
have a personal relationship
with the victim, either as an
acquaintance or as a friend.
Photographs
• Cyberbullies may use photos and
images to cyberbully others.
• Posting embracing pictures on
photo sharing sites for anyone on
the internet to view and download.
• Sending mass emails or text
messages that include degrading
photos of the victim
Question
Posting rumors, threats, or embarrassing information on social
networking sites such as Facebook, Twitter, and Instagram is
A. Exclusion
B. Photographs
C. Harassment
D. Dissing

A B C D
That’s Right
Harassing someone is a common method of online bullying.
Participating in text wars or text attacks, which occur when bullies
gang up on the victim and send thousands of texts.
Posting rumors, threats, or embarrassing information on social
networking sites such as Facebook, Twitter, and Instagram.
Wrong Answer
Harassing someone is a common method of online bullying.
Participating in text wars or text attacks, which occur when bullies
gang up on the victim and send thousands of texts.
Posting rumors, threats, or embarrassing information on social
networking sites such as Facebook, Twitter, and Instagram.
Describe the picture
Intellectual Property
Intellectual property (IP)
refers to creations of the
mind, such as inventions;
literary and artistic works;
designs; and symbols, names
• Intellectual property (IP) is a
and images used in
category of property that
commerce. (www.wipo.int) includes intangible creations
of the human intellect.
(https://en.wikipedia.org)
Types of Intellectual Property
• Copyright
• Means we have the right to copy our work.
• Other people must ack permission before they can use it.
• It helps the copyright owner to control reproduction,
performance, adaptations, and distribution of the work.
Examples of such works are- literature, drawings, paintings,
songs, music, computer software, films, photos, web content,
etc.
• We automatically have the copyright of any work we create
• Like I have the copyright of this powerpoint.
Types of Intellectual Property
• Trade mark
• It protects brands.
• Under the law, a trademark is anything by
which customers recognize a brand or the
source of a product.
• A trademark offers legal protection for logo,
Credits: Legalwiz
design, symbol, phrase, wordmarks, or a
combination of those that represents a source
of goods or services.
Types of Intellectual
Property
• Patent
• Inventors use patents to
protect their inventions.
• A patent stops other
people form copying
and invention and
claiming it as their own
idea
Types of Intellectual Property
• Registered design
• This is used to protect designs like wall papers and
carpet patterns.
• Registered Design refers to the configuration, pattern,
or ornamentation which when applied to a product
gives the product a unique appearance.
• we can register a design but it must be new and
distinctive.
• The Coca Cola bottle, even without any text or
branding was registered in 2009 in Japan being the
first of its kind.
What could be the trade mark of
Cadbury?

• Their specific purple color


What copyright mean to us
• We can legally use someone's work if
• We have purchased their work like a game or music, they
will give us a license. Which helps us to know what we
can do and can’t do with the work
• The owner had given permission, he/she will tell us what
we can do and can’t do with the work
Software piracy
• Copyright theft is a type of cyber crime.
• Criminals make copies of music, games and films.
• When software is illegally copied and sold, its called
software piracy.

How does it effects creator?


Activity
• Copy an image of giraffe from internet and paste it in MS word file.
Creative Common
• This license is one of several public copyright licenses
that enable the free distribution of an otherwise
copyrighted "work".
• A CC license is used when an author wants to give other
people the right to share, use, and build upon a work
that the author has created.
Giving Credit
• Giving credit to the sources we used creating a text is important for
several reasons.
1. It adds to our own credibility as an author by showing we have done
appropriate research on your topic and approached your work
ethically.
2. It gives credit to the original author and their work for the ideas we
found to be useful, and in giving them credit it helps we avoid
unintentionally plagiarizing their work.
3. It gives our readers additional resources that they can go to if they
want to read further our topic.
How to give credit
• Credit includes these four pieces of information

Author Article or webpage title Website Publishing Date of article

• For the previous slide credit will look like this;


• Openoregon press books, Crediting and Citing Your
Sources,openoregon.pressbooks.pub/
Give credit for the picture you
have copied
References
• https://us.norton.com/
• https://en.wikipedia.org/
• https://www.ecomputerz.com/private-vpn.html
• https://en.wikipedia.org/wiki/Trojan_Horse
• https://www.kaspersky.com/resource-center/threats/spywar
e

• https://www.malwarebytes.com/adware
• https://searchsecurity.techtarget.com/definition/firewall
References
• https://www.helpguide.org/articles/abuse/bullying-and-cybe
rbullying.htm

• https://www.educationalappstore.com/blog/common-ways-
cyberbullying/
• https://www.stopbullying.gov/cyberbullying/what-is-it
• https://www.wipo.int/about-ip/en/#:~:text=Intellectual%20p
roperty%20(IP)%20refers%20to,and%20images%20used%20i
n%20commerce
.
• https://justcreative.com/copyright-patents-trademarks-registered-des
igns/
• https://openoregon.pressbooks.pub/wrd/chapter/crediting-your-sour
ces/

You might also like