Академический Документы
Профессиональный Документы
Культура Документы
Empowerment Technologies
Online Safety and Security
T
he Internet has become a part of our daily lives. The technology has become so
advanced that the average person can now access vast amounts of information and
communicate with people from all over the world using devices that can fit in his pocket.
In what is called the Information Age, the Internet has become not only a privilege but also a
necessity for many people.
Information Security
We usually need to submit some personal information in order to gain access to online
sites and services. These personal details are often required to secure our online activities and
transactions. However, in the wrong hands, our personal information can be used to cause
inconvenience, loss or even harm to us and other people. Here are some of the most
commonly shared personal details, how they can be used in dishonest and malicious ways and
what you can do to secure them.
Full Name
Almost every app and website with a log-in feature require your full name. Most of the
time, they just ask for it to determine how to properly address you in emails and personal
messages. Some sites, like Facebook, use it to label your account and online interactions.
What’s the risk?
Your name is probably the most widely known detail about you but it can still be used in
the simplest forms of identity theft. Anyone can use your full name to sign up and create a fake
account. This account can then be used in ways that may put you in trouble like posting
malicious content or leaving rude comments.
What can I do?
Just like in the real world, you should always be careful of whom you tell your name to.
In online, you can refrain from using your full name especially in apps and sites where they are
not really required.
Username
A username is an alias that represents your online presence. It can be your real name or
combinations that totally depend on your creativity. Some apps and websites address you by
your username instead of your full name. In many cases, your username, along with your
password are all that is needed to log in to your account.
What’s the risk?
In the Internet, your username is as good as your actual name. Therefore, anyone who
knows it can start looking for you or sometimes even contact you.
What can I do?
Like your real name, do not readily give out your username, especially with people that
you don’t trust. As a precaution, you can select usernames that do not include your real name.
2
Password
The password is one of the most important bits of information in the Internet. Basically,
it is a group of characters that, when paired with your username or email address, can unlock
your user account. For this reason, website and app owners have many ways to keep your
password secure.
What’s the risk?
For obvious reasons, hackers take special interest in people’s passwords. People tend to
use similar if not identical passwords for their online accounts so figuring out the password to
one account may also compromise the others.
What can I do?
There are several steps that you can do to keep your passwords secure:
1. Do not share your password with ANYONE.
2. Memorize your password. Do not write it down anywhere.
3. Do not use obvious passwords like important dates or names of you or your loved ones.
4. Use combinations of uppercase letters, lowercase letters, numbers and special characters.
Some websites require this but it’s a good practice to do so even if it’s not.
Tip: To prevent yourself from forgetting your password, use phrases that are easy for you to
remember but hard for others to guess like lines from a song or movies or phrases that have
personal meaning to you.
5. Do not use the same passwords for different accounts.
Tip: More specifically, do not use the same passwords for apps that are used for leisure
(Facebook, Instagram) and apps that are used for financial transactions (Paypal, eBay, online
banking)
6. Change your passwords periodically
7. Do not save your password when using public computers or other people’s device.
Tip: Web browsers commonly give you the option to save your password when you first log in
to some websites. This feature may be convenient when using your own computer or mobile
device but it can be dangerous if you accidentally save your password in someone else’s
computer or device especially if it is in a public place like a library or a computer shop.
Birth Date
Birth dates are mostly required to determine if you are old enough to access certain
contents and features in the Internet. Sometimes, it is also used in security checks to determine
if it is indeed the rightful owner who is accessing the account since birth dates are not usually
widely known.
What’s the risk?
The birth date, along with other personal details can be used to pass security checks
and hack personal accounts.
What can I do?
For your own protection, observe the age restrictions of online content. Websites are
required by law to add warnings to age-sensitive content but it is still up to the users to choose
whether or not to view them.
3
1. Virus
A virus is a program designed to interfere with your computer, device or network's
normal operation. A virus attaches itself in a program or a file and like real-life viruses,
computer viruses can multiply or make complete copies of themselves when you copy the
program or file that it is attached to.
What can they do?
Because a virus is a program, it can be programmed to do different sorts of harm to
your system. It can slow down your device or computer or network’s speed by running
unwanted processes or it can fill your computer’s memory with unwanted files. In the worst
cases, a virus can overload servers and cause entire networks to shut down.
How do they spread?
A computer virus can spread whenever a computer makes contact with another
computer. It can spread in a network like LAN or the Internet or through indirect means like
infecting a flash drive or a DVD. Keep in mind that a virus relies on human action to spread. It is,
therefore, possible to have a virus in your computer and still be uninfected unless your open
the file or program that it is attached to.
2. Worm
A worm is considered as a type of virus. Like a virus, it can make copies of itself in
computers that it comes in contact with.
What can they do?
Like a virus, a worm can harm your system in different ways which can range from minor
annoyances like hiding your icons or major damage like destroying your files or causing your
computer to shut down on it’s own.
How do they spread?
The main difference between viruses and worms is that worms don’t rely on human
action to propagate. A worm will automatically spread and copy itself.
5
3. Trojan
A Trojan Horse or simply a Trojan is a type of malware that disguises itself as a useful
and/or harmless program or file. Named after the fictional wooden horse used by the Greeks to
defeat Troy, a Trojan’s goal is to get through your computer’s security features and cause harm
once it’s in.
What can they do?
Like a virus, a Trojan can damage your computer or system in different ways, which
include but are not limited to deleting, copying and altering files. It can also cause harm
slowing down system performance.
How do they spread?
Unlike worms, Trojans cannot create copies of themselves. Instead, they pose as
harmless files or programs such as pictures or videos and rely on people to send, copy, and
download them.
4. Spam
A spam is an unwanted and unsolicited message/email.
What can they do?
Spam emails are usually just promotions to sites and services. Though not normally
harmful, large amounts or spam emails are annoying and can use up your memory space. It is
not uncommon to have hundreds or even thousands of spam in your email address. In the
worst of cases, viruses can also be attached to spam emails.
How do they spread?
People who spread spam or Spammers collect emails using several methods. The
easiest way is to simply guess email addresses though this process can be automated using
programs. They can use programs that search web pages for email addresses or by hacking
mailing lists. It is also known that some dishonest website owners sell list of their subscribers’
emails to spammers.
5. Adware
An adware is a type of malware that launches unwanted advertisements in your
Internet browser or your desktop.
What can they do?
Other than being majorly bothersome, adware programs can cause your system to slow
down because they initialize automatically and remain running in the background.
How do they spread?
Adwares are usually included in the installers of other programs or browser add-ons.
Installing these programs and add-ons will also cause the adware to be installed.
6. Phishing
Derived from the word “fishing”, phishing is the fraudulent practice of stealing
important information from users such as passwords, pin codes and credit card numbers.
What can they do?
6
Information stolen via phishing can be used in identity theft and stealing money. For
example, someone can use stolen credit card details for purchasing items, which will then be
charged to the real account holder.
How do they spread?
Phishing is done by tricking people into submitting their personal details. It can be done
by sending emails and offers that imitate legitimate businesses like banks and credible
websites.
How to Avoid Malware
The risk of falling victim to malware will always be present as long as mankind uses
interconnected digital devices. However, there are precautions that can be taken to minimize
this risk.
1. Install an anti-virus program
An anti-virus program can detect and delete virus in your computer. It can also block malware
before they infect your system. Many trusted anti-virus companies give out free versions of
their products. Try them and find one that suits your needs.
2. Do not submit your email address to suspicious looking websites
You don’t have to sign up every time you are asked to. To avoid getting spam, weigh the
benefits of signing up against the risk of compromising your email address.
3. Don’t fall for obvious tricks
Fake prizes are probably the bread and butter of online scams. When you receive an email or
see a pop-up that says you’ve won something, you can almost always be sure that it’s not true.
As a rule, do not believe anyone who tells you that you won a prize for a contest that you didn’t
join.
4. Don’t open spam emails
Spam emails are normally obvious. Delete these emails immediately and block the sender.
5. Do not click suspicious looking links
If you see a link that promises a prize or offers something that is too good to be true, like a free
iPad or ways to get free Internet access, it may direct you to a website that has malware. As a
rule, do not trust any ad or message that says you’ve won something in a contest that you did
not join.
6. Read before you install.
Sometimes even legitimate and useful programs come with unwanted “freebies”. These so
called freebies are often small programs that may alter your computer’s settings or
automatically subscribe you to unwanted services and newsletters. Read through the
installation steps to see if another program will be installed. There is usually an option to leave
out the freebies and install only the main program.
7. Do not download pirated contents
Because pirated files and software are unregulated, they tend to be a breeding ground for
malware. Also, piracy is against the law. (to be discussed in the next chapter)
8. Install an ad-blocker
Ad-blockers are browser add-ons that prevent ads from being displayed in your browser. Most
ad-blockers are free.