Download as pdf or txt
Download as pdf or txt
You are on page 1of 84

MODULE 4

Empowerment Technologies – Online Safety and Security


“I think computer viruses should count as
life. I think it says something about human
nature that the only form of life we have
created so far is purely destructive.
We’ve created life in our own image.”

STEPHEN HAWKING
OBJECTIVES OF THE LESSON
• Be knowledgeable on online security and safety.
• Determine and avoid the dangers of the internet
and be responsible in the use of social networking
sites.
• Create an advocacy campaign promoting “Online
Security and Safety.
• Consider one’s and other’s safety when sharing
information using the internet.
KATIE’S STORY
•What is the moral lesson of the story?
•Do you share your personal
information online? Why?
•Is it right to entertain someone whom
you don’t know?
•Is it ok to send private pictures to
someone who’ve just met online?
• Can you trust everyone in social networking sites?
Why?
• Would you like to do the same thing as Katie’s
did?
• If you were Katie, would you report to some adult
what had happened to you?
• If you were Katie, what will you do?
The Internet is a huge part of many
people’s everyday lives. It’s fun, useful,
and informative, but can also be
dangerous, no matter how safe you
feel while browsing. By getting into the
habit of using good Internet safety
practices, you can protect your
information and your identity for years
to come.
SOCIAL NETWORKING

•Social networking websites and


apps, such as Facebook,
MySpace, Instagram, Viber,
Tumblr, SnapChat, Ask.fm and
Twitter have become incredibly
popular in recent years.
SOCIAL NETWORKING
•Most users are genuine, but
because it is so easy to hide
your real identity, it is possible
to come into contact with
people you would normally
avoid.
INTERNET SAFETY
it refers to the online security
or safety of people and their
information when using
internet.
THE RISKS (PRIVACY)
The internet offers you a lot of
freedom and this can lead some
people to behave in ways they
would not behave in public.
THEY MIGHT:

•say things on a status update / post /


tweet they would never say face to
face
•give out personal information about
themselves or others (including photos)
that they would normally keep private
A COMMON EXAMPLE
A young person tries to let their friends know about
their birthday party by posting the information
about when and where on their social networking
site. This means hundreds of people end up
knowing about the party and turn up uninvited.
The party could turn into chaos with people getting
angry and even refusing to leave. The police
would have to get involved to turn people away.
DANGERS IN
INTERNET
1. CYBER BULLYING

Cyber bullying can work in the


same way as bullying in the
playground; the victim feels
frightened and alone, while the
bully tries to hide from being
caught.
• Comments, images and videos about a
person can be posted online causing the
victim to feel frightened and upset.
• It is even possible for cyber bullies to hack
into the victim's personal accounts and
harass them from within their own user
profile.
• Often cyber bullies feel braver because
they can't be seen, but it can be the most
traceable form of bullying because there's
evidence that it's happened.
• But because bullies think they can cover up
their identity online sometimes people who
wouldn't normally bully might do so online.
2. CYBER STALKING

Harassment on the internet can


be just as frightening as other
forms of stalking.
•Women and girls are usually the
victims of this kind of behavior.
• They might be harassed by an ex-
boyfriend who is upset about the end
of their relationship, for example.
•It can also begin when a purely
online friendship turns sour.
• It can even begin entirely at
random, by one online stranger
towards another.
3. IDENTITY THEFT
The more information you make
available online, the greater the risk of
identity theft. It can be very tempting
to reply to an email or open an
attachment or post information about
yourself on social networking sites, but
you should never do it.
PERSONAL INFORMATION
INCLUDES YOUR:

• email address
• phone number
• postal address
• any banking information
• photos of yourself
THE CONSEQUENCES OF FRAUD CAN BE HUGE, SO
YOU SHOULD BE AWARE OF THE VERY SERIOUS
RISKS. IF SOMEONE STEALS YOU OR YOUR PARENT'S
IDENTITY THEY CAN:

• steal a lot of money


• commit crimes that could put you or your
parents in danger
• commit crimes that you or your parents could
get into trouble for
4. SEXTING
Sexting usually refers to sending and receiving rude
messages or videos of:
• naked pictures
• 'underwear shots'
• any sexual texts, images or videos
• These images or videos can be sent from a
boyfriend or girlfriend or a friend or someone
you've met online. You also may have sent a
sexual photo, video or text to someone else.
SEXTING CAN HAPPEN BECAUSE:

•your friends are boasting about sending or


having photos on their mobile phone.
•you want to fit in with in with friends
•you’re worried about being seen as 'frigid' or
'shy'
• you’re pressured to ‘prove’ your sexuality
• you’re harassed, threatened or
blackmailed into sending pictures
•someone keeps asking for things and you
feel that it's easier just to ‘give in’
•you’re made to feel guilty if you don’t do
what they ask
•you think you ‘owe’ your boyfriend or
girlfriend or
• you feel it’s ok because you’re in
love with the person and trust them
•you feel proud of your body and
want to share it with other people
•you want to have a sexual
relationship with some you have an
online relationship with
REMEMBER:
•There is no turning back once you press
send.
• Even if you use apps like Snapchat the
person can take a screen shot.
•You risk being seen as someone you are
not.
5. INAPPROPRIATE CONTENT
Beware of the sites you visit - the
internet has many sites featuring sex,
violence and drug abuse - and other
illegal activities.
•Often anyone can access these
sites, even when parental controls
are in place.
•You could be encouraged to view
them via content shared by others
on social networking sites.
6. ONLINE GROOMING

•is the term used to describe


inappropriate behavior towards a
young person, putting them at risk to
a sexual offence.
6. ONLINE GROOMING
• Pedophiles have been known to use this method
to contact young people by disguising
themselves as another young person. This can
lead to gaining the trust of an individual and their
friends. These false relationships based on lies can
often pave way for exposure to upsetting images
and online content and in some cases arranging
a meeting in person.
7. MAKING ‘FRIENDS’
•Friendships made online are made by
clicking a button rather than talking to
people and sharing experiences.
•Being online ‘friends’ with someone is
much less meaningful than face to
face friendship.
• You can easily fall out with an online
‘friend’ because of a misunderstood
comment.
•It is far easier, and healthier, to sort out
arguments and problems when you
can talk to someone face to face.
DANGER SIGNS
• If the person tries to insist on having your
address or phone number
• If the person emails you pictures which
make you feel uncomfortable and which
you would not want to show to anyone
else
• If the person wants to keep their chats with
you secret
•If the person tells you that
you will get into trouble if
you tell an adult what has
been going on
•If the person shares information with you
and tells you not to tell anyone else about it
•If the person wants to meet you and tells
you not to let anyone know
•If you find any of these danger signs it's
important that you tell your parents or
another adult.
OTHER TYPES OF INTERNET
USE E-MAILS, SPAM &,
PHISHING AND VIRUSES
SPAM
Spam is usually considered to be electronic junk
mail or junk newsgroup postings. Some people
define spam even more generally as any
unsolicited email. However, if a long-lost brother
finds your email address and sends you a
message, this could hardly be called spam, even
though it is unsolicited.
WHY SPAM IS A PROBLEM

•In addition to wasting people's time with


unwanted email, spam also eats up a lot
of network bandwidth. Consequently,
there are many organizations, as well as
individuals, who have taken it upon
themselves to fight spam with a variety of
techniques
WHY IS IT CALLED SPAM?

• There is some debate about the source of the


term, but the generally accepted version is
that it comes from the Monty Python song,
• "Spam spam spam spam, spam spam spam
spam, lovely spam, wonderful spam".
• Like the song, spam is an endless repetition of
worthless text.
PHISHING
•The act of sending an email to a
user falsely claiming to be an
established legitimate enterprise in
an attempt to scam the user into
surrendering private information
that will be used for identity theft.
PHARMING
a more complicated way of phishing where it
exploits the DNS (Domain Name Service)
system.
MALWARE
Short for malicious software, malware
refers to software designed specifically
to damage or disrupt a system, such as
a virus or a Trojan horse.
1. VIRUS
A computer virus is a program or piece of code
that is loaded onto your computer without your
knowledge and runs against your wishes.
Viruses can also replicate themselves. All
computer viruses are man-made. A simple virus
that can make a copy of itself over and over
again is relatively easy to produce.
THE HISTORY OF A COMPUTER
VIRUS.
• 1949 – A mathematician named John Von
Neumann proposed the idea of a self replicating
program which he described acting much like
computer virus in real world.
• But it wasn’t until the 1960s when a group of
programmers developed a game called Core
Wars not released till 1984. It replicates itself every
single time it was ran on a computer.
• In 1980s, the MS DOS was the most popular OS
that’s when a viruses starting to emerge. On 1988,
we had a Morris Worm for MS DOS which
affected more than six (6) thousands computers.
• In early 1990s, the advent of internet and email,
viruses were easier to spread. In 1999, the famous
Melissa virus W97M/Melissa executed a macro
within an attached file from an email.
• This in turn forwarded it to 50 people in the user’s
outlook address book. It also infected other word files
and then emails those out as attachments. Melissa
would be followed later that year by the Chernobyl
Virus, which caused widespread hard drive damage.
• In 2000, we had I love you virus, security researchers
were waking up to the scale of the problem
confronting them. It all started in the Philippines many
hours earlier when 24year-old Onel De Guzman
released a virus that he had proposed creating as part
of his undergraduate thesis.
• The key part of the virus was not any technical trick but
the wording of the subject line - ILOVEYOU - and its
attachment LOVE-LETTER-FOR-YOU. Few could resist
opening the attachment which kicked off the attack
code that then plundered their e-mail address list and
sent itself to every name it found.
• In 2000, many people did not have any security
software and even those that did only updated the
signatures of known viruses once a month.
• In 2001, we had the Core Red 1 and 2 viruses which
infected more than 700, 000 computers globally and
cost over 2 billion dollars’ worth of damage.
WHAT IS A WORM?
A worm is similar to a virus by design and is
considered to be a sub-class of a virus. Worms
spread from computer to computer, but unlike
a virus, it has the capability to travel without
any human action. A worm takes advantage of
file or information transport features on your
system, which is what allows it to travel
unaided.
The biggest danger with a worm is its
capability to replicate itself on your system,
so rather than your computer sending out
a single worm, it could send out hundreds
or thousands of copies of itself, creating a
huge devastating effect.
One example would be for a worm to
send a copy of itself to everyone listed in
your e-mail address book. Then, the worm
replicates and sends itself out to everyone
listed in each of the receiver's address
book, and the manifest continues on down
the line.
Due to the copying nature of a worm and
its capability to travel across networks the
end result in most cases is that the worm
consumes too much system memory (or
network bandwidth), causing Web servers,
network servers and individual computers
to stop responding.
WHAT IS A TROJAN HORSE?

A Trojan Horse is full of as much trickery as the


mythological Trojan Horse it was named after.
The Trojan Horse, at first glance will appear to
be useful software but will actually do damage
once installed or run on your computer. Those
on the receiving end of a Trojan Horse are
usually tricked into opening them because they
appear to be receiving legitimate software or
files from a legitimate source.
When a Trojan is activated on your computer, the results
can vary. Some Trojans are designed to be more
annoying than malicious (like changing your desktop,
adding silly active desktop icons) or they can cause
serious damage by deleting files and destroying
information on your system. Trojans are also known to
create a backdoor on your computer that gives
malicious users access to your system, possibly allowing
confidential or personal information to be compromised.
Unlike viruses and worms, Trojans do not reproduce by
infecting other files nor do they self-replicate.
WHAT IS A BLENDED THREAT?
• A blended threat is a more sophisticated attack that
bundles some of the worst aspects of viruses, worms,
Trojan horses and malicious code into one single
threat. Blended threats can use server and Internet
vulnerabilities to initiate, then transmit and also spread
an attack. Characteristics of blended threats are that
they cause harm to the infected system or network,
they propagate using multiple methods, the attack
can come from multiple points, and blended threats
also exploit vulnerabilities.
ADWARE

is the common name used to describe


software that is given to the user with
advertisements embedded in the
application. Adware is considered a
legitimate alternative offered to consumers
who do not wish to pay for software.
SPYWARE
A program that runs in the background without
you knowing it (thus called “spy”). It has the
ability to monitor what you are currently doing
and typing through keylogging.
FINANCIAL MALWARE

which is designed to scan a computer


system for information related to financial
transactions, are more common than other
types. One example is Cridex, a
sophisticated strain of banking malware.
INTERNET SAFETY TIPS:
•Never give out your real name
• Maybe use a made up name or
nickname on your profile.
•Never tell anyone where you go to school
•Make sure you're old enough to join.
• Maybe use an email address that does not include your
name.
• Always use a ‘strong’ password. That is, don't use any
names or words that someone might guess, like the
name of your dog or your favorite singer. Use random
letters or numbers and change your password regularly.
• Only meet someone from a chatroom in a public place
with one of your parents or another adult. If they are
genuinely who they say they are they will be happy to
do this
•Never give out your address or
telephone number
•Never agree to meet anyone from a
chatroom on your own
•Tell an adult if someone makes
inappropriate suggestions to you or
makes you feel uncomfortable online
• Never give out your password.
• Remember that not everyone online is who they
say they are.
• Think carefully about what you say before you
post something online.
• Respect other people’s views, even if you don’t
agree with someone else’s views doesn’t mean
you need to be rude.
USING SAFE SITES AND
NETWORKS
1. AVOID CLICKING ON SITES THAT
LOOK FAKE OR SCAMMY.
If you’re even somewhat familiar with the
Internet, chances are you can recognize
bad links when you see them: bad grammar,
popups, “click bait” headlines, or a false-
looking web address. Avoid clicking on these
sites and never download anything from
them
2. CLEAR YOUR BROWSING HISTORY
OFTEN TO MAINTAIN YOUR PRIVACY.

Many sites have access to your


cookies, small text files that record your
preferences and let sites respond to
them, often to show you more relevant
ads. However, cookies can also be
used by hackers as a way to get your
personal information
3. DO ONLINE SHOPPING ON
ENCRYPTED SITES.

When you’re shopping online or logging


into your online bank account, check
the URL to make sure it starts with “https”
instead of “http.” The “s” means that the
website is secure and encrypts your
data so it can’t be stolen
4. USE PRIVATE WIFI NETWORKS,
NEVER PUBLIC ONES.

Public WiFi—like the kind you might find at


restaurants, hotels, or airports—is often
unsecured, making it easier for someone to
hack into your computer. Only connect to
an unsecured network if you absolutely
have to, and be aware of the risks it could
come with
5. USE AN ANTIVIRUS EXTENSION
ON YOUR BROWSER.
For extra safety on the Internet, you can
download an antivirus extension to check
the security of a site or block pop-up ads
with viruses or malicious content.
Remember to download only from a
legitimate source, like the Chrome
webstore, to ensure that the extension is
safe.
6. INSTALL A FIREWALL TO PROTECT
YOUR HOME NETWORK

•A firewall is an electronic barrier that


prevents unauthorized devices from getting
access to your computer or phone. Many
computers come pre-loaded with a
firewall; go to your computer’s security
section to check if yours has one
7. KEEP YOUR
COMPUTER’S SOFTWARE
UP TO DATE

Most software updates come with


security upgrades, so it’s important that
you have the latest version at all times.
To easily download updates as soon as
they come out, turn on automatic
updates in your computer’s Settings.
STAYING SAFE ON
YOUR SMARTPHONE
1. ENABLE ENCRYPTION SOFTWARE
ON YOUR PHONE

Many smartphones come encrypted,


meaning that their software scrambles
your information so it can’t be accessed
by unauthorized users. To check if your
phone is encrypted, go to its settings and
click on the security tab
2. SET YOUR BLUETOOTH TO
“NON-DISCOVERABLE.
Although your phone’s Bluetooth isn’t as
easy to hack into as a wireless network,
hackers can still use it to access your
phone remotely when they’re in range. To
prevent this, set your Bluetooth’s default to
“non-discoverable” so you don’t pop up
on hackers’ radar
3. DOWNLOAD APPS FROM
VERIFIED STORES ONLY.

The easiest way for viruses to get into your


phone is through downloads like apps.
“Official” stores like the Apple app store or
the Google Play store can typically be
considered safe places to buy apps, but
you should never download one from any
other site.
4. DOWNLOAD SECURITY SOFTWARE
FOR EXTRA PROTECTION.

•For the most reliable smartphone


protection, you can buy a mobile security
package. These tools typically come with
a firewall and spam protection, as well as
GPS tracking to help you find a lost or
stolen device
TIPS TO COMBAT VIRUSES,
WORMS AND TROJAN HORSES
ON YOUR COMPUTER
1. KEEP THE OPERATING SYSTEM
UPDATED
The first step in protecting your computer from any malicious
there is to ensure that your operating system (OS) is up-to-date.
This is essential if you are running a Microsoft Windows OS.
Secondly, you need to have anti-virus software installed on your
system and ensure you download updates frequently to ensure
your software has the latest fixes for new viruses, worms, and
Trojan horses. Additionally, you want to make sure your anti-virus
program has the capability to scan e-mail and files as they are
downloaded from the Internet, and you also need to run full disk
scans periodically. This will help prevent malicious programs from
even reaching your computer.
2. USE A FIREWALL
A firewall is a system that prevents unauthorized use and
access to your computer. A firewall can be either hardware
or software. Hardware firewalls provide a strong degree of
protection from most forms of attack coming from the
outside world and can be purchased as a stand-alone
product or in broadband routers. Unfortunately, when
battling viruses, worms and Trojans, a hardware firewall may
be less effective than a software firewall, as it could possibly
ignore embedded worms in outgoing e-mails and see this as
regular network traffic.
PROTECTION AGAINST MALWARE

The standard protection from malware is


anti-malware — software tools and
programs designed to identify, remove
and prevent malicious software from
infecting computer systems or electronic
devices.
APPLICATION

Form a group with five members each.


Create a campaign materials promoting
“Online safety and security” using a hand
made poster.

Requirements:
¼ size illustration board
Plastic cover
Paint or colored pens
Any recycled materials which can be use to enhance visual effects.
• University of Southern Mindanao – Senior High School, Empowerment
Technologies, Unit 2: Online Safety, Security, Ethics and Etiquette

You might also like