Professional Documents
Culture Documents
Protect Your PC2019
Protect Your PC2019
‘acces to your computer Whe in they un a script that
‘splays a esth of useless normation onthe screen whist scammershave
inthe bacigound fey rn keylogpng andhacng sRwore | employed subtle
te cbainyourenine banking deals. They can even ask yo.
tologinte your bank connected tomakesure everyting
© Slow down,
ate of pene. Take a memento igure
‘0 whats rg on and doi alo ry hgh
‘ways and means in
which to baityou.
swotkng foro,
Cther common socal enginesng tacts inde emais
from 2 frend, who has been hacked, with the scamme
masquerading 9s them. It could be an email aiming to be
ftom your bank an urgetrequestor help or someone esking
for a donation to a chattable egansaten, Be wary, andDon’t engage
Never give your passwordRansomware
How it Works WwWjern Day Securit
Ala
Virus )
ite) oMiSs
1ks to moreingenious
recs
Tene ec eu
ned
PMR ska
Digital
peel
99
ices
destructive vin
Cereere
CereusAstorm Worm
3 Daprosy Worm
A
4 Stuxnet
A:
@shamoon @
7 CryptoLocker
10 Tiny Banker
A
8| >» Modern Day Security )
ting to think we've made up the words
Vishingand Smishing butin actual facttheyire
Whilst weve
It’s tem
Phishing,
all forms of social engineering sca
covered social engineering already, its worth looking
these three modem day threats individually
cial engineering the act
of getinginformation
oma person based
onthe humaninsinct
toreact helpor be entrapped
int some orm alse promise,
isn’tas made as the name
‘suggests Although the ter social
engineering’ isin actrelatively nen,
the process of obtaining sensitive
information froma victim hasbeen
‘round fora very ong time,
Social engineering.
fraud comesin
‘many guises, with
oddly sounding
namesand
‘methods. In th
66
Gone
Phishing
lend, the scammers
are after your data,
but what do these
ree in particular
Thedigta age of cous
increased theattacis anno
redevered Nolongerisa
iti beguledby post, now theyre
bombarded yf
sand ating foe clever
aguced mediums
tsbreakownthethreemain,
oder methods ofhow ascarmér
later obtain
{nd sertive formation: Phishing,
\shingand misting
4
wi
&
4
Phishing,
Phishing ithe stereo obtain
information oma potential
ttraughemai messaging
‘ample claimingtohavesome
‘money avalabeforyou orice
Includes indhiduas been
you,0r pretendingto be someone
youmay know thenaskingfor
Information Sir apshin
atackeancomein theform fa
Facebookseemingy endl tet
sch ar nam the top vet
about youraand tag ten fend
“The uniting ct i apy
revel her cat oft here they
‘verbo, pet
Inwrestingy there are also thee
«ferent phishing ype: Spear,
searphichi
iscesigned tospectcly target
indivi gateringinformation
re whereby the scammer
Clove pishingis an atacktypethat
uses a previously deere, eptimate
mail coraning an atachment at
with thedetalschangedand the
tachment swapped foraviusor
logget Tthe victim the ema
looterel since its laned rom area
emaiand when the atachmentis
openeditinects the
pute
hang hen a phishing ata
large seniorexcuthesct
company or ahigh- protein
orbusiness The tackisafnly
croeemal rob ares tats
rested to lookbusines he and
containing infomation
ompary rina.Vishng’s voice phishing using a
telehanecal tocommitsome
formofsocial engineering tack
Thevieim vil Weeerlained
previously eceve aca
legimatesoundingcallcerte wth
the peso onthetine claiming tobe
froma wel-unown computer lated
company. Usualythecallerillbe
ledtobelevethatthere'saiuson
theiccomputerothat sore fom
cofsecutyvlnerabty hasbeen
detected. The vil thenbe
pido a watt here thecaller
theiccamputer Once on thevitinis
compute thecallerlthen un
ascripethat wil play ream cf
data onthe screen dsigecto
cenfieandbaethevict nthe
meantime, hee secretly runing
eylogperin the background,
da ued the socalled sue
butaskyeu tologintoyour bark
to double-check als we Wiha
eyloggerin place, they canthen ee
yourusemame and passuerd on
theisceen afer which the a
snd st from yur accoun
iterate an automated cal can
sokyout enteryour creditcard
umber int the phone's eypad,
asisbeen pared as bengused
‘dsewhere OFcouseithas' but as
Soon asyouencer the deaistheye
recordeandyourcardcanbeused
bythescammers
( Phishing Vishingand Smishing @ Vishing and Smishing
i oth
Vishing Smishing
Smishingis an SS or of phishing
Inthese cases youreceivea tet Fem
asemingy legitimate sure, usual
yeurbaricorcrediteard company
butalointheform ofa carestiton
winner or somethingtee asking
‘en alinkforyoutofoliw. tien
estokes 2d cod you
Some smishing stacks wil skye
anaction auch 2eadelveryo
ame goods The tum message
is designed to cos:
withthe money go
Cone way ranethe each ofthese
scams are designed te baithe
iim, nee the ishing element,
‘shomephoneof he wording
‘The best defences toignore, delete
‘orang upon anything tharseven
soesnthncwifyau havea vis and
won tema youtor your
‘etalsarddon tbe tempted
lin anyFacebook games with
personal information nshor, be
‘Sawy aboutaingtechniques and
remainvigant. an~
Bw) Modern Day Security )
‘Whilst on the subject of homophones,
another recently added word to the
longlistofsecurtythreatsisPharming
Pharming falls within the online fraud
layer ofsecurity and althoughin realty Peat ee acd
its been around for as long as web Soon center
pages have, the methods of deception ‘and with the rise of connected
are continually evolving, F devices that offer Intemet
st ath ao
website and redirecting the victims toi
popubtonte tepargsore once we Harvesting
Toown high see bans The ci, unvore Time
that the web site i fae, a5 the front end apes
the real thing. even down othe smal print atthe
bottomaf the pag, wl login with thei ets,
99
[Aer the user has logged in several options are
‘alable to the ‘pharmer, They can collect the
weemarne and ogi details and simply leave the
vit with 2 blank web page; tis is wsualy a
rrethee used by an amateur pharmer or those
who want a quick username and password gab
before disappearing into the darkened comers
ofthe Interne. there they can recect the
\ctta the rel te where thaynesdto enter their
login det pan. The later is more cerning
method of paring, asthe vet rarely questions
‘ay the bank hs ashe forthe log crecenals
twice; they fen pt this down toa mistaken entry
contig.
Either way, the phamer now has 2 considerable
it ova usernames and passwords forthe bank
oF online shop they fake, which they can then
salvia the Dirk Web or use themseives How do
they the pharmer, et avay with ing able toda
th? Interestingly, there ae several ways in wich
someonecanfake alegtimate website
ic ogee Sees ane 34tae X http:// DNS x http:// Hosts —
Se ' hangenal heer EEE tougher rental
oe ete pute pounngeelThsesfers inte PME conpacrTretenstes ene
Sofaw can web prepared pharm
Aymara ete i
Bed you'e vsitingisthe eal one. Double pa antivirus
abate rae beast ee
youtowsinghasthecorect pling nd thatthe Someone wanting alte you Hostile. f possible,
elements ofthestearecorecty postioned andthe you can makeabackupofyourHossfileand
2% you havea goed
vse uptodate Adecer AVllstop any tempts by
logocfthesteyouteatisthe most ent occasionally restore tif you wantto
.
engl an
hove overthe ink an chackthat the tnsatd variono
adress matches the real eb te
utyouretempredto, _theactualaddes ofthe ste HTTPSisthe secre
P,thus prosicing authentication fhModern Day Security )
Windows 10
Security
Microsoft is often accused of developing insecure and ‘broken’ operating,
systems. However, what the Redmond company delivers isan easy to use
system that’s as secure as it can be without compromising its use. It. a
dificult balance to maintain and security can sufferin the longrun,
Security leaks, holes and flaws in
development code appear all the
time, for every operating system,
Windows 10 has the bad luck of
66
Windows 10
Security
Improvements
99
thetop of the security flaw
pile. However, hereare ten
lyasecure
Your device is being protected.Virtualisation-based
Security
ecu,
anisolated, restricted subsystem for securing the
(0 core data, Nothing unsigned by Mcrosotisallonedto be
Ince
Secure Booting
Secure Booting ules the new UEP (Unfed Exense
Fawr nea), th replacement forthe ober and more
‘wineable BOS, aang with Windows Tasted Bot cde
Inet aed ELAM ty Lach et Malware copies,
toprotcthecomputeressoon you poner itp,
ee Windows Hello
Windows Helo may seem tke a glamorous fate ther
than a secu feature butts eay ite an pressive
Iayerof protection, Helo supports passwords biometric
authentication methods, sich asia nd fingerprint,
together with 9 PIN code 0 hep protect sees 0
Windows10.
Microsoft Passport
Wiagows 10 uses the Meroso Pasipot sig sin on
_—__slton at sippors te open ROO ance sce
‘suthentation standard (wwaridoallanceor) and
ss cryptogaphicheyrt secure access toner
sndecal resources
Trusted Platform
_ Module
your computes has 2 TPM chip (Tred
(C7 Pratorm Medui), windows 10 can utise
{he ara cryptographic ey teen
{otk Passpor an Wind Hel 0
auttenteste te ser ard oper
‘stem wth oe, ear and
eet resources
ws 10 Security
Credential Guard
Widows 10 Credenta Guard protects the use
thentcation keys within the VOS
he authentication rice apt nto ada
stacks, stopping elope 2d athe wens om gang
Jeurlognarals
Device Guard
Windows 10 has odie Deve Guard 2
ighy secure
ould be
tool tat determines which prog sei
allowed to run on the computer ulises the VE
protect the core system fies and with lst of what allowed
‘nc nt allowed to runitcan prevent most malicious content
from beng executed on yours
Rolling Upgrade
Windows 10% unique method of vores now ensures
that he atest versons to software, tok and apptcatons
2 continually upgraded on the compute The new roling,
pyde proces as een idl red many asthe
‘0 optout fer upgrades aaiabie. On the fp ce, youre
shaysuprodae
Windows Defender
Security Centre
Windows Defender Securty Cente sian
Improve over previous versions ofthe sofware he new
FallcrentrsEdtlonvesien fess ensomware and
threat protection device eth, wal pceton, ope
andbroweerconel and family option all under te
nero
Protection Features
‘mong the aforementioned sacurtyeleents,
Windows 10 offers User Account Conte,
Kerberos demouring, Smarzceen, TPA
ey tettion, Adranced —Aucting
Setings, Mandatory Integrity Contos,
Vitual Smartcard, EMET enabled
protection and many more
Impressive protection features.
w
ayn Day Security
ell learning
ity risks
Whilst its all
about the di
every time you boot up
ter,often questions
can nanswered,
you
you
Digital
Sate rity
Understanding Security
asiand tya)
nantivirus | inatadous yes. ions
program? pseutiebtin Windows
PRT | idener ea ttelptect
D9 Bevcric terirtanarile
my germ. fe rescantucke tte
seeuntyrequred
on
canny
eee No, somry. Even legitimate website
mawareare cara
onlyon dodgy ssneatmsiatane
sites, if Remember too, a computer virus
99 J osraitcrina
~-———
6 y
banking safe? | coninialyerchingsecuity
99 ‘encryption methodologies. There's
ee
ee a
66 y
rachael Panesar
eee arecxties
es
99 Jie crecnantion ee
Wy gre Scie Sresyerace
Rete
—_—_:
66 ¥ vexthres rathing stoning
Keplieepe altos heat
ee ee See oe
(ES | et ea
an ice ae
—_threlne? | ined Heres besto spy
tethemyoulnow bey stire
cet
wi
Digital Security FAQ cH
Nostofthesecuntychangesyou
Doeshaving extra | "Hoot dont cot anything
i Justyoubengmoreawareand
security cost? knowledgeable about whats
GF | wrreonintemsotanorins
product, most ofthe beter tral
my gmt Sect sites costyo a
enualsubscrption,
oo
Sow oer toll Weeeeaaert eee!
eed to update \nisieocie nopeaion
pee Baeratcets
et ES ose toreertssons
99
bestindoadaiycheekforany
updates for both Windows ond ary
programs you regulary use,
oo
a
How dolknowif iow tentnan not itso 5500
something being sovervetsen2tlsiysobe>
offered is a Scam? —seanaisaretomoraoxrer
mm Teteatetinesthougaten
99 J seninecos arma tebe
s foreach smiths posble
before conmtngtoarting
———
66 Y
I think ve just
eu need oui mkesome
‘been: Sane changes: change your Windows
passed rformyoutbink that you
Hycuthinkyouve been scared,
BF details may be compromised, email
facies cas ese
my gg rcsiessineyan
tae
ns
6
Pe opened a scam t.<0's goo chanceyounay
emailattachment, hase avnssonyourcomputer
what do!donow? —coseaiopen prams, open
gam Windows Deere and dol
Seanatthesjtem farthing
isc Defender you
hated. Then considera
thir party Aue ard scan the
computer again.Protecting Yourself(INDEX
Protecting
Yourself
Peer hsee ere ae Loua arta serials)
know how to protect yourself against possible attacks. We look at the
Peano eee Acne eee
Pe EMail nde) ciation avs
ene Mitra oon ae ier unr oe
Poe eA rs Ma ONC Sah oe
and how to install and use one on your PC.
Ee cuus Ee ee
Er oar Cera) Pern cts ae
See Rew
Eran ace ny Preece
Ee
Peace rer
Emer ances
ieee
36 Kaspersky Total Security
Eee
Ere arse
Ere
so
C0 SSOP iret WEST (7M DEN ld
pM SE A eee sepa cet A as
SOs A oe LM On CMC RCo
CATR Oe ren)
em eeeBB Protecting Yourself)
Be Smart
We've looked at some of the many varied ways in which you can be compromised by a digital
attacker and some of the ways in which you can help protect yourself. However, it’s often more
beneficial to be able to recognise the signs of a digital security issue.
Weakest Links
Intermscf gal security, youre only asstrongas the wealestlinkin your security chan. Youcan tical the security bowes but fyou danthnaw what to
lookorin theirs place you'estll vulnerable
of abreachin
secutyisthesudden chang
password. canbe or arandom site webmail rj soreth
ith, Smetinesahacker tha leyoggein place ltt
CAND "2 s'esorstavccienloyanoie
pensve tems tocheckthe vai of2n
identi then your account could
accessingyour bnkyinhich caseyoureedtovrusscanyourPCimmedatey, &couttbeforempryngievault ait were Contact yourbarkinmediately
[SLOW PC
us istesicien slaving dno the crea yer.
weve, fyou nein ar eng eet
peranalnatvrehenjcuneedtlookatwberethatinrmationcouldbe _apetatngsystes,Windowsin particule dwn ove tine but youpaMer
ceingiom. Thedetaiscouldbeyurfliame, date of bith ‘upyourcomovteroneday anit noticeably slover than usual
etildenareven a een cident cu may have been invoked ith recemmend yourun avis sa
cent Mal
trashEres
fy
rr
Parra
101010 NAME ADRES.
01001010010101101001..
ri
(Be smart
Credit Card StatementBB Protecting Yoursel
Top Ten Antivirus and
Security Packages
Whilst the built-in Windows Defender isa great antivirus and security too}, it’s nowhere near
as capable as one of the many third-party security suites, The likes of Bitdefender, McAfee and
Symantec have years of security specialism behind their products.
Better Protection
tir party secur suit offers much more than virus canning, With one ofthese, you're covered against mos nota digtal threats ereareten
security suites worth considering you're sercus about your gta protection,
Norton Secunty remiumisthe top choiefer theme
ser rm Sante. Wthityau can pote p ttn PCs,
phones rtabes an tilleep yousale when shoppingarline,
gene sufingor conducting tansactons
ee Tota Protection fe
removaoryou getyourmeoney
‘ersons avalabeAntvius Pls, Total Protactonand Lives each has ts oun
garuar ws bul fle exalt secu features andbenelt
percent guarantee of vis ED lutions available rom Webroot,
srethree main \ebratintemet Scunty Completes the one forhome
sider ith you're protect omit ay threat a el
secure online chudsorage
Wer
'BROG
Ou o) yay
TOTAL
a
Lona
i CompTop Ten Antivirus and Security Packages cl
Kaspersky’ Total Secuity2018isone ofthe best ESET Internat Cyber Secunty sa comprehensive protection
products vaableonthemarke ls eatalu for package lr every ers toes one banking proton,
oney anders superb protection lr your PCandther devices. You get sles formaicousatemtstocontrolyaut webcam ard afine ued balance
parental corils secure password storage encryption andidentiyproteion, between sect and pricy
allinasingesecunty ute
DEED 22 eo roeisonoce cur
cre pedis ret Secy en Prete as we or tahasts neyo anianach
rs Avast
Tia) ni Sing
cE ead
«a
RTTEEEED Trecticcobsumumsecurtyoffestistate
jsoftintemet Security is an award winning security protection for upto ve diferent igwith
sutethatotfes plenty of gest eaturesanc elements its eended proteconforchicen,ntemetpassacrds nd acy on aca
quick, easy tous costefectve and does aneselentjob at protecting yeu medasies i's great valuefr meney ard pafoms excel,
‘dour devices rom moder securty test.
ensisort EMSISOFT
2
DS st—B) Protecting Yourself)
Bitdefender Total Security
2018 Review
Bitdefender is regarded as one of the best antivirus and security companies in the world. Its products.
have won numerous awards and have been proved time and time again to be efficient and effective
whilst offering cutting edge technology.
The Ultimate Protection
‘Ther'salotto offer rom tdefender’s Total Security 2018 t's one oftheleading secur suites available and iit as possibly the best total protection
pachagesinthe word. Let se whatithasto off.
Tota Security 2018s tdeender fapship product and ofr comprehensive
secuity packages fr Windows, macOS and Android users all under a single
‘web pra. Pricing dos ater slighty depending on that special deals maybe
‘nalable but expect o pay somewhere in the region of £5993 fora sgl yar
leaner uptofve devices
‘what do you get for your mene? Wil, defender has upped the ante wth
regzrsteitspotecton suite; nt ane tact a company with a lang
afareadyprovidingtheleaingsecurtysuitonthe markt, Total Securty 2018
is quik 35a instal anc easy to understand, with he unboxing installation
and acompleesystem scan aking no mere tha halfan hou
ost ofthe problems with modern secury sues i the heavy intlace that
cares withthe pacage. A modem suite must exclude a weath of element to
‘make i even lightly competitive in an aad setrated and quite agressive
‘matketpiace. This in tn creates an inerface tat often to clutered, and a
litle overheming forthe newcomer defender though has managedto bing
together a clean and sles setup, wth the most prominent features avaiable
withjusta cick ora couple ofchcks ofthe mouse
Natural you can dig much leper into the cetings electing predtined
proflesand meres, or tweaking thecore to ther ighten the security,
‘wthautcompromsngthe aval defences ortightenngeveythng
UuptoanalmeetNSt levelofsecurtyclerace,
res paced flo teresting and ust exes, some of whieh
you never thought you'd appreciate unt yeu actually had
them to hand. For example, the winery scanner wil
hunt down any misig Windows updates, sues wth
F security and even weak passwords. Integration with your
browses excllent to, ofring clearly dined een ticks
nesta searchreltsthetafeclased ae sae tov. inchaing
integration with Facebook. You can alo set up.
for les that you wantto mark se uta private a
from ay pyngeves.
You can command everyting from the Bitdefender Contra
Activity Dashboard, which espa the curent subscrition along
with the tas of your Bitdefender istaled devces, plus alent,
reports and soon. ia simple interlse that hogps the stuf you want
to ee prominent, whilst genty iting the Geeper information that only the
‘more aonced user maybe interest in viewing, Ofcourse, should anything
Uuntowrd happen to ay af the Btcetender installed devices then you receive
the appropriate waring teresting, shuld yeu activate the parental fetures
ETD 9:00:10 5015 0000
Bitdefender Total
Secury 2018isone ofthe
best/and protection
products avaiable tay”
onanyotthed
sted sts andseca
thedashboard lint youofyourchielsonineacvity,
dia behaviour
Ransomnare handled by an ivdependent module that reques acthtion
butonceenabed automaticaly protects len your Documents fle, th
the optonto include other foldersto. Ary attempt to et one these protected
files eaitsna message appearing which you noe to conf the action. Ths
males increasingly cfu for rancamnare ta tart enexypting and messing
round wih yourvalued data
(n top ofl the super features though, the excelent scaring engine. The
Befender scan is quick ard does’ slow your compute down while being
ache nthe bacgyound or whileconducinga ilsstem scan.
Inchod,fyoueinthemaritfora complete nd fly estuedsecury ste, then
Bkfender Total ecurty 218th oe you should mast deftly corse.defender Total Security 2018 Revie
‘Oneofitsmany splendid feturesisa The scam
vinerabi that informs you offi
‘Once installedBB Protecting Yourself)
Kaspersky Total Security
2018 Review
Kaspersky was one of the first security companies to offer the end user a cross platform AV
protection suite, some years ago now. Since then the company has improved its products hugely
and now produces one of the leading security suites available.
Next Generation Protection
‘There are alotof features oike about Kaspershy Total Secu 2018 al of which help younet ony be protctd ram whatever outhere but also help you
manage yoursystem better
Kasper Total Security 208 isthe mega reduc ofthe companys AV and
protection utes er home uss fs eseraby peed at rund £2999 er one
deve onda yar subscription, rsingtoa maximum of £109 fr five devices anda
two sbseripton, Obviously pies can change depending on what eas ae
curren avalateo check the Kasper webs forthe atest guide
che the Blender entry, Kaper has gone
‘an easy tose and simple to understand nterace Whit, agin he Blender,
Youre ale ta delve deeperint the ner workings, the serge user enna
bewildered by page upon page of techical jargon cans and submenus ts
hardy t that eventing stars om te Kaper aloe poral, where yu can
dowioad your purchased sofware, alongside rales fr otber modules, that
eventually allude the smecotacentreumbrala
at engs to pride
Thefortend categsesthatarevaloblevia theconvokcentrace can, Database
‘Update, Sale Money, Password Manager, rhacy Protection, Backup and Restore,
Protection for al devices ad Parental Convo Mos speak or themes and
eat se explanatory ower, components sich as Safe Money are Privacy
Protection deserve alte moe expaning,
Safe Money uses Kasper unique protection engine, whereby your
nine vansactions ae sey behind the product’ secur web, Tis
Featuetaescarecfprtecingsoushopgngasivellasonlnebankng,
soit animpresive weapon nt akeody ample Kaper aren
Pracycoersarareetieretfeares Trscompenert protects
you when suring guarding your ene iderty ard inom,
‘wile ao actively Hocking malious websites and preventing
“fospesky Tota Security
any for of racking or mentor, also includes an element ‘Dotdbone ofthe eodng
that locke any atom to access your computers webcam, aaa
hichiscersin hand fst wilaapreventary ater erie tees
tones yourstored data hist youbroneethe tee
Needless ta sey the features alable are certs impresshe
Beyond thee we've mentioned abo, there are alo cons
to improw browse secu, protection for ary coud aces,
a vlnebityseaner and a tuted application mode tht vill
ny allow witested programs tobe ected. You can cate 3
Raspes Rescue Disk, which youcan boot fom shouldsonethngever
peng. alwhng you to=canandclean yourcomputer without tneding
tates Wincor The et gnesonand covers about eventhingyou wold
‘ant fom anallencampassing secur site
Intermso speed of operation, and the prance hiton the stem, Kaper
Total Secu 2018s bouton pa th tat of Bender. Ado tas
vectog sr oe
fetstcompleingailystem scan aceender ie but onl/aminutecrsoout,
The prfrmance Pitan the sm sng, in fot youl be hat pressed
notice any negative impact oncethe sobre sinsaledandcontrualy caning
‘ne last component worh mentonings the Parental Cont fue With this
Raspes of method of heping cicen safe whist they wse the devices,
‘ou can ceate usage sched, GP safe zones and receive rotations shoud
anything suspicious atempt to access your childs device when they using i.
jon there are lo les toston chien acoessng adit sites cr sitesthat
redstubingcortent,
spo Tta Secu 2018 animpresve rod ad one thatthe home ser
cancer fe canfiderabout quick eto use regulary updated and ticks
althe right bos om the point sew ofa use pent and semaone who vnts
tomate sxethey'eas secure as posible onthe mene ene.(_ kaspersky Total Security 2018 Review cl
cas a eet
6) ==
(ER) rte rein oad =a .
ae a a
Sas Patents
ae ep eerene ee
peer ae cues
a
ta
Fees
6 interfaces uncluttered
6 oOo @ ae
rere—B) Protecting Yourself )
McAfee Total Protection
Review
The name McAfee has been synonymous with antivirus and security since the late ‘80s andis
considered as the granddaddy of the computer security world. Its latest complete protection
package, Total Protection, has a lot to offer the end user, as you'll soon see.
McAfee For Consumers
cafes now apart of ntl Securtyand as suchits backedby the latest generation of hardware level security 2swelasitsavard winningsoftware
scanningengne.
The name MeAice has seen some interesting press over the lst decade, not
{ust fr te secury stare fl but ao with regaes to news repr on he
‘company fund, John Molise, The funder clu ese ae, MMe
Total Protections singularly imresse ste ef tools The cost isi higher
than the prevous enti, orcad a £7298 er 9 one yer Suro, Howe,
conehighihted tures the Vis Protection ld, hereby ou get youroney
brckshould ce not be ableorernowea vrsthat ready on you computer
irswothmentoningatthesnualssbscrtionsudesinsallston onanunbmted
umber of dees which carainly woth cnsdtg if yte one of the many
ream hele tht uns counties eet conactec cei compte
‘renthirginbeten isan ecelentchoceferthehomeusa, thou dou
Installation ard the ntl ul stem scan wee slower than that of Brdelnder
‘ancl Kaspar but ony by abou ve mints. yale constantly in ah you
‘may want to consider the ae suites; ower, most uses lle satisfied th
theresul rom Mee. ast ges youtime to make acupof tea whist youre
wat the scant frsh
Just as vith the other products wee coke at, the inetace is imple to
Uundestand and navigate, wth thecore andmostusd,uncionswthnessy
reacholthe mause pier the mote advanced apis are neat tucked
nay ortho ho arate rmexekroniedgable about such things
Inshor, works wal aed hee the wath of aalable option 3
by unt the wserrequss then Neds oy the seins are
Cees allowing the advanced user a higher dee of conto
ce the way the sate of tools wos within the sytem its
instal on,
alc’ thee ter appreachto stom protecton is worthy of
renin oo. Fist, the caning technology does a thrcugh,
fnetoothed com inspection of the es on the tem,
Hexic ara then takes ov, mentoring behaviour of
fle functions and evn cade iepection to check fr possble
unknown viuses based onthe way they work. Last, anting
that even remotely suspicious autzmatially uploaded tothe
ese Glob Theat teligarce Lab for ana, Should the code
rave w bea nev frm ofr, then he tam hind he impressive
seurng lb wl ceate ax and push Raut to theater to hundied
ralon pus NeAfoe users ts note ging 3 compute sits but task
wth cee ou cane assure that yourmisotuneishepingethes
The Password Management sures an intresting addtonto the McAfee suite of
took inet ites Tue Key Secu component, tichathoug not pears
veces one
top ofthe esau of password management programs, does beast 2 multifactor
_uthertication process nado, you canst individual True Key password fr
allmember ofyour fami yptafve uses.
Arvongthemuttudeoeturesyoucanfind le Lackan intrsingacdon This
animpressveeneypsion mechanism atiocksyourflesbeirdanimpenexabe,
rita gade encryption wal tsnotactated by cau hichisundestandable
as encryption does ila wih ta higher evel of sr knowles, and nat
somettngthe average user wll immedatsy consider adopsing when sett up
ther comptr secu,
Perfrmancewse, weve akeady mentinedthat Makes somewhat owerthan
Ihatofdelener orkaspesybutas with the other enesyou wortrotieany
prcthabl dowdown nthe computers option vith tinal Mee Total
Protection does an excelent abot eeping you Fle and personal infomation
safe when online ard wih is added fates i certainly worth loking 3a
peaterdepth
BON ai
TOTAL
eaIE
|
|
|
|
= |
I
= ss See eee
ad tise oimproveyour security
when ol
McNeessimpe to use, updoteand
‘monitor Pus the akied bonus of
unlniteddvice installation san
luring factor”
“The scomning isnt os quickes
the othergroducts we Velooked
cotbutitScertainlyasefective”
#4 tome
© rn
Exch Files a—B) Protecting Yourself)
Setting Up Windows 10
Security
Before we dig deeper into the many levels of Windows 10 security features, it’s worth taking a
moment to check that the intial security features are in indeed up and running, and doing what
they're supposed to.
Are You Secure?
Remarkably, desitehaving an antivirus entitled some usersarenteven aware ofthe default Windows 0 secu features Here's aquickten step
processto check everything sworkingasitshould,
BREED sib cicsngertnewindowsstar Buton orpessngtte
Windows yan yourkeboord Ente secu et the search bor
and ick the fst pon hat ppeasin the ests, ecunty ata Maintenance
Fiters
settings
YF Check security status
@)_ Change security settings
‘on the Secu section to expat ial the optonswthin the Scant
‘ton shuld be dplayingOn, wth heexcesion of nene Secunty Stings
hich wildly OK
Should anyoftheoptonsdepty No, then youl ned ta check
thesetingrelaingtothat pacar lature. For example your
User Aacount Conta UAC) sett Off clk the change Setings rkunderthe
UAC option. The other Features can be ound via sec Fen the Windows
Stan But
{Uc wil wamyouof ay atempttoacressasjstem cial lef
anymahre wants tare then you ached you ant to
TEP 4
proceed: obvcusly youdont, oyu can say no and investigate theisue Thee
‘arousing fo chaz fom bu the second step dav om theoClose down he Security nd Maintenance window then click the
Window Start Button and sarh fr Dende Click suiting
Windows Oefender Security Centeoptin,
& 0 ®
riers
Search suggestions
PD defender -see web results
Hyoute natusing thie party security and Aste hen you
eect ke sue that Winds Defence isaac and
working There are numerous options aval nthenew ack restr ion
Windowsupdate of Defender Eachcanbe selected witha mouseclckand
viewed separately
'* Your device is being protected.
Clckthe Virus & Theat Protection option. Thisill open anew
window alloningyouto perform Quicker Ful Scanotthe
‘stom that deals the number oftratsfound and thenumber cf fles scanned,
0 Vins atest protection
6
Setting Up Windows 10 Security cH
Ifyou cick the Vius& Theat Protection Setings option you
can further opto improve the system protection. Make sure
thatall he sob options ae set tn and sro owt define the programs
delaulotiicatons
= ius & treat protection stings
Returning the main rus & Threat Protection page, youcen
cliche eld icon rom herp ta the leo ceenthen
‘lckon the vanced Scan in cat under the Quck Scan button thin ate
options torun Ful Sjtemscan a Custom scan (fa netweklocation or
‘rape or an Ofna cn,
Advanced scans
ae
‘oe ee .
Oyounsencresn
ere ener
Sipe pan ioutenctumng sce ey
‘rote maeseathe ete on Pt Fels ston ths
preci spon foment son
. (0 Frewall & network protection
18 inte ee nt
aeProtecting Yourself _)
Why Updating is Important
Continual updates, rebooting after an update has been installed, then the inevitable second reboot,
straight after the first to apply the update: it’s little wonder people stray from the regular update
checks. Whilst it can be pain though, keeping things up to date is a top priority
Update, reboot, update, reboot
Updates may wal beth banecfthe modem computer use butthey are therefor reason isnot the ea anymore wend those updatestohp
poet our scat Here are ensonswiy they enor
ice
sinbybedenpes roars ence | ED ender nd itsother secu
Your device is being protected.Why Updating is Important cH
‘Toctpardthelastreason theWindows
Frowallsone ofthe fst ayes ofsecurtyon
yoursstem With accessta your computer for another sources mnitored
and exe bockd, topping potent treats before they even ithe vius
‘efencelayer Updates mae sure thatthe Frevals upto scratch thejob,
i Firewall & network protection
IesnetjuttheWindowscarflesthat equee
regular updates, you use Mires Ofiee that
canbe patofthe overall Windows 10 update scale There ae
‘uherbtesn OFceto, which when exploited can allow malicious code in
the sjstam, Tick the Give me updates brother Mcescf products borin
Windows Updates Advanced Options.
© Advanced options
oso pat inte
Dseeynmnemmey nits eta
swells Ofc, Mires provides baselvel
Ctevestormostotheharcare alable ony,
‘Thesedvers are sgned andere sal, oanynew peceof hardware
installed wilwoand ill beste accoraing tthe driver preection engine
Boe
¢9imolam sexe
'Non-genuine copies ef Windowshave been
athominereset sidesince ilgal fe
sharingon the nteret gained popularity. Theseday theact of dmrioading
something illegals rampant. Windows 10updates ensure that you're using
genuine copy ofthe OS, which il ultimately secure you PC against heats
Irom pated copies,
TS ence)
genuine
Microsoft®
software
crest has big plansfertheutreof
Windows 19 iSoten mertined tha this wil
bethelastfullesion ofthe OSasthey ll be running Windows asa service
‘sc oppoeed odiferentvesions vertine. This means illbe constant
update octet addingorerovngof features Updates ensure youreruning
thelates versions
gM Windows 10
LL ERS sauter
See Ueiztesrotontypatch anyvulertily,
they can akofreeup syste resources by
improving te cose andtreamliningthe avalable resources a shor, four
‘omptrisperfomingtete, hen can easly hance background is and
thet scans tout affecting whatyoute doingProtecting Yourself _)
What to Keep Updated
and How
Discussing updatesis one thing but how do you go about making sure that you have the latest
updates and that al the necessary components are being updated correctly? Thanks to the
improved update process of Windows 10, thisis surprisingly easy.
Keeping Up To Date
‘Witt 35 toupdate wedows 1, there are lamnts thatcanbe missed. Weve aeady mentioned thats ton Wndowsthat needs updatingbut
alosofareand cre
eevhats already been update clckngthe Updatehistay inkunder fem. hist ia grand idea, there ar conc ove
pate bt facorsof te community. ls your dice bt we preter ths option sflcs
BB Open NVIDIA Control Panel
Check for updates
Update notifications >
_nw0ia contro Panel
FI the tciaGeForetpeence allows yout improving
sophics and checkfor teats ces, Usual thsi done
aber, Hone, you want—B) Protecting Yourself)
How to Secure Your
Web Browser
‘The web browser is possibly the weakest link in the entire security chain. It’s the software product
that's on the front line, the one that will inevitably bear the brunt of any Internet attacks and as such,
attackers focus a lot of effort on making the browser a portal into your system.
Safer Surfing
Seung webbrowser sto dieu. Thee are plenty fopons aval nein some thieparty ae onsyoucanse improve seu Fr
tisutorot weeusng Crome
With the anced Syne Setings bax oper, selec the pon for
Eneryptalsynead data wthyourovnsin passphrase Ener a
yaseyoucanremembern the bows
Tspewalyrconmerdestioespreccwcrengs MBBS cst aucr tesargs poe once ie
Googe ihscan eaty npr be one Shon hones Te rescore are
ikon the Aone Se Seng baton tet a
eos ‘enettige_[ Gee borg ct
Guop one may we web ice mney bong epee eum te
vcs ase
eos
zona aon dtc poe ety crt Cagle
yd ae tc ad mh oo Gos
vectog sr oeContent Settings allows greater degree of contol over Cookies,
naScipt Fash, Pop-ups, your computers microphoneand
ceventhevebcam Itsanertersiveist so we can nt altheoptions win
‘slime space. For maximumsecury, sable JavaScript and Fash and
-makesurethemicand webcam are protected too,
Clckthe Done button when you fished with Content
‘Sets to return youtothehrome Settings page. Within
Prac stl ensure th st option, Sera "Do Not Track request sted. This
vill top any tacingeleents om monitorgyourbrowsrgactites.
i
Gouge Chron may ee web ever morveyourbreweng eperece Yum
eres eaatt
Leese top rcv nngiton no
1, ee pectonsence they compete sence on ped inte ae
hice en ela pain ly
Aone pert pei sect odes Gage
Pot andy om angst
ea et aca pring rae
(D Aomacy sn ge sis an cash poste Soe
1 Senda -Do ot aa mgt thou being ate
_ustunderthe prevoussteptck box tS also recommended to
unc he to Passwords ara Formsowes that oferta enable
‘Aufl and Save your Passwords whist i'sapainto constant enter
passwoads,tswilsopanyhjackChrome aac rom galing your wserames
and passnords
iad
Paensorde and forme
fri Ait outa mina sige cick Mage tg
Of team your wes panna Mange more
How to Secure Your Web Browser cH
LUnderthe Downloads section san ides to ckthe box sk
‘where ta sve each le before dounleadng Again this can bea
bitef pain forthe user however stops malicious background dowrioads
from inlectingyour sytem, ging you more contol and the ability to stop
the procs.
Downloade
tenon)
At whre tose fe oe domain
Tothelet ofthe Chrome Stings pageyoucan seins for
tensions Setingsand About; ickthe tren ink Wehthe
"tensions page pen scl down othe bottom and clckthe Get More
‘etensionslink
With the Chome Web torelaunched va theEstensions ink,
Search or Adbock Plus. Wien the results cckon the Ald to
Chremebtton an fist opton for Ablock Pus This wins an adverts
blocer within Come, ecrngyou Fem any thea rom internet advertsing
Do tesameforBlur(ananttackingadd-on and HTTPSEverywhereWHAT IS
AEM LaeAe ee a
providing you various content:
Le eC
Cee
ee oa
Unlimited satisfaction one low price
Cheap constant access to piping hot media
Protect your downloadings from Big brother
Safer, than torrent-trackers
18 years of seamless operation and our users' satisfaction
RET tro
Team AAs
ol Tesi cy
AvaxHome - Your End Place
We have everything for all of your needs. Just open https://avxlive.icu—B) Protecting Yoursel
How to Secure Your
Home Network
We've mentioned previously that an attack doesn’t always come from the other side of the globe
but can indeed be alittle too close to home at times. Home network hacking is possible with the
simplest of tools available on the Internet, often even just tapping into a cable.
Network Protection
Without being too paranoid ts remarkbly easy to et into aneighbourshome network. you vein ablockof fats or youuse powerine adapters yournay
reed to consider thesetenstpsfor better network protection,
Themosteommonentryconttogsinaccess — SNSNEEREED :<2nbea psinbutty dsabing DHCP on yeurouter
tour nets vthe route Therouter adopting frst addresses vey deve that,
from yurl$P may welbeolsingthelotestfomsoferenptonbutitécesit connects taaDHCProuter wl econean IP addess By eiminatngthatyougetto
taleageniustotrawlte essreputablesectonsofthenemectoobtanalstof spec theadessrange avalabe i's natfeo|proofbutits wath considering
ge de dealt usemame and password to acest ere inet
ry Nestrutsthesedyscomewithafomot
athencaton ale IAC eda ees Cod)
desiring Every netwertable device computes, tablets gamesconsce, ee
omevith aunque WAC adres The tenga yeutoentrthe WAL AccordngtoTstnaves2013 Global Securty Report,
‘eee oly des, soon they cn be usedon our Canyon manyhome networkhacks areconduted when the
Se househelisanayor seep. Thileaves the hack wth ample oppetunityto|
steal tard and view es younayhaveon ative. Te short. sive
solution stopover ofthe router at nit andifyougn out forthe dy
or
Se *
ID 9:00:19 5015 0000rc
(How to Secure Your Home Network
Powotine adapter atean exert ‘Saringresourcesandfies from one computerto
resourelerconnecingvires anotherisperfectivinebut consider shangless you
networkdevcs. without alinglenghsofcablearoundthehome Hever, __Iveincloseproximityto others. Once ahackerhas ined access your
Prefrencesopion inVitualBox
1
1
i
iv
ee eee eee
it
iil
ye
proecvourrc: QE>
a) Advanced Security Tips)
Create a Windows 10
Recovery Drive
Since Windows 95, Microsoft has offered users the ability to create a recovery drive, which is used to
help troubleshoot a Windows PC that is failing to boot, by presenting various options. If you haven't
done so yet, you ideally should have created a Windows 10 recovery drive.
Time to Recover
‘Youneed an 868 USB crve minimum, inorder to succssulycreate a recovery dive. tips thecontents off the diveand you wort be abletouseitfor
anything ele so make ure itslabeled and storedina safe plac.
proviinayou
(oselct thedestnation tot
Vins has discovered
Select the USB ash dive
‘edema dati aden nthe ane bese
ied
Click Cea covey vera act the URC SFB ne cnplewshnhr thre itonposstie loco he
hatposun Fe rs thetonto Tete Fos hatemor tn epasbldtaten able
anynpat ferecveydhe deresietbelsial _mlewrabalyuiesdeinge cones elayourecoety de Men
recovery options. Ths a gocideaastcan place theseviaflesin beevest _ youYeredy.cen the Ned buon.
laboot laure CickNetoconinue
- ‘ict
Cielo recovery de
terug rrten ttt Soe (a eee2
ate a Wind:
ws 10 Recovery Drive
The recovery drives ready‘Advanced Security Tips)
How to Back Up
Windows 10
Even with the greatest possible cyber protection in the world guarding your computer, there's still
a chance something could go wrong. it ight not even be malware-related; a broken hard drive or
other component can cause as much grief. Therefore, you need a good backup.
BackingUp
omputrsare ungredtabl beasts 0 youre toma sur that all oul and important tare securely backed pandmoreimparart, youre
etree thar casi Thalys stighornad process.
i one
Backup
Back up using File History
Back up your fle eather rive and etre hem the orgs
rele damaged o eet
BERD worms mbecnesono pnts
clk Ncethat an omaayback wy fl suchaFrombere,clickon the More Options link that's under the switch
baton tis ill open the Backup Options corsle Tissecton
details thebackup schedule, telecaton and which fier il be included n
thebchup andr hawiong Windows il etainyour backed up es
=
STEED '30uscolldonn though the wackup Options corte youcan
se thatthe ene your zr fldervthin Windows 1Dhas
been added by dealt. Ths indesthe Musi and deoslders, swell a8
sarees, Camera Rl, Contacts, Favours and 00,
© Bacup options
ital oncraceetcanpulonttonpoats
oyun season nso Ecue yen he
cet. det wet Sack ers ee eA
folderon the Ecude tes folders icon tenpcktheleldertoexlue and cick
the Chooethisoderbuto,
(_ How to Back Up Windows 10 ci
\henyore read startbackingu,youcanclckthe Backup
rnowbutton othe tepo the Backup Option console window.
ematvey you ean waitforanhaur ante ceau schedule Kicks
(bu depencngonthesiteaftheflesvthin your back alder: this
‘culd ale somatine
The backed up files wl bested onthe chasen backup dive,
‘ihn federal Fiesty. nse tha oder be the
spcticusr folder of you use ile istry backups for move than aneusey,
thar usernames sta here oo,
BRAD siting cceperino te folder layers reveals more default
fede, containing important XML data that Windows wee 2
slorethechosen options Youcan fg the actual lesthat have Deen Backed up
inthe Dealer aid outinthe same elder sructureason our syiemie.C>
Users> Name> Documents et5) Advanced Security Tips)
How to Create a Windows 10
System Image
Backing up your filesis perfectly fine but in the event of having to wipe your hard drive and start
again, getting everything back in order can be time consuming, However, creating a system image
means you can almost instantly restore the entire system without needing to rebuild Windows.
System Imaging
_Agjstem image works in much the same way as the VitulBox Snapshots. You essential taking snapshot of your entire system, which can then be
restored quickly. Saving you having to reinstall Windows 10, al yourprogramsand data,
‘This lasnchanew
onze, Maroc ha
etn compatbily supporter backups dave ud
Tothelettheearetwolinks.cickanthecretea
vaglink
nd Retre (Wino
Providingyou'vemetthe requirements yout
shee thestem magecanbewtenta. A
solution when teomesto restoring the image but oucan 9
depends onthesize ofthe image asto ha many DvDsyou ned Youcan even
A comennennneForthis example, lets useaninterna secondhard dive Make
surethatthecrrect crieltcould bea igh apacty USBstckor
‘en potable USS hard cre sees thenclcktheNewtbutton to continue.
“The next window wil display the drives that aeincluded in the
ste imaging process In this example the dv, thet
‘hve ond the Syste Reseed potion arto be bachedup. Whenitcomesto
‘estonngthe sem youtineedboth partonsfor Windows LDtobe ableto
boot upcomect
a
‘When you" ready o continue cick the Start Bachup button
‘Thiswlbegntheimaging proces hich can take some ime
ependingontheamountofspaceusedon the C\ dive and thespeed ofthe
deyoulewstngta locate ample te fyouewtingto ND,
1 une anpten ge - Ea
nde sng em
— =
ecing Ch
i=eeT |
How to Create a Windows 10 System Image ci
‘Oncetheprocessiscompeta, Windowswilaskyouto creates
Sistem Repairs. Thiscec il alow youtebootrtathe
eitonment where you are abletolaunchthesystemimage restore.
‘steap| Oo you want to create a system repair dsc?
Wermund atu cite» stem ea oi tsb
YoussnTtoes nove aon a oe tn epar
nbenedtresmane yor conper anda coe een
‘eveyone
Dee oI Se
jster9 ) ‘you lick Yes to creating the System Repair Disc youd to
rmakesureyouhavea blankDNDt hard Falowtheen screen
instucions an cckon the Create Dscbton to bum therepalasto these
‘Soul you ned to restore Windows 10 Fo the system age,
yucan boo nt the System Reps Dis and selec the Stem
Image covery option rom thin the Advanced Opionsofthe Trouble Shoot
‘mer Fol theinstuctonsand win minutes Windows 1 illbebackasit
‘asuienthesystemimegewas taken,Advanced Security Tips
Extreme Windows 10
Lockdown Tips
There are numerous ways and means to greatly improve Windows 10's security and privacy.
Precisely how secure and private you want to get is purely down to you. You can opt for better than
average or through these tips below, absolute extreme security.
Windows 10 Security: The Paranoid’s Guide
Ifyou'e fanatical about securing Windows 10 and locking it down tothe point where the NSAwould be mpressed, then follow these top ten extreme
lockdown
ED ero"
= a
accoFPR o:pendingonthe apeolyourcomputer it parsbetocrestea
boot pave the BOS. You need to cna your
‘otherboard manual asta to accompli thst you con set passed
forbeingabietoboctinta your compute (bere Windowseven stats and
geting the B10
Pree
Consider instaling several aon to your bowser toimpravelss
securty and prevent any unwanted data miners or oguesipts
frombeingevecuted, boc Pus, Bur, Ne Sriptand athe examples
secure your browsing sein
B trackers blocked
Mobil ap: Backup & Sync
NOT installed
on
1 | ai
CECE epriar
BLUR
Ze)
‘sings He 2.Premiye
Fash and Java are superb entry points for malicious code to infec
your computer andor snoopingof various personal settings and
lta. Oisabingbots Java and Flash gevent ay suchbaccoorsbutlimit
sourbrovsingemperence nsomestes
(_ Extreme Windows 10 Lockdown Tips (cs
Enexyptngyouristale hard drives and anyextealdecesyou
uses anevcllent ayo securing your data ad lacking dwn
irda 1, Whistitcan be inconvenient, you canbe saein the eon that
yl data isvitvallyunhachabl by allbutthemiltary supercomputers.
Normally you use aval email accourt tologints Windows 20a
anacvated Mecozok coat Hower, consicesetingupan
siemativeaccount hati inka oyou That way:
lowotherso.ceswon'teontan any persona daa,
y dataset indows
Fake Email Generator with your domain
Use Vitual Machine within Windows 10 tocenduct your day to
day bromsingand online work The could be Windows 100
‘oreven adopt more ecueenvtanmentsuchasone ofthe bigher-endecunty
versions Lnu Ether way, a iil bear move secure than Windows 1000a) Advanced Security Tips)
Strangeasit may sound, beingableto answer
‘questions on cyber security helps expand
your understanding of the subject. Plus
it's a good way to test your knowledge
and see how much you've taken in so
far from this book,
Cyber
& Windows
Quiz
Answer Then,
These Questions Ten
rity and Windows security
ut enaugh to make you think and
tof igital security and privacy
Theyre nat too cfu
considerthe whole as
Whois itokay
to share your
passwords with?
99
6
Question: 02
True or False:
when on public
WiFiisitsafe to
send confidential
orpersonal
information data?
i. 92(44
Questic
Which of these is a Phishing attack?
>
‘Sending someone an email that
contains a malicious link disguised as
valid email.
Creating a fake website that looks
identical to a real one, in order to trick
users into logging in.
Sending someone a text message that
ore cor rd
Question: 06
>
>
>
>
Which of the following
Passwords s the most
pe
ThV%6100°Vx!
LetM31N
123456
(Cyber and Windows Qui ci
66
Question: 08
Which of these methods
of browsing is the most.
secure?
HTTPS
Private browser mode ao
VEN cou poumpy
Tor eran
Ais Nah
Question: 10
How often should you
review your Windows
security and updates?
Once a month
‘Once aday
Once a week
Once only, just after
installation of WindowsAdvanced Security T
‘eee:
eae eA ae
What's more, you
= 9 _) rt iS Promenseoe
Pee eC ent Toras
Say urs
Oe Ee re oa Te an
DOR a mg ean
aur te ern Seems ate TH i
digital age, some stand out as either remarkably fortuitous or ep inthe pac ae rh pa a6 J
Be MUR uA ec cnet Xs ole ate cata
Cee mR crear en ge ta the night, but Here is
march more. Computer
Bee a ne aR ae
is dove to your data. and trot
Oe a eo arses
ene 99
jeg Be seme rere, oe
government
to protect your
: ae 7,
sila cae Ue 5 Seen
asking a peeping por nr ene ees
A We ate ese aes a TYE
i to Te j ESE
VIATeeWMeUALeS Rec reeey errer ns
99 ee(44 4
B® No serious commentary
CR ect neg OSL
aN ee eee
Ey ant ar Legere Na a aa a)
a ae EA eee
eae aL a eas 99
‘Spokesman, Information Technology Association of
‘America, Business Roundtable, AP, May 19, 2004,
dil Ce aed
See
Bi
Vi
@® Phishing % a major problem
rcalckataed eamied
roe ayes Cy)
ie
Mike Danseglio, program managerin the Security
Solutions group at Microsoft, April 4, 2006.
G 4 Veen gt Moe aaa
mattered, computers would
One a ae eer
Olen ee mee eae
eres ee eae
potential intruders. XZ)
4d
Ce ee et
rcs
(4 ED faiance
Perens
ee eee OOS Oe we
ip RO RE ERTS arn
Taser eT:
it’s
oa
Ce Mag
eee ave een aS
‘Susan’; ond if it’s
like ‘V7U2*Qu
cosy to remember oo
Creo
2
5 Se rs
Binary ere ny)
ae ae a ae ere aed
Peer ec ea Pome aren
Pay Denny ieee Patan oer
about toking better care of our
Erie Teaearaey le Das
because we Quickly remind
Erne eae rete
boring a5 hell and that it’s
shark wtek on Discovery yr)
y
rm
STO ar Re Ore
eva atm Cp oars
Aha
TA ame a
PRM enY 99
Bruce Schneier, Secrets and LiesOnline Child
Protection
eee Me reece an ae Re Cen eter ey
MOCa aE OME eeu uncut ect
hazardous place for a child to explore, despite the great benefits that
itoffers. The following pages will look at the risks involved for children
when online but also how to prevent them and how to better protect your
child while they navigate this virtual minefield.
Sere MONA aE es ae MRE ca
Fee ene Big Sei sier ester stsketees
Te) Feet een
= Gre Cad
Feuer eee ee
BR ee eas aS
Ten cmc acs
Can Access?
Non-Technical Gua
Penmaes
16
= Tips for Technical Guardians
444 Top Child Friendly Email Programs rN ees
and Services
pons Foe easel
ere sates
CR eee Romie ree cect
Cian Block Sites
Peach
the InternetChildren
Online:
What are
the Risks?
Every parent or guardian knows that being online represents
anentirely new frontier of potential dangers for young children
~andteens, These dangerscomein many forms, with each being
capable of greatly affecting thelives ofall involved.Children Online: What are the Risks’
ee ee ey
eect ene ene
aoe tne ec
pean t a tee te erty
Seeger
ee ees
Ce et ree eee
preety
Coen
wa cau 2
ere
ey ve :
TENS | rel oie
ane
Radicalisation
venieiae riers
sis something we a: pares
Meek us
aoe
Se eee
cule vente into ae
ee rer
ee ee ers
esa ar
ec ie
=
Seine eee
reine
Identity Theft
Serer pete
ies eee
spacer ere ree ere
ee es tae
sic and one tha i)
eee
Online Scams
- eee on
Whilst the Intermet
Ee aces
peed
ead eaticed
that can bring
‘44
CoS
GES
Og ose
SE eae
Penn
Peete
Seren
poeta
peer
Peter eae
et\
ma Online Child Protection)
134
Social
and Children
Medi
The impact of social media on children has been the subject of numerous reports over the
last fewyears. With more and more children and young people gaining access to Facebook,
Twitter, WhatsApp, Instagram and so on, there's a growing concern as to how its affecting
online safety
ny ste or portal where some form of socal
interaction orcs can be cased as social med,
s0 even if yeu doit allow your children crs
Facebook et a thee sil a chance they're in
‘cootact va gaming oan app of some destin: YouTube,
blogsandsoon.
‘eps om the emarcan cade of Pais has found
thatsingsodal media does prxideberftsforyoungpecre:
Decanting to eins, regular wee of cca media patos
enhances communication, socal connections ad tcl
stil, Not on ta alos young pele to connect wth
tended family members and fends they wert se for
perhaps ea at ie, 3 they en places there nat ely
{0 vt. Depending on the content, sacl mala can help &
ung en develop bette especies on various sues in
themed anduhentaledabowwih anacl.heycan begin
to fam thee ewe oprions, an impressive sage ina yeung
enone
bn same ways oc media can ap a young person res
‘har ine eings ard exccuages redo of thought ard
engagement vith similar age people. Thee potetal or 3
ung peson to ea new tings, hehe hats spl le
hacks or dscoresng semen oo ce. lin al ad up,
fn paper atleast, to 2 postive eperence tha can get
Felpayeungperson gow and helo them fom 3 ore matre
Lacestondngo te wo rund them somettngwedént
rave bloethe ite.
Sadly wth every postive aspect there ae several negatives
hist the fects of sci med on ach an be fx gpd,
theyaremosly orshadoned by the pop negative aspects
‘hat utimatly seta the surface. The sheer aes of socal
rredia sane ofthe man causes fr such neat, Do
freedom anclinitess pote, heres no defnable croton
the scape ofiforatn. Ys the soil media platm can
apples files and esicters bt hese seer betartoo
‘easly bypassed and oseme cee worhesinthe end,
alack 00g Teh Seri ome
(be bulbngs leon sca mca Fm thes made to
ung people, to ds athe appearance andbody shag,
52 platorm that has quel devoted nto a pit of despie
and depression fr same unforurae yours. Ths can
ka, nee cases otal corsequences but general the
‘alee temfr he gait pled upon the youh oftody
« FaebookDepresot
recert months, the Roya Sky for Pub Heath ogee
wath the Young Heath Movement rose a sun that
reeled Irstagam to hae the neve ipa on a yeung,
persons mental velbeng aca the media plan of
eepering young pope elings of nadequny and arty,
sa during ot hat on tp ofthe pasar school ot
calle fe yungpenpearehavngta putessves treugh
‘hermit sinelystinginfontofasccen.
al heath 3 major concen amongst youre people
bu social med so presents dak sie though onine
grooming pote adasation and the spread f alare
Each of hee wl greatly fet a young penal an
to higher levels of amet, depression and witawal For
‘ample, the spread of maiare may nat sun oo negative
onthe wellbeng of young pesen bu put yous inthe
piaeofthecid wha hes uniting exc soe fom ot
malar onthe family computer othe choc neterk, The
rte ematona fc om thi happening can be huge
‘osomeore whose immaturity cant.ealiththeatereecs.
“The softy deo soil media and chicken comesin mary
farms then. Mental heath canes, acest inappropite
center, Intmet bore dita teats bulb, omg,
lenlness and body image Whee i easy pit out he
fs of rte sarge danger, ts nat bays ea cet
hat happens shuld someone post eed are raiulte
images ofa yourgpesontosodalmed
There, the presi on pens and guardians is jst as
immense, when or youre peopl nasa te pa
valdesttonterthat socal med,
Using social media
isamongst the most
‘common online
activities ofthe
moder day young
person. The likes of
Facebook, Twitter,
Instagram and many
Co
Safe
Social
Media
99
more all contribute
tothe billions of
hours collectively
spent via computers
and mobile devices,
with online gaming.
quickly following
on the heels of the
more popular social
portals.ma Online Child Protection)
Search Engine Safety
The search engineis the portal into the wider Internet and through it we can view everything from
man's first steps on the moon, to extremist group propaganda
children are aware of the dangers of the search engine.
Wiile the Google search portal isn't
dangerousin itself it's what potentially
lies behind the search entered that
‘makes it such a dangerous place for
young people to venture into. Many
66
Safer
Searching
99
‘young people are somewhat more
tech-savvy than most adults but the
‘younger children are at risk from a
seemingly innocent search resultingin
inappropriate content being displayed.
consider how aparuar scenario may
be payed cut. Aci it in fon of 2
search engine, they enter someting to
ho with a school project on Wo Wer 2
andstan tl thelinks. though part
isto some ofteimages that maybe
dsploed ould be deemed appropiate
to a primary schol child, or thase as
young To expand, what the eh then
follous fnks to modern day ware
‘and from there potently to videos
depicting exreme violence. hat then can
Ssnonbal ito acesing aha an ony be
esrbedastherealnasty stu whichisnit
Somethingany cd sould ever witness.
F est take much imagnaten to
sd of what could pct happen
‘oad the serch engine can od
og no a whle hap ow
That uouble can cme fem schoo your
ISP sheuld ny lea hoses corset
wort ming se that
leos. I's therefore paramount that
whatever search engine you use, ary filters
alone Font ofa each engine fran
leh ote
you consider Googe to beta iy, here
retheeso!DickOuckGo,asarchengine
logan ay searches but
0 fates a
coterie er engine. Liewse Strap,
Brg Boake
f
inappoprtecrtentandallovnga ight
dee ofhaemet hag
there ae steps we as pares,
‘seach ret. There are name
for sae serch with
The st seach pices ane
ocd ut the alas a chance that
cmethng could gt rave the nt ond
reeaiseFonthescren( Search Engine Safety ci
Six Safe Search Sites
“Therefore, her ares child safe search engines. The age angesvary but generally they te pitching to primary or low mide school chldren. ter way,
they/recertainly worth considering and bookmarking or when a chilis using the computer for school or goneral research
AUKbased search engine that ites D:
PATE 'sickisassrchenginedesienedand cetedoy
Google's Saeseurchtechrolagyandprevides Iirenansforehiden whe are searching forschoo lated
_afrienly roncend ts good siating point and one tha dos solay research, Eachresultrexumed eatues a description and reading ee lon,
pictur cons alongwith search eats thuseiminating any appropri \wthsuggestons anchomenod helpers,
imagesthat may unintentional sip through =a
SAFE Susncl Kies
ct Monsters anecellen ste that dedicated to Here another custised search engineutlsng
pingchilden researc schoo topics sa ree Goagl’ Safesearch retreats iter Adon, t
online amaac dctonaryencjlopocia are thesauusandisaired at lea fatures barred eye search ste that illnot tum any res
children betwen the ages ofeghtand fourteen, fromthe blacklist of banned words
Asimplesite that designer muchyounger users KdRecis NINE & great and rend each engine fr children and young
poweredby Googe ovnsearch engnebut a youd eed, people. idle provides stictiteringalong th chle-endly
fiteesout any inappropriate cone. Furthermore, aeaparen,youteako able eats that ae grouped by toze deemed safe nd handpicked bythe Kile
tsomice the flterstnensuresofer oles etetve sa celts Herearetrstd sts that are speciically rt for chen but
< provide understandable content ar safe famous ites that are harder
Undertand btstilreevart.x
ma Online Child Protection)
Of all the many despicable acts and threats that arise on the
Internet toward young people, online grooming is
undoubtedly one of the worst examples. It's a
tricky act to-eontiim at times too, as those
who groom offen cleverly hide their
tracks but itis possible to spat signs
of ithappening
itors ong as the groomers they geting
ccna cing child expe The ming
{nen mova here tre goomersasto became
nor peoral adoping a pesora of ancther young peson
ough = se ge th iin cust, Pars eventually
they they le ane hey coucrmestupatersehoolor
Samthing, 0! cuse does ays payout that ay thee
“re mary ft nays in which he geome can sath
enemas tu ee avng scaly meet the youn
-esoniiuesn,
“he NSFC ates that goomes cn be anges othe young
pon a end rotor reve a filymembe hy an
ais becithermaleorfeval andofanyage asthe KC
rents rjaneean groom someone
The mere prominent reasons ae chef ema conversations,
vant to hove wal images ofthe young parson as wel
3 ides, ass tothe young posons webcams mast So
cusses, a gan futher oman regan
ni there 8 eamples of gaming In err
tp stan asaverds fr basking and sich: Ofer
tes an element of Backal rid hete
demands mace image:
or thal post the images up on
the tenes
The sips of online groming
‘ary cepenirg onthe youre
son and hear the
ac of omni
been
> Theyoungpesonbeingvr scree incite
nine ac.
> Hoingalderbayfiendsoc ition
> ongtounsulplacestomedtup withers
> Haingnentingssuchas cates, phonesorther
obectsthey canteen
Geog ets ota oreo sire
Sendyoulsof phate messages
-sakyotaleep conversations ascot
tpt dota abautyouandyoarfariy
Stato send youseaslvessages us tari ith
Jpesthen mavigon
> Blac youna sennginages cides by es
‘nen toyour yours.
‘The suas Can vary andthe oom is aden at hing
ces of thr actity 28 wel 9 ying to someone about
‘hemsehes Chine sates" impodanto reember that
theres one ype of groomer Many ae hnds of people
haus tenet ck force pasuadeyeung pepe
‘no sharing seal images of themselves. fen an aut
pretendngtobes young peson.butnot ays”
Parents and guacans can watch out for cean pes of
behaviour which coud be sigs of grooming. ears of
‘ihetheritsorine vaa phonechatappcreveninpein, The
SPEC have sed thefoloningas potentials
> witeaun > sos clothes
> Suddeniybehaves > Tokesiks
ferent > Misses school
> powous > Changesineatinghabits
> clingy > Obsessive behaviour
> Depressed > Nghtmares
> hegessve > pgs
> Problemssleening 5 Aol
> Exingdsordes > saltharm
> wasthebed > Thoughtsaboutsuiide
Both Chidioe and the NSPOC hae excllent websites
edcatedtoonlie gooring denguihadicetobah pans
land guacians, aswel 3s young people and chien You
{an ie them at tpschdineopukfefo adicefbulyeg
abueesaleybriine miesaeyoline-goming¥l0. and
Inipsi/nspcc on /prevetng-abusechil-atuse-an
teectigoorng. ts corinly worth reading though each
Sato ganabeter ndesindngcforinegrooing whathe
warning ses are andhow tosoppoayeurg person should
lanysignsbeapparee
‘TheNSPCC (the
National Society for
the Prevention of
Cruelty to Children)
defines grooming
aswhen someone
builds an emotional
66
What it
isand
what
to Look
Out for
99
‘connection with
a child to gain
theirtrust forthe
purposes of sexual
abuse, sexual
‘exploitation or
trafficking.x
ma Online Child Protection)
+40
How Safe are the Sites Your
Child Can Access?
Mobile operator 02, YouGov and the NSPCC have teamed up with Net Aware to createa site that
reviews popular sites and apps that children and young people use. This guide allows parents and
guardians to view the information to help them understand their child’s online world.
Net Aware
Netaware isan excellent site and can be found at htps:/net aware org.uk Within youcan find anAto Zo Most Popular sites andhowsaethey actually are
_2ccordngtofacecons. Hereare ten ofthe popular choices wth ther safety informatio,
cio Fem
Reporting
alack 0g Teh SrMINSNEERD srottersot too hihyrated st, whatsApp raises several
ances over ably tobe contacted bystanges,
random peopl beingableto view your prof picture ae the potential fo
rceing com messes,
WhatsApp
BB isisasocial ntworingsite where you canaskoter people