Download as pdf or txt
Download as pdf or txt
You are on page 1of 11

Lesson 7

Policing the Internet


Learning Objectives:

• Determine if you are using the internet safety.


• Know various kinds of information threats on the internet.
• Understand the different terminologies about privacy and surveillance and online ethics; and
• Apply the guidelines of proper etiquettes online.

Privacy and Surveillance

Data Breach

Data breach is a cybercrime in which a cybercriminal extracts data from a source. Usually, data
breach is done through remote network or through a physical access to a computer or network.

Cybercriminals have a systematic way of implementing a breach. At first, they are doing a research
with regards to the weaknesses of the source's security. Once they knew the weakness, they will
take advantage of it to attack to initiate a contact with a network. Then, if the cybercriminal has
connection with the source, he/she can now successfully extract the data.

Cybercriminals are using data breach to get a way to perform an information fraud, credit card
duplication, theft, identity theft, and other crimes that will be needing a person's personal data.
Name, birthdate, identification number, email address, mailing address, credit card and bank account
numbers and many other kinds of information are being stolen from a source to be used for other
crimes.

With this, companies - like banks, hospitals, email providers, that are holding personal data - are
keeping on reminding their clients to be careful with their data because with the technology today,
all data are vulnerable to be leaked and used by other person.

Cybercrime Police

Internet police is an organization led by government agencies in countries that are in charge with
policing internet. With the vast connectivity of the world, the internet police have a great
responsibility to keep the internet space a safe space where cybercrime is prevalent. The purpose of
the internet police will depend on the country or state which can be fighting a cybercrime,
propaganda, and censorship.

In the Philippines, the government has its Anti-Cybercrime Group that is led by the Philippine National
Police. It is responsible to enforce laws on cybercrime to attain effective cybercrime campaign. The
PNP ACG have a vision of a safer cyber environment by 2025. PNP ACG can conduct cybercrime
investigations and arresting of cybercriminals.
Also, they can do other things like to recover data and forensic analysis on all devices involved in
doing the crime. All these are implemented so that internet users can observe a safer space and
environment on the internet.

Usage of security applications

Application security is protection for software, hardware, and another procedural method for external threats.
The security application is progressively important due to the development of applications which is accessible
over the networks. Security is designed to protect important files from unauthorized code and reaching,
stealing, and removing of data. Application users do not know what these apps do to their phones, PC, and
other digital gadgets. Some applications require permission to get access through your settings and ask some
requirements to be accessed. Some will ask permission about your location, contact, and accounts (email).
Spy ware is a program or software that will steal information and changing user data. It is usually taken by
unauthorized installation of software, downloading applications and a random pop-up advertisement.
Spyware can usually get into the computer or phone through shareware and freeware. From these, the
spyware can successfully install and start transferring data or collecting it.

Types of security application:

1. Auditing - Recording and tracking the execution of the application. In tracking the execution of the
application, you will notice if there are any suspicious on the application. Also, you should be able
to trail the events.

2. Authentication - It should be only the user who can log in and run the application. Only the valid
information can reach this software.

3. Authorization - It should be only the authorized user who can change, edit, and read all the
information inside the application. If there is any suspicious activity, the user or the owner should be
verified through email, personal phone number or any that can reach that will notify the user.

4. Cryptography - assurance of privacy to the user, unauthorized user should not be able to edit,
change; copy, or read the information inside the application. The security must be strong enough to
secure the application.
State of Privacy on the Internet

How safe is your internet privacy?

Privacy is probably the most important thing that we need to take care of when it comes to the
internet. According to the Merriam Webster Dictionary, privacy is the quality or state of being apart
from company or observation. If we are going to apply it to our information, our personal information
should not be out in public, it should be personal, for your eyes only.

In this world, there are already loads of cybercriminals (hackers, crackers, etc.) who can get your
information in a snap. Just in United States of America, there are over ten (10) million cases a year
of identity theft. There are countless cases that credit card information and email details get stolen,
security numbers and identifying data obtained, and addresses known. All happened with the help
of the internet.

Even when connecting to a public Wi-Fi, your personal data could be at risk. Whether you are at a
coffee shop, in a library, in the mall, or even hundred and thousands of feet Off the ground, these
public Wi-Fi can help risk of information leakage. But how is this done? Open Wi-Fi networks or
public networks allow channels to communicate. Since there are a lot of people connected to one
internet connection, or Wi-Fi, this allows hackers to transverse through each channel or device and
spy on what those other networks are doing. What is making these public networks that dangerous?
It is their lack of encryption.

Encryption is the process of encoding information wherein only the authorized people can access
that information. With most of the public networks not encrypting their communication between WiFi
and the user of the device connected to-it, this allows the hackers to get into the unprotected channel
and easily view your data and information.

A simple person could do this, you do not even need the technical knowledge and education to try
and attempt it. You are lucky if these hackers do not discover your IP or MAC address. If that did
happen, a hacker can open a connection to • your device and snatch your data.

To prevent this type of danger; you can use a Virtual Private Network. VPN or a Virtual Private
Network extends a private network across a public network. With that, it will enable users to receive
and send data across public networks as if their computer is directly connected to a private network.
This Will mask your device's legitimate IP address.
Public networks are not the only ones that can risk your personal data. Here are some ways hackers can get
into your device:

1. Malware or viruses attached to email.

Attaching malwares or viruses to emails is probably one of the most popular methods of malware
spread. Once you open the attachment, the s software, downloads into your computer.

2. Links to malicious websites attached to emails.

Once you click on the attached link, it will lead you to a fake website which will trick you, the
user, to enter private information which can be emails, passwords or even banking details.

3. Social Networking Pages

Fake profiles can entice users into following a link to websites wherein they can, again, get your
information.

4. Hijacking advertisements

Hackers or cybercriminals place ads containing malicious Codes on real websites.

5. Malicious Mobile applications

If you think every application on Google Play store and Apple store is safe and legit then you
might want to think again. Some applications may contain malicious codes that help cyber
criminals get your data.

6. Smishing

This is phishing but via phone call or SMS messages. It is when someone tricks you into giving
them your information. '

Privacy Issues

A privacy of an individual is essential because it is the key to all your social liberty and freedom. It is a right
that most of the public and private people value the most. All of the person's freedom depends on privacy
and at the present » time, privacy is not secured anymore because of social media. Today, it is normal; to
share confidential information online on social networking sites that users believe that it is safe to have this
kind of habit. An American, entrepreneur and philanthropist, Mark Zuckerberg once said, in 2010 that the
users of today's social networking sites have developed more into being open because of numerous and
countless people sharing personal information online and is continuously becoming expansive every year.
Users must know that data can be stolen arid may be utilized in harmful ways like for fraud or stalking.

Philippines might have suffered its most terrible government knowledge breach for just about a month before
its elections. Personal data, as well as fingerprint knowledge and passport information that belongs in a span
of seventy million individuals are alleged to have been compromised by hackers. A terrifying assemblage of
smart hackers used their chance to attack the openness of the system together with the automated voting
machines. The group Anonymous Philippines has asserted their responsibility for the damage.

Philippine banks are always targeting of foreign hackers. If has always been a problem regarding international
cybersecurity due to its weak spots. The attacks are somehow considered as examples to determine the
weaknesses of the banks. According to Philippine Daily Inquirer, there was a discovery in the Central Bank of
Bangladesh, where $8i million were stolen. The massive amount of robbery was verified that it started in the
month of November 2015 up to March 2016 and took them on at least five (5) months to fully steal the said
cash.

Online Ethics

Ethics, Etiquette, and Netiquettes

Ethics is defined as what deals with moral principles, it is the understanding and knowing the difference of
what is good and bad. While etiquette is the way people behave in an orderly manner in a social setting, and
it refers to your polite behavior and good manners.

Everyone can gain access to the internet and everyone too can post and interact with almost everything that
is posted publicly on the internet. With this kind of freedom, there should be proper manner/behavior to be
observed. Social etiquettes do not only exist in the real interacting environment but also online. There are
dos and don'ts in the online world and users must know and apply them to create a good interaction with
everyone. *

Netiquette is the combination of the two Words network and etiquette. It refers to the distinguished set of
rules for what is acceptable as good online behavior. It also emphasizes on what are tolerable usage of online
resources.

8 Guides for Proper Online Etiquettes

As an online user, you Should be responsible for the actions you are doing in the web by the means of,
interacting with other personal businesses. Here are 8 guidelines to follow for achieving netiquette.

1. Internet should not be used as a platform to harm fellow users. Online websites should be a safe
place wherein each persona comfortable in trusting sharing data with one another without getting
abuse in terms of certain processes.
2. Always respect someone's privacy. Interfering with other user's business should be avoided, and
keep in mind that there are certain laws that are imposed when invading someone's privacy comes
into the application.

3. An Online platform is not a place for stealing. Copyrights and plagiarism are something that every
user should be familiar with when you are searching for information online to avoid major and minor
crimes of act. Paraphrasing and proper crediting of online sources shall be applied. The concept also
applies for the e-commerce industry since there are many fraudulent acts that are happening in online
transaction and. businesses. Other subjects such as unofficial installment of software or applications and
illegal access on movies, series and music shall be avoided as well, when online etiquette is considered.

4. Always be aware of fake news and avoid making it. Fake news continues to invade our timeline in
any given network, and it is relevant to talk about its Users Should, always identify the credibility of the
source and avoid sharing it as much as possible.

5. Apply the good maimers and values you have learned in general. Proper behavior online is a must
when using online networks. In simple ways such as valuing respects and kindness, you can help on
creating a better environment in the online community.

6. Political correctness should be observed as a standard for social norms. Keep in mind that online users
are composed of diverse people who are raised by different races, cultures, and traditions. Be sensitive
enough when you act online and avoid certain unethical acts such as racism, sexism, homophobia arid
others.

7. Use proper avatar, as well as proper name, when creating an account. Billions of accounts can be
found on the internet alone that is why creating a proper picture in your account and accurate name
should be used to avoid confusion. This process shall be applied to avoid stalking account, fake accounts,
catfishing, phishing arid others.

8. Think before you click. Choice of words is important when it comes to posting online and sending
private messages and should be aware on every single word that is about to be seen by an individual or
any group. This shall be used as a golden rule to avoid any immoral act done online.
Ethical Dilemmas on the Web

Dilemma

To be able to complete any decision from the two results in a predictable rate to a certain condition is
called dilemma. The usefulness and influences on the performance of the website is included on the
down sides of a development dilemma on the web.

Front the experience of the past years, the professionals for web have established and settled upon
overall moral values and a lot of professions inherited from the other. Below are the following examples
of right conduct for web specialists:

1. Sending spam or unwanted e-mail is not allowed.


2. Spreading malicious code of program, by means of worms or viruses is strictly prohibited.

3. Passing messages along chain e-mail, particularly to those people that indicate extortions.

Spam

It is a message thru email that the receiver did not want or ask to receive a message from the sender. It
is unwanted e-mail that whether you are aware of whether you like it or not you will be receiving this
kind of message if someone sent .it to you. Everyday millions of spam messages or unwanted mail are
sent to the users of Web regardless to their location.

Some of the people are using this kind of unwanted mail to cause harm to other people, to fool other
people and to make money to other people. As a web user, sometimes we did not notice or recognize
that we are already encountering or reading a spam message. Below are some examples of unwanted
mails that we did not know that we have encountered it.

Social Media Expert Spam


This type of spam is trying to persuade you to put your money into their, account. They are the
social media scammers. They will convince you to negotiate in them and then you will never
know that they will be going to take your money.

Lucky Winner Spam

In this message, the sender is trying to fool you that you are so lucky that you have won on
something that even you yourself did not know how this thing happened to you, and where this thing
came from.
Online Safety and Security

Online Safety

Online Safety may be one of the biggest worries of parents for their children. Parents always want
their children to be safe, may it be outside their homes or in the online world. Since there have been
great innovations in the technology realm from the creation of computer, online safety became much
easier to achieve and it continually improves in the future. Online Safety, or Internet safety, is the
knowledge of cultivating and maximizing the user's private personal safety and security risks on their
private information that is on the internet. Users of the internet continually grow every day and they
are concerned with the information they put up. These concerns are commonly heard as any type of
offensive or malicious websites, users, and software. Crimes can also be committed online like
stealing someone's identity, stalking, and more. These are the reasons that some pages put up safety
measures and chat sites just to promote online safety. The government has also acted on this matter,
producing organizations and groups to enforce online safety.

Online Security

Also known as, Internet Security is a branch of security that takes on the internet field. Their purpose
and objective are to establish guidelines, dealings, and measures to use against the occurrences that
attack over the internet. Different ways and methods have been used to counter and protect the
transferring of private data; this includes encryption. Internet security involves browsing security, but
it can be generally applied in applications and operating systems.

10 Advice to Stay Safe Online

1. Create complex and unpredictable passwords.


Unique and strong passwords can be critical to the safety of your accounts. Some sites ask for
an upper letter, numbers, or symbols in your password to avoid any risks of people getting access
to your account. Regularly changing your passwords can help maintain safety.

2. Network Security.
Boosting your network security assures a secured connection. Whenever you are accessing a
public Wi-Fi, it can be a concern because they are often left unsecured thus with the risk of
letting hackers getting access to your information. Investing to Virtual Private Network (VPN) can
secure your connection so you can connect anywhere safely.
3. Using a Firewall.
It is still a need. Firewall acts like a barrier to any unauthorized access to your devices like
computers, webcams, and smart thermostats since they are not equipped with any security
measures.

4. Think Before You Click.


Do not invite any danger to your device by not thinking before you click. Do not be careless on
clicking baits on the internet. Many are tempted by the "free offers, and spam emails only to
lead them on inviting viruses or disabling their security.

5. Selective Sharing
Be cautious in sharing anything that concerns your identity information.

6. Protecting your Mobile Life.


Devices are vulnerable to any online attacks.

7. Safe Shopping and Surfing.


Check the site you visit if the URL section contains a padlock icon and if the address starts with
"https" or "http. These indicate that the site is secured, and the information being transferred are
encrypted.

8. Update.
Keep up to date with your software and latest security patches.

9. Keep a lookout.
Threats also continually evolve so make sure you know what their latest scams are. Stay safe-
by being informed.

10. Guard up.


Be always cautious on what you are doing online, what you are sharing, and which you visit.
Backup your data regularly and take preventive measures.
Summary:

Data breach is a cybercrime in which a cybercriminal extracts data from a certain source. Usual data breach
is done through remote network or through a physical access to a computer or network. The internet police
on the other hand, is an organization led by the government agencies in countries that are in charge with
policing internet. Application security is protection for software, hardware, and another procedural method
for external threats. A privacy of an individual is essential because it is the key to all your social liberty and
freedom. It is a right that most of the public and private people value the most. All the person's freedom
depends on privacy and at the present time, privacy is not secured anymore because of social media.

This lesson discussed policing the internet which includes the privacy and surveillance where in it talks about
the police on the internet, illegal handling of information, usage of security applications, state of privacy on
the internet. In this lesson as well talks about the online ethics wherein it discussed the ethics, etiquette,
and netiquettes in this part. It will serve as your guide to know what the proper online etiquette are. Aside
from that, this part talks about the ethical dilemma on the web wherein it tackles about the dilemma that you
are experiencing in using the web. Part on this lesson also tackles about the online safety and security. On
how to be safe and secure while you are in online mode. This part also gives ten advice on how to stay safe
while you were online. In additional to this lesson, it presented the research and organization of online
etiquettes as well. The whole lesson covers policing the internet that will help the users to become intelligent
and knowledgeable when using the web.

You might also like