M1 L2: Online Safety, Security, Ethics, and Etiquette

Cards (31)

  • The Internet is a powerful tool that can be utilized for various purposes. However, there is always another side to consider. Imagine the Internet as a sword and yourself as a swordsman. Without proper training, a swordsman can easily harm themselves while wielding the weapon. Similarly, online safety is crucial. It involves understanding how to safeguard personal safety and security, protecting oneself from computer crimes in general, and minimizing risks to private information.
  • Essential internet safety tips:
    Make sure your internet connection is secure. Choose strong passwords. Enable multi-factor authentication where you can. Keep software and operating systems up-to-date. Check that websites look and feel reliable. Review your privacy settings and understand privacy policies. Be careful where you click. Make sure your devices are secure. Backup data regularly. Close unused accounts. Be careful what you download. Be careful what you post. Be careful who you meet online. Double check online information. Use a good antivirus and keep it up-to-date.
  • Make sure your internet connection is secure. While using public
    Wi-Fi may be unavoidable when you're on the go, it's not always safe.
  • Choose strong passwords. People often choose passwords that are
    easy to remember, but this also makes them easy for hackers to guess.
  • Enable multi-factor authentication where you can. Multifactor authentication (MFA) adds an extra layer of security by requiring users to provide multiple verification methods to access an online account.
  • Keep software and operating systems up-to-date. Stay current with your operating systems and any applications you use. Developers constantly work to enhance security and release security patches to address vulnerabilities.
  • Check that websites look and feel reliable. Look for up-to-date security certificates, indicated by URLs starting with 'HTTPS' instead of 'HTTP' (the 's' stands for 'secure'), and check for a padlock icon in the address bar.
  • Review your privacy settings and understand privacy policies. Many of us accept privacy policies without reading them but considering the use of data for marketing and advertising, it's wise to review the privacy policies of websites and apps to understand how your data is collected and used.
  • Be careful where you click. Careless clicks can expose your personal data or infect your device with malware. Be mindful of browsing consciously and avoid clicking on links from untrusted sources, spam emails, online quizzes, clickbait, "free" offers, or unsolicited ads.
  • Make sure your devices are secure. It's good practice to secure all your devices, such as phones, computers, tablets, smartwatches, and smart TVs, by using passwords or passcodes and utilizing additional security options like fingerprint readers or face-scanning technology.
  • Backup data regularly. It's crucial to back up important personal information on external hard drives and consistently create new backups.
  • Close unused accounts. Many of us accumulate old accounts that we no longer use. These accounts can pose a security risk, as they may have weaker passwords and inadequate data protection policies. Consider closing such accounts to enhance internet safety.
  • Be careful what you download. Cybercriminals often attempt to deceive users into downloading malware. Malicious software can be disguised as various applications, ranging from popular games to seemingly innocent traffic or weather checkers. It can also be hidden on malicious websites that aim to install malware on your device.
  • Be careful what you post. Remember that the internet does not have
    a delete button. Any comments or images you share online may
    remain accessible indefinitely, as removing the original content does
    not guarantee the removal of copies that others may have made.
  • Be careful who you meet online. Not everyone you meet on the internet is who they claim to be. In fact, some may not even be real individuals. Fake social media profiles are a common tool used by hackers to exploit unsuspecting internet users and compromise their cybersecurity.
  • Double check online information. Unfortunately, the internet is home to fake news, misinformation, and disinformation. With the overwhelming amount of information, we encounter daily, it's easy to feel overwhelmed and uncertain. If you come across something that raises doubts, take the initiative to conduct your own research and verify the facts.
  • Use a good antivirus and keep it up-to-date. In addition to following safe online practices, it is crucial to use reputable antivirus software and ensure it remains up-to-date. This adds an extra layer of protection to safeguard your devices and data from potential threats.
  • Internet threats: malware, spam, phishing
  • types of malware: virus, worm, trojan, spyware, adware, ransomware
  • Malware stands for malicious software
  • Virus attaches itself to a legitimate program or file, turning it into a carrier
    for malicious code.
  • Worm is self-replicating malware that doesn't need a host file to propagate.
  • Trojan disguises itself as a harmless program but, once installed, leaves a
    PC unprotected.
  • Spyware secretly gathers information from a user's computer or device
    without their knowledge or consent. The most common spyware is the
    keylogger, which records every keystroke typed on a keyboard, allowing
    attackers to capture sensitive information, such as usernames, passwords,
    credit card numbers, and other personal data.
  • Adware is a program designed to send you advertisements.
  • Ransomware threatens to publish the victim's data or perpetually block
    access to it unless a ransom is paid.
  • Spam refers to unwanted emails, often from bots or advertisers.
  • Phishing is a form of acquiring sensitive information through "baits." This is done by sending an email or link that directs the user to visit a website and asks them to update their username, password, credit card, or personal information.
  • "Netiquette," short for "internet etiquette," refers to the code of conduct and guidelines for polite and respectful behavior when communicating and interacting with others on the internet. It encompasses the social norms and rules that govern online communication, creating a positive and constructive online environment.
  • Ten Commandment of Computer Ethics (written by Computer Ethics Institute)
    1. You shall not use a computer to harm other people
    2. You shall not interfere with other people’s computer work.
    3. You shall not snoop around in other people’s computer files.
    4. You shall not use a computer to steal.
    5. You shall not use a computer to bear false witness
  • Ten Commandment of Computer Ethics (written by Computer EthicsInstitute)
    6. You shall not copy or use proprietary software for which you have not paid
    7. You shall not use other people’s computer resources without authorization or proper compensation.
    8. You shall not appropriate other people’s intellectual output.
    9. You shall think about the social consequences of the program you are writing or the system you are designing.
    10. You shall not always use a computer in ways that ensure consideration and respect for your fellow humans.