Dangers in the Internet

Online Safety, Security and Rules of Netiquette

The Internet

The internet, truly, is a powerful tool. It can be used to promote your business, gain new friends, and stay in touch with the old ones.

→==A source of entertainment. But like most things in this world, there is always “another side of the coin.” The internet is one of the most dangerous places, especially if you do not know what you are doing.==

Information you must limit to share online

Personal Information

• Contact Information

• Education Information

• Financial Information

• Location Information

Internet Threats

→ ==Web-based threats, or online threats, are a category of cybersecurity risks that may cause an undesirable event or action via internet.==

→ %%Web threats are made possible by end-user vulnerabilities, web service developers/operators, or web services themselves%%

Dangers on the Internet

  • Email / Junk mail

    • ==Usually unsolicited commercial email sent from an unknown source with identical message sent to multiple recipients.==
    • Usually not dangerous but can be time and space consuming.
    • Dangerous ones can carry viruses and other malicious software (Malware)
  • Email Spoofing

    • ==It is a deceitful email practice in which the sender address is changed, so that it would appear to have come from a different source which is usually someone you know.==
    • Usually used by spammers to hide the origin of the spam
  • Phishing

    • ==It is a deceitful practice of trying to get confidential information such as passwords and usernames, and credit cards details by making it appear as if it comes from a trustworthy source==
    • It is usually done through emails or using popular entity such as Microsoft, Yahoo, Google, Amazon and financial institutions.
  • Pharming

    • %%This is a dangerous hacker attack on a website which directs all traffic to that website to another fictitious website.%%
    • ==The main objective is to obtain username and passwords, as well as credit cards and financial information, and use these to steal their money electronically or use the credit cards of the victims.==
    • It is a major concern of many online banking and electronic commerce transactions.
  • Virus

    → ==A specific type of malware that self-replicates by inserting its code into other programs==.

    • One type of malware
    • Must be triggered by a user
    • Self- replicating
  • Malware

    → ==A catch-all term for any type of malicious software, regardless of how it works, its intent, or how it’s distributed.==

    • Terms for Malicious software
    • Any malicious code
    • Harms devices and steal data

All viruses are malware but not all types of malware are viruses.

  • Spyware
    • %%Malware such as spyware, is placed on a computer without the end user’s knowledge%%.
    • ==It intrudes, takes private information and internet usage data, and then passes it to third parties like advertising, data companies or other users.==
    • hard to detect malware.
  • Keylogger
    • ==The act of secretly recording the keys pressed on a keyboard such that the person using it is unaware that their actions are being watched is known as keystroke logging/keylogging/keyboard capture.==
    • The person running the logging program can then get the data.
  • Worm
    • ==A computer worm is a standalone malware computer program that replicates itself in order to spread to other computers==.
    • %%It often uses a computer network to spread itself, relying on security failures on the target computer to access it.%%
    • It will use this machine as a host to scan and infect other computers.
  • Trojan Horse
    • ==A malware fronting to perform a good task, but covertly performs undesirable function with the intention of entering the computer without the user’s consent.==
    • %%It can disable the computer’s defenses, opening it to unauthorized entry. It can erase data, can corrupt files, allow access to computer%%
  • Hacker
    • ==This is a person who is able to enter and control other people’s computer without authorization.==
    • %%Usually vandalizes the victim’s website, steal personal information, obtains intellectual property and performs credit card fraud.%%
    • Firewalls are able to prevent entry by hackers.

Intellectual Property Rights

“ Intellectual property (IP) is ==a category of property that includes intangible creations of human intellect==. There are many types of intellectual property, and some countries recognize more than others. The most well-known types are copyrights, patents, trademarks and trade secrets”

  1. Patent - %%The protection is granted for a limited period, generally 20 years from the filing date of the application%%
    • ==Utility Patent -== ==It protects a process, manufacture, composition of matter and useful machine.==
    • ==Design Patent -== ==It protects the shape, appearance, pattern design, layout and looks of a product.==
  2. Trade Secret - ==Any valuable information that is not publicly known (a well guarded==).
    • e.g.. ingredients used in their food products, business methods, customer data
    • Trade secret protection is not limited in time. It may continue indefinitely as long as the secret is not revealed to the public.
  3. Copyright - ==Protects the original work of authorship, Such works are literature, drawings, paintings, songs, music, computer, software, films, photos, web content.==
    • The time limit should be equal to or longer than 50 years after the creator’s death
    • Longer periods of protection may however be provided at the national level.
  4. Trademark - ==Offers legal protection for logo, design, symbol, phrase, wordmarks, or a combination of those that represents a source of goods or services.==
    • The term of trademark registration can vary but is usually ten years. It can be renewed indefinitely on payment of additional fees.
  5. Copyright Infringement & Plagiarism
Copyright InfringementPlagiarism
==Includes the unauthorized or unlicensed copying of a work subject to copyright====Using someone else’s work or ideas without giving proper credit==
Legal termNot a legal term
Civil crimeAcademic crime
Unauthorized used of someone else’s creative workClaiming ownership of someone else’s creative work
Monetary damage for infringementNot punishable by government, but may be by academic

Fair Use

→ ==Means that an intellectual property may be used without consent as long as it is used in Fair Uses of Copyrighted Material.==

■ Criticism

■ Comment

■ News reporting

■ Teaching - includes making copies for use in the classroom

■ Scholarship and research

■ Parody

Contextualized Online Search & Research Skills

“ ==Utilize the Internet as a tool for reliable information gathering and research to best meet particular class objectives or solve a situation==. Students will use search engines more effectively. They can have a deeper understanding of search strategies, in particular, that will produce results that are helpful for their academic work and career of choice”

Evaluating Information

  1. Accuracy - %%Content is grammatically correct, verifiable and cited when necessary.%%
  2. Author - %%Defines who created the content, the individual or group’s credential/expertise and provides contact information.%%
  3. Currency - %%Information is current & updated frequently.%%
  4. Fairness - %%Content is balances, presenting all sides of an issue and multiple point of view.%%
  5. Relevance - %%Content is relevant to your topic or research.%%
  6. Search Engine - %%programs that look for documents based from specified keywords and return these documents where the keyboard were found.%%

Rules of Netiquette

  1. %%Be mindful of what you share online and what site you share it to.%%
  2. %%Do not just accept terms and conditions; read it%%
  3. %%Check out the privacy policy page of a website to learn how the website handles information.%%
  4. %%Know the security features of the social networking site you use. By keeping your profile private.%%
  5. %%Do not share your passwords with anyone.%%
  6. %%Avoid logging in to public networks/Wi-Fi.%%
  7. %%Do not talk to strangers whether online or face-to-face.%%
  8. %%Never post anything about a future vacation. It is similar to posting, “Rob my house at this date.”%%
  9. %%Add friends you know in real life.%%
    1. %%Avoid visiting untrusted websites.%%
    2. %%Install and update an antivirus software on your computer. Use only one anti-virus software to avoid conflicts.%%
    3. %%Avoid downloading anything from untrusted websites.%%
    4. %%Buy the software; do not use pirated ones.%%
    5. %%Do not reply or click links from suspicious emails.%%
    6. %%Do not just believe on what is posted in social networking sites. Check and verify%%.