As our society faces the ‘new normal’, most of our daily tasks now need the assistance of Information and Communication Technologies. Thanks to the internet, because we can now meet and communicate with each other online. Paying bills, buying goods, growing your network of friends and even learning can be done online. Life now is almost turning to digital media. According to (Preston n.d.), digital media is any form of media that uses electronic devices for distribution. This form of media can be created, viewed, modified and distributed via electronic devices. And it is very important that you not only know how to use and deal with these technologies but it is necessary to know the different threats brought by the internet and be equipped on how to keep your private information safe and secure online. Private information is your sensitive personal information or your identity such as your username and passwords or bank accounts. Even though the government has already set a policy, the Republic Act 10173 or the Data Privacy Act of 2012, that is to protect the fundamental human right of privacy, of communication while ensuring free flow of information to promote innovation and growth (Republic Act 10173 – Data Privacy Act of 2012 n.d.), it is important to have the knowledge of maximizing your private information in order to keep it safe and secure is called online safety or web safety or internet safety. It is also necessary to apply ethics and etiquette online to avoid problems in facing digital media.
Internet threats you need to be aware of:
Email Scam/Junk Mail/Spam Mail
- Usually unsolicited commercial email sent from an unknown source with identical message sent to multiple recipients. Usually not dangerous but can be time and space consuming. Dangerous ones can carry viruses and other malicious software or malware.
Email Spoofing
- is the creation of emails with a forged sender address. The goal of email spoofing is to get recipients to open, respond and engage with the email message. Email spoofing can greatly increase the effectiveness of phishing and other email-based cyber-attacks by tricking the recipient into trusting the email and its sender (Tunggal 2019). It is usually used by spammers to hide the origin of the spam.
Phishing
– is a deceitful practice of getting your personal information using email or text messages. Scammers may try to steal your passwords, account numbers, or Social Security numbers. If they get that information, they could gain access to your email, bank, or other accounts (Federal Tr. Comm. ’19)
Pharming
- is a scamming practice in which malicious code is installed on a personal computer or server, misdirecting users to fraudulent Web sites without their knowledge or consent. This happened when the code sent in an e-mail modifies local host files on a personal computer. A computer with a compromised host file will go to the fake Web site even if a user types in the correct Internet address or clicks on an affected bookmark entry (Rouse, Pharming)
Computer Viruses
- are small programs or scripts that can negatively affect the health of your computer. These malicious little programs can create files, move files, erase files, consume your computer's memory, and cause your computer not to function correctly. Some viruses can duplicate themselves, attach themselves to programs, and travel across networks. In fact opening an infected e-mail attachment is the most common way to get a virus (Christensson, Virus Definition 2011).
Spyware
- is software that "spies" on your computer where it captures information like Web browsing habits, e-mail messages, usernames and passwords, and credit card information. If left unchecked, the software can transmit this data to another person's computer over the Internet. It can be installed when you open an e-mail attachment containing the malicious software. It can also be installed when you install another program that has a spyware installer attached to it (Christensson, Spyware Definition 2006
Pop-ads
- a type of window that appears on top of (over) the browser window of a Web site that a user has visited (Pop-up Ad n.d.). It is also called as pop-up ads. It can also be used by hackers to steal your personal information (such as your bank details). Clicking pop-up ads can redirect you to sites that can infect your computer and system files (What Causes Pop-up Ads and How to Remove Them 2019).
Hacker
- a clever or expert programmer who can gain unauthorized access to other computers. He can "hack" his way through the security levels of a computer system or network (Christensson, Hacker Definition 2006). And can vandalizes the victims’ website, steals personal information, obtains intellectual property, and performs credit card fraud.
There are also Common Threats to Personal Safety. They are the following:
Cyberstalking
– is the same as physical stalking by giving unwanted obsessive attention to a specific person like following, secret surveillance, persistent and manipulative calling and texting, and other means of approaching the victim unexpectedly but cyber stalkers rely on online technology to do it. Email, social networks, instant messaging, personal data available online – everything on the Internet can be used by cyberstalks to make inappropriate contact with their victims (Andrea 2020).
Cyberbullying
- is bullying that takes place over digital devices like cell phones, computers, and tablets. It can occur through SMS, Text, and apps, or online in social media, forums, or gaming where people can view, participate in, or share content. It includes sending, posting, or sharing negative, harmful, false, or mean content about someone else like sharing personal or private information causing embarrassment or humiliation. Some cyberbullying crosses the line in to unlawful or criminal behavior (What Is Cyberbullying 2020).
Online Predation
- is the act of engaging an underage minor into inappropriate sexual relationships through the internet. Online predators may attempt to initiate and seduce minors into relationships through the use of chat rooms or internet forums. Online predators may try to lure kids and teens into sexual conversations or even face-to-face meetings. Predators will sometimes send obscene material or request that kids send pictures of themselves (Internet Safety for Kids-Staying safe from online predators n.d.).
Flaming
- is the act of saying mean things online, usually in ALL CAPS, and often in a public forum with the intention to humiliate
CONTINUE TO LESSON 2
MARIA FATIMA E. VALDEZ
SHS ICT INSTRUCTOR
San Jose Del Monte National High School
CSJDM, Bulacan