Online Safety and Security
The Internet, truly, is a powerful tool. It can be used to promote your business, gain new friends, and stay in touch with the old ones. It is also a source of entertainment. But like most things in this world, there is always “another side of the coin.” The Internet is one of the most dangerous places, especially if you do not know what you are doing.
Internet Threats
Internet threats refer to various risks and security challenges that individuals, organizations, and systems face when using the internet. These threats can have a wide range of negative consequences, including data breaches, financial losses, identity theft, and disruption of online services. Here are some common internet threats:
Malware: Malicious software, including viruses, worms, Trojans, ransomware, and spyware, can infect computers and mobile devices, compromising their security and privacy. Malware (malicious software) comes in various forms, and here are some common examples:
Viruses: Viruses are programs that can replicate and attach themselves to legitimate files or programs. They can infect a computer when the user runs an infected file. For example, the "ILOVEYOU" virus in 2000 spread through email attachments and caused widespread damage by overwriting files.
Worms: Worms are self-replicating malware that spread across networks and systems without user intervention. The "Conficker" worm, which emerged in 2008, infected millions of computers by exploiting vulnerabilities in Windows.
Trojans: Trojans disguise themselves as legitimate software to deceive users into executing them. Once installed, they can give attackers unauthorized access to a victim's computer. An example is the "Zeus" Trojan, which targeted online banking credentials.
Ransomware: Ransomware encrypts a victim's files or entire system, rendering them inaccessible. Attackers demand a ransom in exchange for the decryption key. The "WannaCry" ransomware attack in 2017 impacted organizations worldwide, including healthcare systems and government agencies.
Spyware: Spyware secretly collects information about a user's online activities and transmits it to a remote server. It can capture sensitive data, such as login credentials or browsing habits. "CoolWebSearch" is an example of spyware that was notorious for its intrusive behavior.
Adware: Adware displays unwanted advertisements to users, often in the form of pop-up ads or browser redirects. While not always malicious, it can be annoying and invasive. "Superfish" adware, pre-installed on some Lenovo laptops, caused privacy concerns in 2015.
Phishing: Phishing attacks involve tricking users into revealing sensitive information, such as passwords or credit card numbers, by posing as a trustworthy entity. This is often done through fake emails, websites, or messages.
Data Breaches: Unauthorized access to databases and systems can lead to the exposure of sensitive information, such as personal records, financial data, and login credentials.
Identity Theft: Cybercriminals may steal personal information, such as Social Security numbers or bank account details, to commit fraud or gain unauthorized access to accounts.
Spam – unwanted email mostly from bots or advertisers. It can be used to send malware.
To protect against internet threats, individuals and organizations should adopt security best practices, including using strong, unique passwords, keeping software and systems up to date, using antivirus and security software, being cautious of suspicious emails and links, and educating themselves about emerging threats. Additionally, implementing a robust cybersecurity strategy and regularly backing up data can help mitigate the impact of potential threats.
Think Before You Click
1. Before you post something on the web, ask these questions to yourself: Would you want your parents or grandparents to see it? Would you want your future boss to see it? Once you post something on the web, you have no control of who sees your posts.
2. Your friends depend on you to protect their reputation online. Talk to your friends about this serious responsibility.
3. Set your post to “private.” In this way, search engines will not be able to scan that post.
4. Avoid using names. Names are easy for search engines to scan.
5. If you feel that a post can affect you or other’s reputation, ask the one who posted it to pull it down or report it as inappropriate.
Copyright Infringement
If you create something—an idea, an invention, a form of literary work, or a research, you have the right of how it should be used by others. This is called intellectual property.
Click here to access your quiz. You must login you your google account if you don't have Create. This is recorded.
or copy this link and paste to your browser
https://docs.google.com/forms/d/e/1FAIpQLSfVltQHjW5LMXWXL6xf5nV9vN7jOiNOXuRYIyfvnoGTES6Ung/viewform?usp=pp_url