Email scams are a common form of cybercrime that rely on tricking individuals into giving away personal details, passwords, or money. Scammers often disguise their emails to appear as if they are from someone trustworthy, such as a friend, a bank, or a government agency. These scams can take the form of emotional pleas, false security alerts, or enticing offers. Phishing is a specific type of scam where the attacker tries to lure victims into clicking fraudulent links or downloading malicious attachments. Recognising the signs of scam emails and understanding how to protect yourself are essential skills for anyone using email or social media.
Types of Scam Emails:
Scam emails often pretend to be from someone you know or a trusted company.
Common types include fake emergency requests (e.g., "Help, I’m stuck abroad"), fake PayPal security warnings, fake tax refunds, and fake business deals.
Some scam emails impersonate government or financial institutions.
Clues an Email is a Scam:
Poor spelling/grammar.
Unusual email address or reply-to domain (e.g., .br, .qq).
Urgent or emotional language.
Requests for money via Western Union.
Fake login links to capture credentials.
Suspicious attachments (e.g., HTML forms).
Phishing Emails:
Aim to trick you into giving personal details or clicking fraudulent links.
Examples include fake emails from PayPal or HMRC requesting account confirmation or offering refunds.
Some target students by impersonating the Student Loans Company.
Prevention Tips:
Never click suspicious links.
Don’t download unknown attachments.
Use verified contact details to check requests.
Look for HTTPS and verify URLs before clicking.
Use spam filters and update them regularly.
Check Your Understanding:
What are common types of scam emails?
What signs suggest an email might be a scam?
How does phishing differ from other scams?
How can you protect yourself from phishing attempts?
The Computer Misuse Act makes it illegal to access or modify computer data without permission. Hacking and malware are key threats to computer systems, often used by criminals to steal information, spread viruses, or disrupt services. Malware refers to malicious software designed to damage or gain unauthorised access to computers. Different types of malware include viruses, ransomware, spyware, and logic bombs. Recognising the symptoms of an infected system and taking preventive measures like strong passwords and antivirus software can help reduce risks.
Computer Misuse Act (1990):
Makes it illegal to:
Access someone’s computer without permission.
Modify data without permission.
Access data with intent to commit further crimes.
Hacking:
Unauthorised access to or modification of files.
Reasons include curiosity, theft, revenge, politics, or personal challenge.
How Hackers Operate:
Exploiting outdated software.
Using common passwords or guessing credentials.
Disguising malware in downloads or links.
Malware:
Stands for malicious software.
Enters via infected files or network vulnerabilities.
Types of Malware:
Viruses: Self-replicating and can spread via email or file sharing.
Logic Bombs: Activate on specific dates or actions.
Ransomware: Locks files until a ransom is paid.
Spyware/Browser Hijacks: Change browser settings or steal data.
Macro Viruses: Embedded in documents like Word or Excel templates.
File Infectors: Attach to and alter existing files.
Signs of Malware Infection:
New toolbar appears in browser.
Unexpected homepage changes.
Excessive pop-ups, even offline.
Slower computer performance.
Hard disk activity with no user input.
Protection Tips:
Use antivirus and anti-spyware software.
Avoid clicking on suspicious ads or links.
Don’t visit illegal download sites.
Configure browsers to ask before running files.
Keep all software up-to-date.
Password Security:
Use strong, unique passwords.
Change passwords regularly.
Don’t reuse passwords across sites.
Avoid simple passwords like "password1" or "123456".
Check Your Understanding:
What does the Computer Misuse Act make illegal?
What are common methods used by hackers?
What are different types of malware and how do they behave?
How can you spot and prevent malware infections?
Personal data includes any information that can identify you, such as your name, address, or online activity. Organisations like schools, doctors, and internet companies store this data, and laws are in place to ensure it is kept secure and accurate. If data is not properly protected, it can be stolen and used for identity theft or fraud. Criminals use data-harvesting tools to gather personal information from social media and public websites. Good privacy habits, such as controlling what you share and managing settings, can help you keep your identity safe.
Who Holds Your Data:
Schools, doctors, banks, social media, Google.
Google can store emails, calendar entries, contacts, device info, web searches, and browsing history.
Data Protection Laws:
Data must be:
Accurate and up to date.
Secure from unauthorised access.
Available for users to see on request.
Dangers of Poor Data Protection:
Identity Theft: Criminals use stolen data to:
Open bank accounts.
Apply for jobs or loans.
Commit fraud.
Data Harvesting Tools:
Legal tools can collect info from social media and public sources.
Photos can contain GPS data (GeoTags).
Posts like “Birthday dinner at home” can reveal location, date of birth, and more.
Social Media Privacy Tips:
Turn off location tagging.
Hide personal details (address, phone, date of birth).
Use strong privacy settings.
Don’t add strangers.
Avoid posting clues to passwords.
Security Awareness:
Be aware of ‘shoulder surfing’ (people watching you enter passwords).
Cover PINs and avoid visible data entry in public.
Check Your Understanding:
What types of organisations hold your personal data?
What are the risks of poor data protection?
How can identity theft happen?
What steps can you take to protect your personal data?
Copyright law exists to protect the rights of creators, ensuring they receive recognition and financial reward for their work. It applies to music, films, books, images, code, and other creative works. Copyright lasts for the creator's life plus up to 70 years. Plagiarism, while not always illegal, is unethical and involves passing off someone else’s work as your own. With increasing access to digital content, both copyright infringement and plagiarism have become more common. Understanding the differences between them, and the impact they can have on industries and individuals, is crucial in digital citizenship.
Copyright Law:
Protects creators from having their work copied or redistributed without permission.
Duration: Life of the author plus up to 70 years.
Examples of Infringement:
Sharing music or films from unofficial sources.
Using music in a video without permission.
Downloading from illegal file-sharing networks.
Legal Issues Around Kodi:
Kodi software can be used to illegally stream content.
Traders selling pre-loaded boxes can face legal action.
Original Kodi software was not illegal.
Damage of Copyright Theft:
Harms artists, producers, and industry workers.
Causes financial losses and job cuts.
DR and UK industries lose millions from piracy.
Tracking Infringers:
Every device has a unique IP address.
ISPs can identify illegal downloaders.
What Artists Say:
Lady Gaga accepts piracy but earns from touring.
Elton John believes piracy harms new and struggling musicians.
Plagiarism:
Copying work and claiming it as your own.
Common in essays, images, music, code.
Ethical offence, not necessarily illegal.
Detection:
Universities use software to detect plagiarism by comparing student work with online sources.
Check Your Understanding:
What is the purpose of copyright law?
What are examples of copyright infringement using computers?
How do copyright theft and plagiarism differ?
How do organisations detect plagiarism and piracy?
Using computers for long periods can lead to health problems such as eye strain, back pain, and repetitive strain injuries. Employers have legal responsibilities to protect their workers by providing safe equipment and working environments. Good workstation setup and regular breaks help reduce these risks. In addition, the rise of electronic waste presents environmental dangers. Computers contain toxic materials that can pollute land and water. Safe recycling and disposal practices are vital, and users must ensure personal data is completely removed from old devices to prevent data theft.
Common Health Problems:
Eye strain and headaches from screen use.
Back pain from poor posture.
Repetitive Strain Injury (RSI) from frequent typing or mouse use.
Electronic Screen Syndrome, Text Claw, and Blue Light Syndrome are emerging issues.
Safety Guidelines (for employers):
Provide:
Tiltable, anti-glare screens.
Adjustable chairs and footrests.
Adequate lighting.
Frequent breaks.
Free eye tests for screen-heavy roles.
Correct Workstation Setup:
Screen 45 cm from eyes.
Screen at/below eye level.
Chair supporting lower back.
Elbows at 90–120 degrees.
Wrist support for mouse.
Feet flat on floor.
Good Habits:
Regular breaks (e.g., every 15 minutes).
Proper lighting (avoid glare).
Stand/stretch often.
Employer Responsibility:
Must protect employees and visitors.
Can face fines or prison for violations.
E-Waste Issues:
Toxic materials in electronics pollute soil, water, and air.
Burning e-waste causes air pollution.
Disposal Methods:
Return to manufacturer (buy-back schemes).
Use professional waste disposal.
Donate to charities.
Give to trusted friends/family.
Data Security on Old Devices:
Simply deleting files or reformatting doesn’t erase data.
Use secure wiping tools to prevent data recovery.
Check Your Understanding:
What health risks can come from computer overuse?
What are employers required to do by law?
What makes a workstation safe and comfortable?
Why is e-waste dangerous and how can it be managed responsibly?
What must you do before disposing of a computer to keep your data safe?