0% found this document useful (0 votes)
14 views

Lesson 2.1

Uploaded by

Esher Jabes
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
14 views

Lesson 2.1

Uploaded by

Esher Jabes
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 3

Lesson 2

Safety, Security, and Ethics

Objective
• Apply online safety, security, ethics, and etiquette standards and practice
in the use of ICTs in relation to their specific professional tracks.

Online Safety and Security


The Internet is a powerful tool for learning and communicating with people.
However,
there are many dangers that you must watch out for.

Dangers on the Internet

Email spam
Also known as junk email, it is usually unsolicited commercial email sent
from one source with identical message sent to multiple recipients. Although
some of them are not harmful, deleting them one by one will eat up your
time and can clog your email. Dangerous spam carries virus like Trojan horse
and other malicious software (malware). Spammer is the term used to refer
to a person who creates electronic spam. Spamming is projected to continue
because it is a cheap means of advertising. In addition, many countries do
not have laws to punish spammers.

Email spoofing
This refers to deceitful email practice in which the sender address is
changed, so that it would appear to have come from a different source
usually someone you know. Usually, the reply to address is the source of the
email, and when you unknowingly reply to it you would be replying to the
one who spoofed you. Email spoofing is usually used by spammers to hide
the origin of the spam.

Phishing
This is a deceitful practice of trying to get confidential information such as
passwords and usernames, and credit card details by making it appear as if it
comes from a trustworthy source. Phishing is usually done by email or other
similar means using a popular entity such as Microsoft, Yahoo, Google,
Amazon, and financial institutions to lure you to their website. Internet users
would think that they are accessing a genuine website and through this way,
a phisher would be able to gather sensitive information from internet account
user.

Pharming
This is a dangerous hacker attack on a website which directs all traffic to that
website to another fictitious website. The main object of pharming is to
obtain username and passwords, as well as credit card and financial
information, and use these to steal their money electronically or use the
credit card of the victims. Pharming is a major concern of many online
banking and electronic commerce transactions, which would compromise
many of their client accounts as well as the business. Antivirus and anti-
spyware software cannot prevent and protect one from pharming.

Spyware
This is a computer program that is installed covertly on a personal computer
to collect information or even take control over the computer without the
knowledge of the
user. A spyware program would be able to monitor and collect information
about the user and his internet habits and practices. It is known that spyware
programs also affect the performance and settings of the computer. Major
antivirus companies have incorporated in their products anti-spyware
programs, and many internet-based companies have offered
anti-spyware programs for a fee, and some are free. But you must be careful
which one to use to ensure your protection.

Computer worm
This is a dangerous computer program that replicates itself through a
network. Some worms delete files, others disrupt the network function and
still, others send junk mail from infected computers. Computer worms
usually spread by exploiting weaknesses in operating system, and
manufacturers of this software regularly send free updates to clients to
prevent the spread of the worms. They usually spread on their own without
attaching to a program or file. Users should not run attachments or open
emails from unknown or suspicious sources, delete them immediately. Anti-
virus, anti-spyware, and use of firewall helps to prevent worm attacks, but it
must be updated regularly to ensure current prevention and control.

Trojan horse
This is a form of a malicious software (malware) fronting to perform a good
task, but covertly performs undesirable function with the intention of
entering the computer without the user's consent. Once the malware is
installed in the computer, the Trojan horse can disable the computer's
defenses opening it to unauthorized entry. It can erase data, can allow
access to the victim's computer, can corrupt files, and can be used in
Phishing for bank accounts. Regularly updated antivirus and anti-spyware
programs can detect Trojan horse and can delete them.

Computer virus
This is a program that duplicates itself and then infects the computer. It
spreads like
a real biological virus, wherein it attaches itself to a host program and infect
other computers if it is received by a computer through the internet. The
virus can also be transferred using removable storage media such as
diskette, CD, flash drives, memory cards, and others. Damage by the
computer virus may be mild to severe. Data loss and crippled functionality of
the computer have created specialists to combat deadly computer viruses.
Many antivirus programs are effective against the threats but should be
regularly updated to remain successful in prevention and fight against these
computer viruses.

Hacker
This is a person who can enter and control other people's computer without
authorization. A hacker can enter another's computer, usually vandalizes the
victim's website, steals personal information, obtains intellectual property,
and performs credit card fraud. Firewalls can prevent entry by hackers.

You might also like