Sei sulla pagina 1di 12

Due Jul 12, 10:30 AM

Assignment and Research: Online Netiquette


Hello Class!
I will be giving you some sort of non-painful research for our next topic to discuss
during our Face2Face Meetings on Thursday.

PART I. Research about:


1. What is Netiquette?
2. What is internet Safety?
3. What are the Different Kinds of Malware?

I am not requiring you to submit your printed assignments HOWEVER, be


prepared for an interactive classroom discussion and recitation about what you
have researched.

PART II. Essay:


4. Share with us the best way to stay protected online (3 paragraphs or more)

To answer the question number 4, comment your best answer below.


Best answer will received some sort of plus points.

FOR QUESTIONS 1-3, SUBMIT YOUR WORK BY COPY-PASTING IT ON THE COMMENT


SECTION
FOR QUESTION NO 4. COMMENT YOUR ANSWER
1. What is Netiquette?

Netiquette is short for "Internet etiquette." Just like etiquette is a code of polite
behavior in society, netiquette is a code of good behavior on the Internet. This
includes several aspects of the Internet, such as email, social media, online
chat, web forums, website comments, multiplayer gaming, and other types of
online communication.

While there is no official list of netiquette rules or guidelines, the general idea is to
respect others online. Below are ten examples of rules to follow for good
netiquette:

1. Avoid posting inflammatory or offensive comments online (a.k.a flaming).

2. Respect others' privacy by not sharing personal information, photos, or


videos that another person may not want published online.

3. Never spam others by sending large amounts of unsolicited email.

4. Show good sportsmanship when playing online games, whether you win
or lose.

5. Don't troll people in web forums or website comments by repeatedly


nagging or annoying them.

6. Stick to the topic when posting in online forums or when commenting on


photos or videos, such as YouTube or Facebook comments.

7. Don't swear or use offensive language.

8. Avoid replying to negative comments with more negative comments.


Instead, break the cycle with a positive post.

9. If someone asks a question and you know the answer, offer to help.

10. Thank others who help you online.

The Internet provides a sense of anonymity since you often do not see or hear
the people with whom you are communicating online. But that is not an excuse
for having poor manners or posting incendiary comments. While some users may
feel like they can hide behind their keyboard or smartphone when posting
online, the fact is they are still the ones publishing the content. Remember – if
you post offensive remarks online and the veil of anonymity is lifted, you will have
to answer for the comments you made.

In summary, good netiquette benefits both you and others on the Internet.
Posting a positive comment rather than a negative one just might make
someone's day.

From: Christensson, P. (2017, December 30). Netiquette Definition. Retrieved


2018, Jul 11, from https://techterms.com

2. What is internet Safety?

Internet safety or online safety is trying to be safe on the internet and is the
knowledge of maximizing the user's personal safety and security risks to private
information and property associated with using the internet, and the self-
protection from computer crime in general.

As the number of internet users continues to grow worldwide, internets,


governments and organizations have expressed concerns about the safety of
children using the Internet. Safer Internet Day is celebrated worldwide in
February to raise awareness about internet safety. In the UK the Get Safe Online
campaign has received sponsorship from government agency Serious
Organized Crime Agency (SOCA) and major Internet companies such as
Microsoft and eBay.

Information security

Sensitive information such as personal information and identity, passwords are


often associated with personal property (for example, bank accounts) and
privacy and may present security concerns if leaked. Unauthorized access and
usage of private information may result in consequence such as identity theft, as
well as theft of property. Common causes of information security breaches
include:
Phishing

Phishing is a type of scam where the scammers disguise as a trustworthy source


in attempt to obtain private information such as passwords, and credit card
information, etc. through the internet. Phishing often occurs through emails and
instant messaging and may contain links to websites that direct the user to enter
their private information. These fake websites are often designed to look
identical to their legitimate counterparts to avoid suspicion from the user.

Internet scams

Internet scams are schemes that deceive the user in various ways in attempt to
take advantage of them. Internet scams often aim to cheat the victim of
personal property directly rather than personal information through false
promises, confidence tricks and more.

Malware

Malware, particularly spyware, is malicious software disguised as software


designed to collect and transmit private information, such as passwords, without
the user's consent or knowledge. They are often distributed through e-mail,
software and files from unofficial locations. Malware is one of the most prevalent
security concerns as often it is impossible to determine whether a file is infected,
despite the source of the file.

Personal safety

The growth of the internet gave rise to many important services accessible to
anyone with a connection. One of these important services is digital
communication. While this service allowed us to communicate with others
through the internet, this also allowed the communication with malicious users.
While malicious users often use the internet for personal gain, this may not be
limited to financial/material gain. This is especially a concern to parents and
children, as children are often targets of these malicious users. Common threats
to personal safety include: phishing, internet scams, malware, cyberstalking,
cyberbullying, online preditions and sextortion.

Cyberstalking

Cyberstalking is the use of the Internet or other electronic means to stalk or


harass an individual, a group of individuals, or an organization. It may include
the making of false accusations or statements of fact (as in defamation),
monitoring, making threats, identity theft, damage to data or equipment, the
solicitation of minors for sex, or gathering information that may be used to
harass. According to a study conducted by Baum et al. (2009), the rate of
assault through electronic means such as e-mail or instant messaging was over
one in four out of all stalking victims in the study.

Cyberbullying

Cyberbullying is the attack upon an individual or group through the use of


electronic means such as instant messaging, social media, e-mail and other
forms of online communication with the intent to abuse, intimidate, or
overpower. In a 2012 study of over 11,925 students in the United States, it was
indicated that 23% of adolescents reported being a victim of cyber bullying,
30% of which reported experiencing suicidal behavior.

Online predation

Online predation is the act of engaging an underage minor into inappropriate


sexual relationships through the internet. Online predators may attempt to
initiate and seduce minors into relationships through the use of chat rooms or
internet forums. In a sample of 216 incarcerated sexual offenders, the behavior
characteristics that emerged were categorized into three groups: A)
manipulative - typically a child molester; B) Opportunist - typically a rapist and
C) Coercive being a mixture of both rapists and child molesters.
Obscene/offensive content

Various websites on the internet contain material that some deem offensive,
distasteful or explicit, which may often be not of the user's liking. Such websites
may include internet, shock sites, hate speech or otherwise inflammatory
content. Such content may manifest in many ways, such as pop-up ads and
unsuspecting links.

Sextortion

Sextortion, especially via the use of webcams, is a concern, especially for those
who use webcams for flirting and cybersex. Often this involves a cybercriminal
posing as someone else - such as an attractive person - initiating
communication of a sexual nature with the victim. The victim is then persuaded
to undress in front of a webcam, and may also be persuaded to engage in
sexual behaviour, such as masturbation. The video is recorded by the
cybercriminal, who then reveals their true intent and demands money or other
services (such as more explicit images of the victim, in cases of online
predation), threatening to publicly release the video and send it to family
members and friends of the victim if they do not comply. A video highlighting
the dangers of sextortion has been released by the National Crime Agency in
the UK to educate people, especially given the fact that blackmail of a sexual
nature may cause humiliation to a sufficient extent to cause the victim to take
their own life, in addition to other efforts to educate the public on the risks of
sextortion.

From: Wikipedia contributors. (2018, July 9). Internet safety. In Wikipedia, The Free
Encyclopedia. Retrieved 14:43, July 11, 2018,
from https://en.wikipedia.org/w/index.php?title=Internet_safety&oldid=84950807
5

3. What are the Different Kinds of Malware?

What is Malware?
Malware is short for malicious software, meaning software that can be used to
compromise computer functions, steal data, bypass access controls, or
otherwise cause harm to the host computer. Malware is a broad term that refers
to a variety of malicious programs. This post will define several of the most
common types of malware; adware, bots, bugs, rootkits, spyware, Trojan horses,
viruses, and worms.

Adware

Adware (short for advertising-supported software) is a type of malware that


automatically delivers advertisements. Common examples of adware include
pop-up ads on websites and advertisements that are displayed by software.
Often times software and applications offer “free” versions that come bundled
with adware. Most adware is sponsored or authored by advertisers and serves as
a revenue generating tool. While some adware is solely designed to deliver
advertisements, it is not uncommon for adware to come bundled with spyware
(see below) that is capable of tracking user activity and stealing information.
Due to the added capabilities of spyware, adware/spyware bundles are
significantly more dangerous than adware on its own.

Bot

Bots are software programs created to automatically perform specific


operations. While some bots are created for relatively harmless purposes (video
gaming, internet auctions, online contests, etc), it is becoming increasingly
common to see bots being used maliciously. Bots can be used in botnets
(collections of computers to be controlled by third parties) for DDoS attacks, as
spambots that render advertisements on websites, as web spiders that scrape
server data, and for distributing malware disguised as popular search items on
download sites. Websites can guard against bots with CAPTCHA tests that verify
users as human.

Bug

In the context of software, a bug is a flaw produces an undesired outcome.


These flaws are usually the result of human error and typically exist in the source
code or compilers of a program. Minor bugs only slightly affect a program’s
behavior and as a result can go for long periods of time before being
discovered. More significant bugs can cause crashing or freezing. Security bugs
are the most severe type of bugs and can allow attackers to bypass user
authentication, override access privileges, or steal data. Bugs can be prevented
with developer education, quality control, and code analysis tools.

Ransomware

Ransomware is a form of malware that essentially holds a computer system


captive while demanding a ransom. The malware restricts user access to the
computer either by encrypting files on the hard drive or locking down the system
and displaying messages that are intended to force the user to pay the
malware creator to remove the restrictions and regain access to their computer.
Ransomware typically spreads like a normal computer worm (see below) ending
up on a computer via a downloaded file or through some other vulnerability in a
network service.

Rootkit

A rootkit is a type of malicious software designed to remotely access or control a


computer without being detected by users or security programs. Once a rootkit
has been installed it is possible for the malicious party behind the rootkit to
remotely execute files, access/steal information, modify system configurations,
alter software (especially any security software that could detect the rootkit),
install concealed malware, or control the computer as part of a botnet. Rootkit
prevention, detection, and removal can be difficult due to their stealthy
operation. Because a rootkit continually hides its presence, typical security
products are not effective in detecting and removing rootkits. As a result, rootkit
detection relies on manual methods such as monitoring computer behavior for
irregular activity, signature scanning, and storage dump analysis. Organizations
and users can protect themselves from rootkits by regularly patching
vulnerabilities in software, applications, and operating systems, updating virus
definitions, avoiding suspicious downloads, and performing static analysis scans.
Spyware

Spyware is a type of malware that functions by spying on user activity without


their knowledge. These spying capabilities can include activity
monitoring, collecting keystrokes, data harvesting (account information, logins,
financial data), and more. Spyware often has additional capabilities as well,
ranging from modifying security settings of software or browsers to interfering
with network connections. Spyware spreads by exploiting software
vulnerabilities, bundling itself with legitimate software, or in Trojans.

Trojan Horse

A Trojan horse, commonly known as a “Trojan,” is a type of malware that


disguises itself as a normal file or program to trick users into downloading and
installing malware. A Trojan can give a malicious party remote access to an
infected computer. Once an attacker has access to an infected computer, it is
possible for the attacker to steal data (logins, financial data, even electronic
money), install more malware, modify files, monitor user activity (screen
watching, keylogging, etc), use the computer in botnets, and anonymize
internet activity by the attacker.

Virus

A virus is a form of malware that is capable of copying itself and spreading to


other computers. Viruses often spread to other computers by attaching
themselves to various programs and executing code when a user launches one
of those infected programs. Viruses can also spread through script files,
documents, and cross-site scripting vulnerabilities in web apps. Viruses can be
used to steal information, harm host computers and networks, create botnets,
steal money, render advertisements, and more.

Worm

Computer worms are among the most common types of malware. They spread
over computer networks by exploiting operating system vulnerabilities.
Worms typically cause harm to their host networks by consuming bandwidth
and overloading web servers. Computer worms can also contain “payloads”
that damage host computers. Payloads are pieces of code written to perform
actions on affected computers beyond simply spreading the worm. Payloads
are commonly designed to steal data, delete files, or create botnets. Computer
worms can be classified as a type of computer virus, but there are several
characteristics that distinguish computer worms from regular viruses. A major
difference is that computer worms have the ability to self-replicate and spread
independently while viruses rely on human activity to spread (running a
program, opening a file, etc). Worms often spread by sending mass emails with
infected attachments to users’ contacts.

Malware Symptoms

While these types of malware differ greatly in how they spread and infect
computers, they all can produce similar symptoms. Computers that are infected
with malware can exhibit any of the following symptoms:

 Increased CPU usage

 Slow computer or web browser speeds

 Problems connecting to networks

 Freezing or crashing

 Modified or deleted files

 Appearance of strange files, programs, or desktop icons

 Programs running, turning off, or reconfiguring themselves (malware will


often reconfigure or turn off antivirus and firewall programs)

 Strange computer behavior

 Emails/messages being sent automatically and without user’s knowledge


(a friend receives a strange email from you that you did not send)

Malware Prevention and Removal


There are several general best practices that organizations and individual users
should follow to prevent malware infections. Some malware cases require
special prevention and treatment methods, but following these
recommendations will greatly increase a user’s protection from a wide range of
malware:

 Install and run anti-malware and firewall software. When selecting


software, choose a program that offers tools for detecting, quarantining,
and removing multiple types of malware. At the minimum, anti-malware
software should protect against viruses, spyware, adware, Trojans, and
worms. The combination of anti-malware software and a firewall will
ensure that all incoming and existing data gets scanned for malware and
that malware can be safely removed once detected.

 Keep software and operating systems up to date with current vulnerability


patches. These patches are often released to patch bugs or other security
flaws that could be exploited by attackers.

 Be vigilant when downloading files, programs, attachments, etc.


Downloads that seem strange or are from an unfamiliar source often
contain malware.

Spam

Spam is the electronic sending of mass unsolicited messages. The most common
medium for spam is email, but it is not uncommon for spammers to use instant
messages, texting, blogs, web forums, search engines, and social media. While
spam is not actually a type of malware, it is very common for malware to spread
through spamming. This happens when computers that are infected with viruses,
worms, or other malware are used to distribute spam messages containing more
malware. Users can prevent getting spammed by avoiding unfamiliar emails
and keeping their email addresses as private as possible.

From: DuPaul, N. (2012, October 12). Common Malware Types: Cybersecurity


101. Retrieved from https://www.veracode.com/blog/2012/10/common-
malware-types-cybersecurity-101
4. Share with us the best way to stay protected online (3 paragraphs or more)

There are plenteous ways that end-users utilized to stay protected when
accessing websites online. One of which is through installing legitimate anti-
malware programs, apps or software in workstations, home computers, and
handheld electronic devices to hinder and restrict access to malicious
information on your local computer or device. Malwarebytes Anti-Malware
Software is one of its examples. It quarantines applications that can be risky to
your operating system. From time-to-time, the availability of antivirus programs
affect the performance of the device as well as its CPU usage.

It is a better alternative to use Operating System such as Ubuntu because


it is not common to end-users. Linux and Unix-based operating systems (Ubuntu,
Mac OS X, etc.) tend to have a lower probability to execute malware because
of their unique kernel and sandboxed environments than using Microsoft
Windows. In addition, they are not capable of running executable files (.exe)
and VBScript (.vbs) as those are the most common type of files associated with
harmful programs. To recover files that are encrypted, end-users typically write a
code to decrypt that file. Take note that this method is complicated if you are a
newbie computer user!

Make strong and long passwords. Use special characters where allowed
and mix in capital letters and turn on two-factor authentication wherever
available. Either remember to use a unique password for each account and
write them down in a safe place or use a secure password manager. Limit your
business on open Wi-Fi. At the coffee shop, hotel or on the airplane, people can
sniff out your internet traffic. Use a trusted virtual private network if you need to
do sensitive stuff like financial operations.

Be very wary of what you click on. Delete suspicious emails. Do not open
attachments unless you are sure they are safe. Be careful visiting unfamiliar
websites and do not click OK or yes blindly!

Potrebbero piacerti anche