Internet safety: Difference between revisions
ClueBot NG (talk | contribs) m Reverting possible vandalism by 50.202.237.129 to version by Petrb. False positive? Report it. Thanks, ClueBot NG. (1832862) (Bot) |
No edit summary |
||
Line 170: | Line 170: | ||
* [http://www.rcmp-grc.gc.ca/scams-fraudes/rep-sig-eng.htm RCMP – Reporting Scams & Frauds] |
* [http://www.rcmp-grc.gc.ca/scams-fraudes/rep-sig-eng.htm RCMP – Reporting Scams & Frauds] |
||
* [http://www.usa.gov/Citizen/Topics/Internet-Fraud.shtml Internet Fraud Information – USA.gov] |
* [http://www.usa.gov/Citizen/Topics/Internet-Fraud.shtml Internet Fraud Information – USA.gov] |
||
also cpu are gay! |
|||
[[Category:Crime prevention]] |
[[Category:Crime prevention]] |
Revision as of 16:08, 12 May 2014
This article has multiple issues. Please help improve it or discuss these issues on the talk page. (Learn how and when to remove these messages)
|
Internet safety, or online safety, is the knowledge of maximizing the user's personal safety and security risks on private information and property associated with using the internet, and the self-protection from computer crime in general. As the number of internet users continues to grow worldwide,[1] internet safety is a growing concern for both children and adults. Common concerns regarding safety on the internet include: malicious users (spam, phishing, cyberbullying, cyberstalking etc.), websites and software (malware, computer viruses, etc.) and various types of obscene or offensive content. Several crimes can be committed on the Internet such as stalking, identity theft and more. Most social networking and chat sites have a page about safety. Numerous groups, governments and organizations have expressed concerns about the safety of children using the Internet. Safer Internet Day is celebrated worldwide in February to raise awareness about internet safety.[2] In the UK the Get Safe Online campaign has received sponsorship from government agency Serious Organized Crime Agency (SOCA) and major Internet companies such as Microsoft and eBay.[3]
Information security
Sensitive information such as personal information and identity, passwords are often associated with personal property (for example, bank accounts) and privacy and may present security concerns if leaked. Unauthorized access and usage of private information may result in consequence such as identity theft, as well as theft of property. Common causes of information security breaches include:
Phishing
Phishing is a type of scam where the scammers disguise as a trustworthy source in attempt to obtain private information such as passwords, and credit card information, etc. through the internet. Phishing often occurs through emails and instant messaging and may contain links to websites that direct the user to enter their private information. These fake websites are often designed to look identical to their legitimate counterparts to avoid suspicion from the user.[4]
Internet scams
Internet scams are schemes that deceive the user in various ways in attempt to take advantage of them. Internet scams often aim to cheat the victim of personal property directly rather than personal information through false promises, confidence tricks and more.
Malware
Malware, particularly spyware, is malicious software disguised as legitimate software designed to collect and transmit private information, such as passwords, without the user's consent or knowledge. They are often distributed through e-mail, software and files from unofficial locations. Malware is one of the most prevalent security concerns as often it is impossible to determine whether a file is infected, despite the source of the file.
Personal safety
The growth of the internet gave rise to many important services accessible to anyone with a connection. One of these important services is digital communication. While this service allowed us to communicate with others through the internet, this also allowed the communication with malicious users. While malicious users often use the internet for personal gain, this may not be limited to financial/material gain. This is especially a concern to parents and children, as children are often targets of these malicious users. Common threats to personal safety include:
Cyberstalking
Cyberstalking is the use of the Internet or other electronic means to stalk or harass an individual, a group of individuals, or an organization. It may include the making of false accusations or statements of fact (as in defamation), monitoring, making threats, identity theft, damage to data or equipment, the solicitation of minors for sex, or gathering information that may be used to harass.
Cyberbullying
Cyberbullying is often an extension of bullying outside the internet, and may take form in many different ways. For example, the malicious user might release images of the user without his or her consent. Because cyberbullying often stems from real-life bullying, this is largely a social concern, rather than internet safety. Cyberbullying occurs more frequently than real-life bullying as the internet provides often provides means to carry out bullying while allowing the perpetrator to remain anonymous and hidden, avoiding backlash in the process.
Online predation
Online predation is the act of engaging an underage minor into inappropriate sexual relationships through the internet. Online predators may attempt to initiate and seduce minors into relationships through the use of chat rooms or internet forums. It is debated whether online predators is actually a threat to internet safety, as many cases take a long time to develop the relationship. As such, targets of online predators may see the relationship as a legitimate attempt at romance.
Obscene/offensive content
Various websites on the internet contain material that some deem offensive, distasteful or explicit, which may often be not of the user's liking. Such websites may include internet pornography, shock sites, hate speech or otherwise inflammatory content. Such content may manifest in many ways, such as pop-up ads and unsuspecting links.
Prevention
Securing information
Keep shared information at a minimum
Cyberstalking and identity theft often begins by malicious users identifying the user through identifying information provided by the user himself. It is important to remember that information posted online may be seen by more people than is originally intended. Social networks make it simple to inadvertently share details about oneself (address, phone number, birthday, etc.), so as a precaution, it is best not to input this type of information onto these websites. It is also a common occurrence for users to make the mistake of sharing small bits of information occasionally, and through the use of search engines and some research it is possible to piece these information together to identify the user. As such, avoid sharing personal information and personal history whenever possible. When creating usernames, websites, or e-mail addresses, avoiding using anything that reveals any useful information such as a year of birth. Passwords and PINs should never be shared under any circumstances.
Passwords
Passwords are often created to keep personal information and property secure.[5] If a password is compromised, it may lead to consequences such as financial theft from online services such as bank accounts. One common way that passwords may be compromised is through repeated guessing. Weak passwords make this process easier, so it is important that passwords be strong. Creating strong passwords is a way of keeping information secure. A strong password may contain the following:[6]
- At least 10 characters
- Both upper and lower case letters
- Numbers
- Symbols (if allowed)
- Does not contain dictionary words
Avoid using simple passwords such as: “password”, “123456”, “qwerty”, “abc123”, names, birthdates, etc. Besides having a strong password, it is important to use different passwords for different accounts. This prevents access to all internet accounts, should someone get hold of a password. It is also good practice to regularly change your passwords.
PINs
PINs, like passwords, are means of keeping information secure. A PIN may consist of at least 4 digits. Birthdays, birth-years, consecutive numbers, repeating numbers, and banking PINs should not be used as PINs for your internet accounts.
Social network websites
Profiles on social network websites may be seen by people you may not know. These websites often have privacy settings that you can alter so you can control who sees you profile and what information they are allowed to see. Do not accept friend requests from people you don't know.
Security software
Through the use of antivirus software, the user can automatically detect, prevent and remove computer viruses and various types of malware. Very often it is impossible for the user alone to identify infected files and software until it is too late, especially if the infected file or software is well disguised as legitimate files. Because of this, it is important that the user keeps antivirus software running on the computer whenever accessing the internet so that the user can filter and block infected files.
Firewalls
A firewall is a program that controls incoming and outgoing internet traffic. Most operating systems come with firewalls. In order to keep your computer and information safe, it is important to keep the firewall on at all times when accessing the internet to prevent unauthorized access. Users are also able to control which specific programs are allowed through the firewall as well as those that are not.
Keeping up-to-date
Many computer software, such as operating systems, are not without flaws. Computer viruses often take advantage of these flaws to gain unauthorized access to a user's computer. When these security vulnerabilities are discovered they are often patched with security updates to eliminate the vulnerability. Operating systems, anti-viruses, and any other programs should be kept up-to-date with the newest security updates in order to keep viruses and harmful software from taking advantage of exploits that have been fixed with updates.[original research?]
Avoid scams
Be cautious of the internet. Avoid misleading ads, strangers with offers, strange e-mails, and questionable websites. Do research to verify the validity of these offers. If someone you know is sending you messages that don’t seem like themselves, their account may have been taken over by somebody trying to get information out of you.[7] The best way to avoid scams is to be fully informed of the deal. Do some research for the following information:[8]
- How exactly does the offer work?
- How trustworthy is the person/company making the offer?
- What was the experience for other users regarding the same offer?
- Is the offer too good to be true?
- Does the offer require payment in advanced?
- Are there hidden costs unknown to the user?
Avoid illegal activity
Downloading torrents and illegal file sharing is a very common distribution method of malware and may inadvertently bring malicious software to your system.
Parental controls
A good way to reduce the possibility of reaching offensive/obscene content is to set up parental controls. Parental controls allow users and parents to place content filters on their computers while using the internet. Content filters limit access to age-appropriate content and any specified type of content the user may dislike.
Most parents agree[dubious – discuss] that parental controls are important to limit children's access to unwanted content on the internet. Studies show[which?] they are under utilized or often not implemented at all. There are two main forms of parental controls hardware and software based systems.[9] Hardware parental controls are installed between household devices and the internet service provider (ISP) such as a router with built in filtering. This parental control can filter content on all devices on a network. Software based parental controls can provide a more in depth solutions specific to each device it is installed on. These controls usually run undetected[citation needed] and in the background. Software controls can provide logs, keystrokes, and can range from broad to specific blocking mechanisms.
Public computer
Public computers, as opposed to personal computers, may be physically accessed by anyone within reach of the computer. Because of this, it is inadvisable to do any processes that involve sensitive information, such as online banking. A common way unauthorized access may occur is through users from public computers not fully logging out and clearing usage data (such as cookies), and allows access of the account to the next user of the public computer. It is also possible that the public computer be infected with malware, unknown to the user. When using public computer terminals, remember to:[10]
- Avoid saving private information such as usernames and passwords
- Don't leave the computer unattended while logged in
- Clear your browsing data when you are about to leave
- Watch out for people looking over your shoulder
Third party programs
Antivirus and anti-malware programs
Antivirus and anti-malware programs help prevent infections from occurring as well as detect and remove them from your computer. A variety of programs are available for use with purchase such as Norton AntiVirus, McAfee VirusScan, and BitDefender Antivirus. There are also a many programs available for download for free such as Microsoft Security Essentials, AVG Anti-Virus, Avast! antivirus, and Malwarebytes' Anti-Malware.
Ad and pop-up blockers
Misleading ads and pop ups can contribute to the accidental downloading of malicious software onto your computer. Most web browsers have internal pop-up blockers. These programs/web browser plug-ins remove the ads.
Password managers
These programs help organize passwords for your internet accounts so you won’t have trouble remembering them. Password Managers encrypt your password data, and in some cases, automatically fill out your user and password data onto websites.
Organizations
Many organizations are involved in making the Internet a safer place. This includes governments,[11] global associations such as Insafe, non-profits[12] and businesses that are affected by problems on the Internet, such as banks.[13]
See also
- Identity fraud
- Incredible Internet
- Internet crime
- Control software:
- Content control software – for high-level filtering, including workplace internet filtering
- Accountability software – for adults who want to be accountable to another for how they use the internet.
- Internet security for information about protecting data and avoiding malware.
- Website reputation rating tools for information about website safety & trustability.
Groups and individuals working in the topic
- ThinkUKnow
- Tween summit
- Youth Internet Safety Survey
- AHTCC – Australian High Tech Crime Centre
- Sonia Livingstone
- DISC foundation
- Childnet
- www.smahrtresearch.com: A social media and internet safety research team at Seattle Children's Research Institute.
References
- ^ Free statistics
- ^ "SAFER INTERNET DAY". Commonwealth of Australia 2013.
- ^ "Get Safe Online".
- ^ "Internet Phishing Alert".
- ^ "Tips for creating a strong password".
- ^ Keeping Your Information Safe Online, Some Strategies
- ^ Avoid scams – How you can stay safe and secure online – Good to Know – Google
- ^ FBI — Internet Fraud
- ^ Wenzel, Elsa. "Parental controls that keep tabs on young Web surfers". CNET.com. Retrieved 2007-03-30.
- ^ Five safety tips for using a public computer | Microsoft Security
- ^ Home | Stay Smart Online
- ^ see for example http://www.cyberethics.info/
- ^ National Cyber Security Awareness Week – NAB
External links
This article's use of external links may not follow Wikipedia's policies or guidelines. (February 2013) |
Parent resources
- Childnet's advice for parents
- Cable in the classroom digital citizenship safety and security page
- Vodafone Digital Parenting page
- iKeepSafe page for parents
- Digital Mom Keeping Kids Safe Online
- RCMP Internet Safety – Tips for Parents
- FBI – A Parent's Guide to Internet Safety
Youth resources
- Childnet's advice for young people
- DEAL.org
- RCMP Internet Safety Tips for 10 to 12 years of age
- RCMP Internet Safety Tips for 13 to 16 years of age
- Explore To Learn - Educating Kids on Internet Safety!
- NetSmartzKids
- NetSmartz Teens
- Internet Safety Tips for Teens
Other resources
- Guide for Children and Kids Safety on the Web
- StaySafeOnline.org – National Cyber Security Alliance
- Childnet
- Australian Government Cyber Safety Plan
- Australian Government Online Safety and Security, also Cyber Security
- Internet Safety Project
- OnGuard Online – a US government website on Internet safety
- How to Stay Safe on the Bleeping Internet – a comprehensive guide to keeping your computer and its information safe and secure
- 30 Tips – How to Stay Safe on the Internet – a large list of internet safety tips
- How you can stay safe and secure online
- RCMP – Reporting Scams & Frauds
- Internet Fraud Information – USA.gov
also cpu are gay!