You are on page 1of 4

1 Netiquette

Netiquette is a combination of the words network and etiquette, and is defined as a set of rules
for acceptable online behavior. Similarly, online ethics focuses on the acceptable use of online
resources in an online social environment. Both phrases are frequently interchanged and are
often combined with the concept of a ’netizen’ which itself is a contraction of the words
internet and citizen and refers to both a person who uses the internet to participate in society,
and an individual who has accepted the responsibility of using the internet in productive and
socially responsible ways. Underlying this overall concept of socially responsible internet use
are a few core pillars, though the details underneath each pillar are still subject to debate.

2 Cyber security
Cyber security is the body of technologies, processes and practices designed to protect
networks, computers, programs and data from attack, damage or unauthorized access. In a
computing context, security includes both cyber security and physical security.

3 Cyber crime
Cybercrime is an issue which impacts the lives of many Australians. Cybercrimes are crimes
which are: directed at computers or other devices (for example, hacking), and
where computers or other devices are integral to the offence (for example, online fraud, identity
theft and the distribution of child exploitation material). Common types of cybercrime include
hacking, online scams and fraud, identity theft, attacks on computer systems and illegal or
prohibited online content. The effect of cybercrime can be extremely upsetting for victims, and
not necessarily just for financial reasons. Victims may feel that their privacy has been violated,
and that they are powerless. Unfortunately, as Australia’s reliance on technology grows, the
cost and incidence of cybercrime is expected to increase.

4 Virus
Virus, an infectious agent of small size and simple composition that can multiply only in living
cells of animals, plants, or bacteria. The name is from a Latin word meaning “slimy liquid” or
“poison.” Viruses are tiny organisms that may lead to mild to severe illnesses in humans,
animals and plants. This may include flu or a cold to something more life threatening like
HIV/AIDS.

5 Malware
Malware, or malicious software, is any program or file that is harmful to a computer user.
Malware includes computer viruses, worms, Trojan horses and spyware. These malicious
programs can perform a variety of functions, including stealing, encrypting or deleting sensitive
data, altering or hijacking core computing functions and monitoring users' computer activity
without their permission.

6 Worms
A computer worm is a type of malicious software program whose primary function is to infect
other computers while remaining active on infected systems.
A computer worm is self-replicating malware that duplicates itself to spread to uninfected
computers. Worms often use parts of an operating system that are automatic and invisible to the
user. It is common for worms to be noticed only when their uncontrolled replication consumes
system resources, slowing or halting other tasks.

7 Key logger
A key logger (keystroke logging) is a type of surveillance software that once installed on a
system, has the capability to record every keystroke made on that system. The Recording is
saved in a log file, usually encrypted.
A key logger can record instant messages, email, and capture any information you type at any
time using your keyboard, including usernames, passwords and other personally identifiable
information (pii). The log file created by the keylogger can then be sent to a specified receiver.
Some keylogger programs will also record any email addresses you use and the URLs of any
websites you visit.

8 What can we do to make ourselves secure when we use internet?


1. Use passwords with superhero strength
We could write a whole article about this, because the fact is there is a huge range of ways to
keep your passwords secure.
That said, there are a few key elements to always keep in mind:
 Use different passwords across your accounts.
 Use a mixture of numbers, and both upper- and lower-case characters.
 Don’t be obvious with your word selection, and if you want to be really good, don’t
choose a word at all.
 Change your password twice year, at the very least.
 Never share your password with anyone.
If you already have these elements in place, you’re well on your way to a strong password.
2. Ask yourself: Is your Internet connection secure?
Many Internet connections are not secure, especially if they’re Wi-Fi connections. In fact, often
people don’t realize that public Wi-Fi – such as the connections offered in coffee shops, airports
and hotels – are often very risky places do important things like e-mail, banking, and social
networking. In today’s world of multiple devices, it is important to trust the network you’re
connecting to – whether you’re using a smartphone, laptop, tablet, or a public computer.
So how do you do it?
 Be sure public networks are secured using WPA or WPA2 protocol, and remember that a
password login is not an indication of encryption. Often, the password is simply used to
pass the pay wall or provide data to the network host.
 The same goes for at home. You must take extra steps to ensure home and office
wireless routers are set to WPA or WPA2 encryption protocols, because often wireless
routers are shipped with this feature turned off.
If in doubt, it’s always best to use a personal Internet encryption solution whenever possible.
3. Stay updated, stay protected
Those pesky pop-ups reminding you to update your software, browser or operating system can
be a pain, but it is very important that you heed their warnings as soon as new service packs
become available. These updates usually take little to no effort to install and often contain
important security upgrades that will reduce how vulnerable you are to malicious activity.
In that same vein, always ensure you have trusted anti-virus software to protect you from
malware and other viruses.
4. Have a critical eye
Always be mindful of how you surf and who you’re communicating with.
 Be skeptical of e-mails offering you things that are too good to be true – even if it looks
like it is coming from a friend, family member or co-worker.
 Remember that no one has any reason to ask you for your password or money,
especially when contacting you via e-mail or social media.
5. Surf with caution
Continue to keep that critical eye when you come across strange or unidentified links. To protect
yourself against cybercriminals who could be phishing for your personal information, resist the
urge to click on anything that that seems fishy if.
The same goes for pasting unfamiliar text into your address bar.
6. Use HTTPS whenever you can
Websites that have https:// before the web address are adding an extra layer of security by
encrypting your browsing. It is best to use https:// whenever possible. Most important, never
send bank info, credit card numbers, confidential e-mails, or other sensitive data unless you’re
sure you’re on a secure site.
The best way to check if you’re on a secure site? Check the URL in the address bar for the
https:// and then look for the lock icon in the bottom-right corner of your browser_._
7. Shared computers: Use carefully!
Attention to detail is key when using shared computers at work or in public spaces because
many websites leave you automatically logged in after you close the browser. While some of us
find that to be very convenient on our home computers, it’s not always safe: What happens if
someone launches your browser and has access to all of your e-mail, contacts and social media
activity? Leaving your personal account open puts you at risk for others to access and use your
information. So, no matter what, always be sure to log out of accounts, and clear the browsing
history, cookies and cache before leaving the public computer. This also isn’t a bad habit to
consider for things like work and smartphones and laptops – because you just never know what
could happen. If you integrate these seven simple tips into your everyday you can enjoy the
peace of mind that comes from knowing you’re surfing safely.

9 Ransom ware
Ransomware is a type of malware that prevents or limits users from accessing their system,
either by locking the system's screen or by locking the users' files unless a ransom is paid. More
modern ransom ware families, collectively categorized as crypto-ransom ware, encrypt certain
file types on infected systems and forces users to pay the ransom through certain online
payment methods to get a decrypt key.
10 Phishing

Phishing is a form of fraud in which an attacker masquerades as a reputable entity or person in


email or other communication channels. The attacker uses phishing emails to distribute
malicious links or attachments that can perform a variety of functions, including the extraction of
login credentials or account information from victims. Phishing is popular with cybercriminals, as
it is far easier to trick someone into clicking a malicious link in a seemingly legitimate phishing
email than trying to break through a computer's defenses.

11 Pharming
Pharming (pronounced ‘farming’) is a form of online fraud very similar to phishing as pharmers
rely upon the same bogus websites and theft of confidential information. However, where
phishing must entice a user to the website through ‘bait’ in the form of a phony email or link,
pharming re-directs victims to the bogus site even if the victim has typed the correct web
address. This is often applied to the websites of banks or e-commerce sites.

12 References
1 https://www.webroot.com/ca/en/home/resources/tips/ethics-and-legal/ethics-netiquette-and-
online-ethics-what-are-they
2 http://whatis.techtarget.com/definition/cybersecurity
3 https://www.acorn.gov.au/learn-about-cybercrime
4 https://www.britannica.com/science/virus
https://www.news-medical.net/health/What-is-a-Virus.aspx
5 http://searchsecurity.techtarget.com/definition/malware
6 http://searchsecurity.techtarget.com/definition/worm
7 https://www.webopedia.com/TERM/K/keylogger.html
8 https://www.surfeasy.com/blog/7-habits-highly-secure-internet-use/
9 https://www.trendmicro.com/vinfo/us/security/definition/ransomware
10 http://searchsecurity.techtarget.com/definition/phishing
11 https://us.norton.com/cybercrime-pharming

You might also like