Monday 30 November 2015

E-safety

E-Safety

Top Ten E-Safety Tips:
 1. Always think of your personal safety first when using ICT or your mobile phone. Remember it is easy for      anyone to lie about who they are online, so you can never really be sure about who you are talking to.
 2. Do not give out any personal information about yourself online to people you do not know. This includes        your full name, address, street name, postcode, or school name. Only ever give out your location as              Walsall.
3. Never give your contact number to anyone who you don’t know.
 4. It’s a good idea to use a nickname rather than your real name.
 5. Don’t meet people that you have only spoken to online. If you do decide to meet up with anyone in real        life then make sure you take a trusted adult with you and meet in a public place at a busy time.
 6. Never give out pictures online or over a mobile unless you know the person in real life. It is easy for              people to take your pictures and alter them, send them on, or even pretend to be you with them.
 7. Always use private settings whenever you are setting up a social networking page or an Instant                      Messenger (IM) account. This is so people who you don’t want to see your profile can’t.
 8. Anything you post or upload to the internet is there forever so be very careful what you put online.
9. Never go onto webcam with people you don’t know in real life. Webcam images can be recorded and         copied and also shared with other people.
10. If you receive any messages or pictures that worry or upset you talk to an adult you trust. You may also         report it online.

Monday 16 November 2015

Computer security threats

Computer Security Threats
THREAT #1: VIRUS
  A virus is a piece of software that can infect a computer without the permission or knowledge of the user. A virus can only spread when it is transmitted by a user over a network or the Internet, or through removable media such as CDs or memory sticks.
 Danger level: High
Prevalence: Extremely High
 Worst case damage
Some viruses delete files, reformat the hard disk or cause other damage. Others only replicate themselves and may present text, video, or audio messages.
 Prevention, detection and removal:  
Antivirus software detects and eliminates known viruses.

THREAT #2: SPAM
 SPAM is electronic junk email. The amount of spam has now reached 90 billion messages a day. Email addresses are collected from chat rooms, websites, newsgroups.
Danger level: Low
Prevalence: Extremely High
Worst case damage:
Spam can clog a personal mailbox, overload mail servers and impact network performance. Perhaps the real danger of spam is not so much in being a recipient of it as inadvertently becoming a transmitter of it. Spammers frequently take control of computers and use them to distribute spam. Once a user’s computer is compromised, their personal information may also be illegally acquired.
Prevention, detection and removal:
User systems may use spam filters to screen out email messages with suspect titles or from suspect persons, as well email messages from blocked senders.
THREAT #3: SPOOFING
  Spoofing is an attack in which a person or program masquerades as another. A common tactic is to spoof a URL or website.
Danger level: High
Prevalence: Extremely High
 Worst case damage:
Once personal information is acquired, spoofers may use a person’s details to make transactions or create fake accounts in a victim’s name. They can ruin the victims’ credit rating or even deny the victims access to their own accounts.
 Prevention, detection and removal:
As spoofing rely on tricking users rather than advanced technology, the best way to handle these threats is through vigilance. Don’t open emails from unknown sources or click on links embedded in suspect messages.

 THREAT #4: BLENDED THREAT
 A blended threat is a threat that combines different malicious components, such as a worm, a Trojan horse and a virus. In this way, a blended threat uses multiple techniques to attack  itself.
 Danger level: Extremely high
Prevalence: Medium
 Worst case damage:
See respective entries for worm, Trojan horse and virus.
 Prevention, detection and removal:
See respective entries for worm, Trojan horse and virus.

THREAT #5: WORM
computer worm is a self-replicating, malicious software program. Unlike a virus, it does not need to attach itself to an existing program or require user intervention to spread. It uses a network to send copies of itself to other computers on the network.
 Danger level: Very High
Prevalence: Moderate
 Worst case damage:
Worms can cause two types of damage:
  1. Damage to the network
  2. Payload 
Prevention, detection and removal:
Since worms spread by exploiting vulnerabilities in operating systems, computers should be kept current with the latest security updates from operating system vendors.
To prevent infection, users need to be wary of opening unexpected emails and should not run attached files or programs.

Monday 9 November 2015

Digital Citizen Ship

Digital Citizen Ship

Electronic buying and selling of goods. Technology users need to understand that a large share of market economy is being done electronically. Legitimate and legal exchanges are occurring, but the buyer or seller needs to be aware of the issues associated with it.

Nine Elements of Digital CitizenShip:

  1. Digital access: This is perhaps one of the most fundamental blocks to being a digital citizen. However, due to social status, location, and other disabilities.Recently, schools have been becoming more connected with the internet, often offering computers, and other forms of access. This can be offered through kiosks, community centers, and open labs. This most often is associated with the digital divide and factors associated with such.
  2. Digital commerce: This is the ability for users to recognize that much of the economy is regulated online. It also deals with the understanding of the dangers and benefits of online buying, using credit cards online, and so forth. As with the advantages and legal activities- there is also dangerous activities such as illegal downloads, gambling, drug deals, pornography, plagiarism, and so forth.
  3. Digital communication: This element deals with understanding the variety of online communication mediums such as email, instant messaging, Facebook messenger, the variety of apps, and so forth. There is a standard of etiquette associated with each medium.
  4. Digital Literacy: This deals with the understanding of how to use various digital devices. For example, how to properly search for something on a search engine versus a database. How to use various online logs. Oftentimes many educational institutions will help form an individual’s digital literacy.
  5. Digital etiquette: As discussed in the third element, digital communication, this is the expectation that various mediums require a variety of etiquette. Certain mediums demand more appropriate behavior and language than others.
  6. Digital law: This is where enforcement occurs for illegal downloads, plagiarizing, hacking, creating viruses, sending spams, identity theft, cyberbullying, and so forth.
  7. Digital rights and responsibilities: This is the set of rights digital citizens have such as privacy, speech, and so forth.
  8. Digital health: Digital citizens must be aware of the physical stress placed on their bodies by internet usage. They must be aware to not become overly dependent on the internet causing eye strain, headaches, stress problems, and so on.
  9. Digital security: This simply means that citizens must take measures to be safe by practicing using difficult passwords, virus protection, backing up data, and so forth

Monday 2 November 2015

Cyber Safety

Cyber Safety
Cyber safety is safe and responsible use of information and communication technologies (ICT).NetSafe's apporach to cybersafety is founded on:Maintaining a positive apporach about the many benefitsbrought by technologies.Encouraging the public to identify the risks associated with ICT.


Tips for Cyber Safety:

1. Spend time having fun with your parents online and helping them understand technology!
2. Never post your personal information, such as a cell phone number, home number, home address, or your location on any social networking site or through mobile apps like Snapchat or Instagram.
3. Never meet in person with anyone you first “met” on the internet. If someone asks to meet you, tell your parents or guardian right away. Some people may not be who they say they are.
4. Check with your parents before you post pictures of yourself or others online. Do not post inappropriate pictures of anyone.
5. Never respond to mean or rude texts, messages, and e-mails. Delete any unwanted messages. You may need to delete friends who continuously bother you or post things that are not appropriate.
6. NEVER share your password with anyone, including your best friend. The only people who should know your password are your parents or guardian.
7. If you wouldn’t say something to another person’s face, don’t text it or post it online.
8. Do not download or install software or anything on your computer or cell phone before checking with your parents or guardian.
9. Use the privacy settings of social networking sites.
10. If anything makes you feel uncomfortable online, while gaming or when using your cell phone, talk with your parents or guardian right away.